Slurm User Guide

## Unacceptable Behaviors and Cluster Usage Policies Understanding what constitutes misuse of cluster resources is crucial for maintaining a productive and secure research computing environment. The following behaviors are generally considered unacceptable and may result in account suspension or termination:

1. Resource Abuse

- **Hogging Resources**: Submitting an excessive number of jobs or requesting more resources than necessary, preventing other users from accessing the cluster. - **Ignoring Queue Policies**: Consistently submitting jobs to inappropriate queues or violating queue-specific limits. - **Circumventing Fairshare Mechanisms**: Attempting to game the system to get more than your fair share of resources.

2. Security Violations

- **Unauthorized Access**: Attempting to access other users' data or trying to elevate your privileges on the system. - **Sharing Credentials**: Giving your login information to others or allowing unauthorized users to access the cluster through your account. - **Installing Malicious Software**: Introducing malware, viruses, or any unauthorized software to the cluster.

3. Inappropriate Use of Compute Resources

- **Non-Research Activities**: Using the cluster for non-academic or non-approved purposes.

4. Misuse of Data and Storage

- **Storing Inappropriate Content**: Using cluster storage for personal files, especially large media files or inappropriate content. - **Data Theft**: Attempting to exfiltrate large amounts of data or sensitive information from the cluster. - **Excessive I/O Operations**: Running jobs that perform excessive read/write operations, potentially damaging the storage systems.

5. Violation of Software Licenses

- **License Violations**: Using software in violation of its license terms or using more licenses than allocated to you.

6. Disrupting Cluster Operations

- **Denial of Service**: Intentionally or unintentionally running jobs that crash nodes or disrupt cluster services.

7. Non-Compliance with Policies

- **Ignoring System Announcements**: Consistently disregarding important announcements from system administrators.

8. Attempts to Evade Monitoring or Quotas

- **Hiding Activities**: Attempting to conceal the nature of your computations or evade system monitoring tools. - **Quota Evasion**: Trying to bypass storage quotas or other resource limitations set by administrators.

Consequences of Violations

The consequences of engaging in these behaviors can include: 1. Temporary suspension of your account 2. Permanent revocation of cluster access 3. Reporting to your supervisor, department, or funding agency

Best Practices to Avoid Violations

1. **Read and Understand Policies**: Familiarize yourself with all cluster usage policies and guidelines. 2. **When in Doubt, Ask**: If you're unsure about whether a particular use is acceptable, consult with cluster administrators. 3. **Regular Check-ins**: Periodically review your resource usage and job patterns to ensure compliance. 4. **Report Suspicious Activities**: If you notice potential misuse by others, report it to the administrators. 5. **Respect Others**: Remember that the cluster is a shared resource. Be considerate of other users' needs. By adhering to these guidelines and using the cluster responsibly, you help maintain a productive and secure research computing environment for everyone.