Avatar photo
By: Lawrence Kearney

December 4, 2019 11:08 am

10,299 views

PDSH, SLE, and SLURM

Managing many systems from one is a basic need for system administrators. A need which has obvious development commonality judging from the myriad tools available that delegate work to other systems. Often the criteria used to target systems for management is understandably inflexible. Directory service management consoles and configuration management systems are good examples of […]

Read More


Avatar photo
By: Lawrence Kearney

November 27, 2018 2:06 am

10,093 views

Deploying SLURM PAM modules on SLE compute nodes

Security in High Performance Computing (HPC) environments has always been a proposal of relativity. Striking a balance between implementing an adequate level of security and not interfering with “getting the science done”. In the simplest terms the primary security realms HPC systems and clusters are exposed to are environmental and user facing. More specifically […]

Read More


Avatar photo
By: Lawrence Kearney

July 16, 2018 3:22 am

13,338 views

Deploying SLURM using SLE HPC patterns

The expansion of High Performance Computing (HPC) beyond the niches of higher education and government realms to corporate and business computing use cases has been on the rise. One catalyst of this trend is increasing innovation in hardware platforms and software development. Both respectively drive down the cost of deploying supercomputing services with each iteration […]

Read More


Avatar photo
By: Lawrence Kearney

June 14, 2018 2:37 am

12,107 views

SLES, PAM, SSSD, and MFA Soup

Multi-factor authentication (MFA) solutions are becoming the standard for many user facing IT services. Most visibly with web applications, corporate VPNs, self-service portals and online banking platforms to name but a few. Extending MFA to the realm of system administration to harden access to the Linux operating system itself is becoming an established best practice […]

Read More