There's nothing "bulletproof" available - recall that you're allowing users to execute arbitrary code (they can just bring their own SSH binaries with them!). So, you always must maintain some sort of trust relationship with them. The available solutions will mostly just limit well-intentioned users, not malicious ones. There are other mechanisms for protecting against malicious users. If you just want to limit the interactive jobs, you can always set a default periodic hold _expression_. I don't have any concrete advice (I've never tried this), other than starting with Wikipedia and going on from there: To prevent users (either through login or via their jobs) from abusing the system resources, you may want to look at HTCondor's chroot, namespace, and cgroup capabilities. Hope this helps! Brian On Aug 12, 2014, at 7:11 PM, Keith Brown <keith6014@xxxxxxxxx> wrote:
|