Unveiling User Behavior on Summit Login Nodes as a User

1Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We observe and analyze usage of the login nodes of the leadership class Summit supercomputer from the perspective of an ordinary user—not a system administrator—by periodically sampling user activities (job queues, running processes, etc.) for two full years (2020–2021). Our findings unveil key usage patterns that evidence misuse of the system, including gaming the policies, impairing I/O performance, and using login nodes as a sole computing resource. Our analysis highlights observed patterns for the execution of complex computations (workflows), which are key for processing large-scale applications.

Cite

CITATION STYLE

APA

Wilkinson, S. R., Maheshwari, K., & Silva, R. F. da. (2022). Unveiling User Behavior on Summit Login Nodes as a User. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 13350 LNCS, pp. 516–529). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-031-08751-6_37

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free