From 42d48574a7575072604aa419ef601a5a7edbca01 Mon Sep 17 00:00:00 2001 From: Morris Jette <jette@schedmd.com> Date: Wed, 31 Jul 2013 13:26:41 -0700 Subject: [PATCH] Update news web page for new releases to come --- doc/html/news.shtml | 94 ++++++++++++++++++++++++++++++--------------- 1 file changed, 64 insertions(+), 30 deletions(-) diff --git a/doc/html/news.shtml b/doc/html/news.shtml index 8f8148106e3..5585f0e1ffd 100644 --- a/doc/html/news.shtml +++ b/doc/html/news.shtml @@ -5,7 +5,8 @@ <h2>Index</h2> <ul> <li><a href="#26">Slurm Version 2.6, June 2013</a></li> -<li><a href="#1312">Slurm Version 13.12 and beyond</a></li> +<li><a href="#1312">Slurm Version 13.12, December 2013</a></li> +<li><a href="#1406">Slurm Version 14.06 and beyond</a></li> <li><a href="#security">Security Patches</a></li> </ul> @@ -17,7 +18,7 @@ Major enhancements include: for sets of similar jobs.</li> <li><a href="hdf5_profile_user_guide.html">Job profiling</a> capability added to record a wide variety of job characteristics for each task on a user - configurable periodic basis. Data currently available inclues CPU use, + configurable periodic basis. Data currently available includes CPU use, memory use, energy use, Infiniband network use, Lustre file system use, etc.</li> <li>Support for MPICH2 using PMI2 communications interface with much greater @@ -40,29 +41,62 @@ Major enhancements include: "cpu" could be limited to only a subset of the node's CPUs, insuring that one or more CPUs would be available to jobs in the "gpu" partition/queue.</li> </ul> +</p> -<h2><a name="1312">Major Updates in Slurm Version 13.12 and beyond</a></h2> -<p><b>NOTICE: Starting with 13.12 we will be numbering Slurm versions - with YEAR.MONTH nomenclature.</b> +<h2><a name="1312">Major Updates in Slurm Version 13.12</a></h2> +<p>NOTICE: Starting with 13.12 we will be numbering Slurm versions +with a YEAR.MONTH format.<br> +SLURM Version 13.12 release is planned in December 2013. +Major enhancements include: +<ul> +<li>Integration with + <a href="http://en.wikipedia.org/wiki/FlexNet_Publisher">FLEXlm (Flexnet Publisher)</a> + license management.</li> +<li>Layouts framework, which will be the basis for further developments toward + optimizing scheduling with respect to additional parameters such as temperature + and power consumption.</li> +<li>Energy consumption added as a factor in fair-share scheduling.</li> +<li>Energy aware scheduling added with respect to power caps.</li> +<li>Improved user support for fault-tolerance (e.g. "hot spare" resources).</li> +<li>New partition configuration parameters: AllowAccounts, AllowQOS, + DenyAccounts and DenyQOS.</li> +<li>Scalability improvements for MPI initialization including communication of + the compute node network interface details.</li> +<li>Defer sending SIGKILL signal to processes while a core dump is in progress.</li> +<li>Other important enhancements that can not be made public at this time...</li> +</ul> +</p> + + +<h2><a name="1406">Major Updates in Slurm Version 14.06 and beyond</a></h2> <p> Detailed plans for release dates and contents of additional SLURM releases have not been finalized. Anyone desiring to perform SLURM development should notify <a href="mailto:slurm-dev@schedmd.com">slurm-dev@schedmd.com</a> to coordinate activities. Future development plans includes: <ul> -<li>Scheduling optimized for energy efficiency.</li> -<li>Improved user support for fault-tolerance (e.g. "hot spare" resources).</li> +<li>Distributed architecture to support the management of resources with Intel + MIC processors.</li> +<li>Support of I/O as a new resources, including proxy I/O nodes with data + locality.</li> +<li>Improved scheduling support for job dependencies (e.g. pre-processing, + post-processing, co-processing on I/O nodes, etc.) to optimize overall + system utilization.</li> +<li>IP communications over InfiniBand network for improved performance.</li> +<li>Support for heterogeneous GPU environments (i.e. user specification of + desired GPU types).</li> +<li>Fault-tolerance and jobs dynamic adaptation through communication protocol + between Slurm , MPI libraries and the application.</li> +<li>Improved support for high-throughput computing (e.g. multiple slurmctld + daemons on a single cluster).</li> +<li>Scheduling fully optimized for energy efficiency.</li> <li>Numerous enhancements to advanced resource reservations (e.g. start or -end the reservation early depending upon the workload).</li> + end the reservation early depending upon the workload).</li> <li>Add Kerberos credential support including credential forwarding -and refresh.</li> + and refresh.</li> <li>Improved support for provisioning and virtualization.</li> <li>Provide a web-based SLURM administration tool.</li> -<li>Scheduling optimized for energy efficiency.</li> -<li>Integration with -<a href="http://en.wikipedia.org/wiki/FlexNet_Publisher">FLEXlm (Flexnet Publisher)</a> -license management.</li> <li>Finer-grained BlueGene resouce management (partitions/queues and advanced -reservations containing less than a whole midplane).</li> + reservations containing less than a whole midplane).</li> </ul> <h2><a name="security">Security Patches</a></h2> @@ -70,25 +104,25 @@ reservations containing less than a whole midplane).</li> <a href="http://cve.mitre.org/">http://cve.mitre.org/</a>.</p> <ul> <li>CVE-2009-0128<br> -There is a potential security vulnerability in SLURM where a user could -build an invalid job credential in order to execute a job (under his -correct UID and GID) on resources not allocated to that user. This -vulnerability exists only when the crypto/openssl plugin is used and was -fixed in SLURM version 1.3.0.</li> + There is a potential security vulnerability in SLURM where a user could + build an invalid job credential in order to execute a job (under his + correct UID and GID) on resources not allocated to that user. This + vulnerability exists only when the crypto/openssl plugin is used and was + fixed in SLURM version 1.3.0.</li> <li>CVE-2009-2084<br> -SLURM failed to properly set supplementary groups before invoking (1) sbcast -from the slurmd daemon or (2) strigger from the slurmctld daemon, which might -allow local SLURM users to modify files and gain privileges. This was fixed -in SLURM version 1.3.14.</li> + SLURM failed to properly set supplementary groups before invoking (1) sbcast + from the slurmd daemon or (2) strigger from the slurmctld daemon, which might + allow local SLURM users to modify files and gain privileges. This was fixed + in SLURM version 1.3.14.</li> <li>CVE-2010-3308<br> -There is a potential security vulnerability where if the init.d scripts are -executed by user root or SlurmUser to initiate the SLURM daemons and the -LD_LIBRARY_PATH is not set and the operating system interprets a blank entry -in the path as "." (current working directory) and that directory contains a -trojan library, then that library will be used by the SLURM daemon with -unpredictable results. This was fixed in SLURM version 2.1.14.</li> + There is a potential security vulnerability where if the init.d scripts are + executed by user root or SlurmUser to initiate the SLURM daemons and the + LD_LIBRARY_PATH is not set and the operating system interprets a blank entry + in the path as "." (current working directory) and that directory contains a + trojan library, then that library will be used by the SLURM daemon with + unpredictable results. This was fixed in SLURM version 2.1.14.</li> </ul> -<p style="text-align:center;">Last modified 16 July 2013</p> +<p style="text-align:center;">Last modified 31 July 2013</p> <!--#include virtual="footer.txt"--> -- GitLab