Skip to content

Special use

Our cluster combines various hardware resources from multiple universities and other organizations. By default you can only use the nodes having NO Taints (see the resources page of the portal).

All taints

Here's the full list of taints on the nodes. To run on the node having a taint, you need to use the node toleration in your pod. Some are set automatically on deployed jobs by our cluster, some can only be used by privileged users. Please refer to this list and only set the ones you were allowed to use by cluster admins.

Taint Purpose Who can set manually ARM64 node. Make sure your image supports it. All Don't run any user jobs on ceph storage nodes No CSUSB researved nodes. Namespaces: csusb-chaseci, csusb-hpc, csusb-cousins-lab, csusb-jupyterhub, csusb-mpi, csusb-salloum, prp-dvu-csusb Reseaved for ece3d-vision group CVPR deadline (until mid 11/2023) Namespace: ece3d-vision Private Hao Su cluster. Namespaces: ucsd-haosulab, ucsd-ravigroup, mc-lab Node accepts 4- and 8-GPU jobs only. Set automatically. No Ceph will not mount on the node. Otherwise the node is fine. All RESERVED for PRISM Center No Node can only access the science DMZ network, and not the public Internet. All Private OSG nodes No Reseaved for cogrob group conference deadline (until 12/1/2023) Namespace: cogrob Node is broken No Fence GPU nods from CPU jobs (Preferred! Jobs can still go on the node if there are no free CPU nodes) No

Running in group namespaces

Our cluster contains several sets of nodes dedicated to certain groups.

User can target ONLY THE GROUP NODES by using the nodeAffinity such as:

        - matchExpressions:
          - key:
            operator: In
            - group1

for large jobs to avoid taking over all shared cluster resources. Optionally a higher priority can be used for such jobs (talk to admins before using one).

Other taints

Some nodes in the cluster don't have access to public Internet, and can only access educational network. They still can pull images from Docker Hub using a proxy.

If your workload is not using the public Internet resources, you might tolerate the and get access to additional nodes.