Benjamin Allan
Benjamin Allan
The check needed is that when a producer is added to an aggregator, the( port#, ip#) of the producer is not found among the listening (port/ip) pairs of the the...
It seems like a reasonable extension to put this on the command line as well would be; -a perm=string where we can argue about whether string is something like 600...
RE the C api, perhaps modify set_new_with_auth(..., uid, gid, perm) to set_new_with_auth(..., struct auth_data *d); and a helper function: ``` xxx_set_auth_data_set(struct auth_data *data, uid, gid, perm, int adflags) #define AD_PERM...
can we close this?
attackers have numerous ways to fill up a log without ldmsd. But if that's a concern, then making the log level of auth failures selectable should address it. On most...
If we're doing a log green-field, that would be a v5-ish thing to do, right? Every plugin would have to be rewritten. If doing from scratch, I'd probably start with...
In ovis_util/util.h av_idx_of and av_value_at provide the primitives needed to handle detection and use of repeated arguments.
Please contribute a bash script function that will grope the file system for linux kernels version 3 and 4 to discover the reasonable local upper bound. 2x2 seemed a reasonable...
@tom95858 should we not then document this behavior carefully and also remove the other use of locking the set for directory purposes? And I'm a little confused how it is...
@eric-roman an independent system service to identify new PIDs in included #758 which is decoupled from slurm (it follows kernel net-link events instead). It would be interesting to know if...