Language Selection

English French German Italian Portuguese Spanish

Custom scripting gives users a safe-du

Filed under
HowTos

My company has a Linux cluster with a terabyte of attached storage. Over time we noticed the head node was becoming more overloaded. Inspection of the system showed that users were starting dozens of copies of the du utility to determine disk space usage. This was a natural thing for them to do, because they had a need to know how much disk space was available. A lack of disk space would cause their software builds and tests to fail. The problem was that it takes five to seven hours for a du of the entire shared filesystem. Thus, when the filesystem was nearly full (as it of course usually was), the number of du processes would increase almost exponentially.

To address this problem, we first set up automated nightly disk space reports, so that users could check the status without running du. This still did not solve the problem, as the amount of used space could fluctuate dramatically over the course of 24 hours. Users still wanted and needed to run their own du processes throughout the workday.

While adding more disk space would have solved the problem, we are using a large disk array that is already filled to maximum capacity. In general, users tend to fill up all available disk space anyway, no matter how much you give them.

We then developed a policy: users could run du on any directory they owned. In addition, user du processes would be allowed to run for a maximum of one hour of wall time. Users in the wheel group would be exempt from these restrictions.

I was given the task of developing a tool to implement this policy. Some sort of wrapper around the existing du seemed like an obvious choice: the script could validate the input, abort if an invalid path was given, and terminate the du process if it ran too long.

I wrote a basic bash script in perhaps an hour's time. Then I thought about how to run it, and that is where I ran into trouble. I had thought that I would make the script set user id (setuid) or set group id (setgid) root, i.e. when run by any user it would actually run in the root group. Then, I could change the permissions on the real du so that only root could run it. The result would be that normal users could only access the real du through the wrapper script.

Of course that would make a pretty boring article, and in reality it didn't turn out to be that simple:

Full Story.

More in Tux Machines

NVIDIA 367.44 Stable Linux Driver Released

While the NVIDIA 370 Linux driver series is currently in beta, the 367 driver series has been updated as the latest long-lived branch release. The Pascal-based TITAN X, GeForce GTX 1060 3GB, and GTX 1060 6GB are now officially supported... That's just with regards to proper product detection as I've been using the GTX 1060 fine on earlier driver releases, etc. Read more Also: Nvidia 367.44 Driver Adds TITAN X (Pascal) and GeForce GTX 1060 Support to Linux

OpenIndiana Operating System Gets MATE 1.14 Desktop Environment, New ISOs

Alexander Pyhalov from the OpenIndiana development team was happy to announce the availability of the latest MATE 1.14 open-source desktop environment for the Solaris-derived operating system. Read more

Canonical Announces Snapcraft 2.15 for Ubuntu 16.04 LTS with Many New Features

We reported earlier on the release of the major Mir 0.24.0 display server for the Ubuntu Linux operating system, and now we would like to inform you about the latest Snapcraft 2.15 tool for packaging apps in the Snap universal binary format. Read more

KDevelop 5.0.0 release

Almost two years after the release of KDevelop 4.7, we are happy to announce the immediate availability of KDevelop 5.0. KDevelop is an integrated development environment focusing on support of the C++, Python, PHP and JavaScript/QML programming languages. Many important changes and refactorings were done for version 5.0, ensuring that KDevelop remains maintainable and easy to extend and improve over the next years. Highlights include much improved new C/C++ language support, as well as polishing for Python, PHP and QML/JS. Read more