condor_q -l useridalso locate user processes:
ps -u userid -U userid uwwwdoing it in our CE as in our WN. Find open files and ports:
lsof -u userid -P netstat -apAfter that kill jobs:
condor_rm useridand kill process with
killall process
or kill -9 process
Remember to check cron
and at
as the infected user.
crontab -l
As we are using Gums 1.2 (with gums 1.3 you can ban individual DNs) we can't ban a user based in its DN. What we can do is avoid her/him to submit jobs to our pool. In our condor master we added:
vim /scratch/condor/condor_config.local DENY_WRITE = userid@grid/*Remember to do a
condor_reconfig -all
We also reconfigured our SE, removing its permission to write in each gridFTP servers, commenting:
vim /etc/grid-security/storage-authzdb #authorize userid read-write 0 171 171 / /pnfs/sprace.org.br/data/ /pnfs/sprace.org.br/data/
tail -f /OSG/globus/var/globus-gatekeeper.logsearching based in its DN.
iptraf
condor_q -l userid|grep CmdAlso find open hidden files at
/tmp
and /home/OSG_app
. Do this step in CE and WN.
-- MarcoAndreFerreiraDias - 28 Sep 2009
antalya escort bursa escort eskisehir escort istanbul escort izmir escort