Scenario A: Project Onboarding (Project Helios)
Duration
10 minutes total
Objective
Show how a new research project is onboarded with identity, scheduler policy, and storage access controls in a single automated workflow.
Presenter Flow
- Explain starting state: cluster is running and no
heliosartifacts exist. - Run onboarding playbook:
bash cd demo/vagrant ANSIBLE_CONFIG=ansible.cfg ansible-playbook ../playbooks/scenario-a-onboard.yml -i inventory/hosts.yml - Verify FreeIPA group and users.
- Verify Slurm QOS.
- Verify project storage path and ACL.
Talking Points
- Identity is centralized in FreeIPA, so access revocation and auditing are consistent across nodes.
- Scheduler controls are tied to project identity (
project-heliosQOS). - Storage ACLs are applied at onboarding time, reducing manual errors.
- The same flow can be repeated for other projects by changing
project_name.
Expected Output
- FreeIPA group
heliosexists. - Users
alice_heliosandbob_heliosexist and belong tohelios. - Slurm QOS
project-heliosexists. - Directory
/shared/projects/heliosexists with ACL grantingheliosrwx access.
Verification Commands
vagrant ssh mgmt01 -c "ipa group-show helios"
vagrant ssh mgmt01 -c "ipa user-show alice_helios"
vagrant ssh mgmt01 -c "ipa user-show bob_helios"
vagrant ssh mgmt01 -c "sacctmgr show qos project-helios"
vagrant ssh mgmt01 -c "getfacl /shared/projects/helios"
Timing Notes
- 2 min: Context and pre-checks
- 4 min: Run onboarding playbook
- 3 min: Show verifications
- 1 min: Wrap-up and transition
Presenter Notes
- Keep terminal output zoomed; focus on final state checks, not every task line.
- If user creation already exists from prior runs, call out idempotent behavior.
- Bridge to Scenario B by noting this clean baseline can be intentionally drifted.