1591881 : Misuse vom Maxwell Cluster¶
Created: 2026-04-14T06:24:10Z - current status: new¶
Here is the anonymized and summarized report of the issue:
Summary of the Issue¶
The Maxwell cluster is generating repeated, automated requests to the FATER system (a document delivery service for DESY publications). These requests appear in rapid succession (every ~5 seconds), but each query takes approximately 3 minutes to complete. This high frequency of automated queries is overloading both the FATER server and its network infrastructure.
Key Observations:
- The requests originate from an IP address (131.169.178.156) associated with the Maxwell cluster.
- Each request includes a DOI (doi/10.3204/PUBDB-2020-00969), suggesting an attempt to fetch publication metadata or full texts.
- The system logs indicate broken pipe errors (Apache2::RequestIO::rflush), likely due to timeouts or resource exhaustion.
- FATER is not designed for bulk automated downloads but for manual, individual queries.
Suggested Solutions/Next Steps¶
- Identify the Source of the Requests
- Check which user account or job script on the Maxwell cluster is generating these queries.
- Review recent job submissions (e.g., via
sacctorsqueue) to trace the origin of the requests. -
Example command to list recent jobs:
bash sacct --format=JobID,User,JobName,Start,End,State --starttime=2026-04-14 -
Implement Rate Limiting or Delays
- If the requests are part of a legitimate workflow (e.g., a script fetching publication data), modify the script to:
- Add delays between queries (e.g.,
sleep 300for 5-minute intervals). - Use batch processing with controlled concurrency (e.g.,
xargs -P 1for sequential requests).
- Add delays between queries (e.g.,
-
Example for a Python script:
python import time time.sleep(300) # Wait 5 minutes between requests -
Use Alternative Data Sources
-
For bulk metadata/full-text downloads, consider:
- DESY’s internal publication database (e.g., PUBDB) instead of FATER.
- APIs (if available) for programmatic access to DESY publications.
- Local mirrors of frequently accessed datasets.
-
Temporary Blocking (if Necessary)
- As a last resort, temporarily block the Maxwell cluster’s IP (
131.169.178.156) from accessing FATER until the issue is resolved. -
Example firewall rule (adjust for DESY’s infrastructure):
bash iptables -A INPUT -s 131.169.178.156 -p tcp --dport 80 -j DROP -
User Communication
- Notify the user(s) responsible for the requests to:
- Acknowledge the impact on FATER.
- Provide guidance on compliant alternatives (e.g., using PUBDB or APIs).
References¶
- Maxwell Documentation: Job Scripts
- DESY PUBDB (for publication metadata)
- Context used: Logs of automated requests, FATER’s intended use case.