INSY cluster

The INSY department has a cluster of Linux compute servers with a lot of processing power and memory for running large or long jobs. You can login to the cluster using your NetID account.


The INSY cluster uses the Slurm scheduler to efficiently manage workloads. All jobs for the cluster have to be submitted as batch jobs into a queue. The scheduler manages and prioritizes the jobs in the queue, allocates resources (CPUs, memory) for the jobs, executes the jobs and enforces the resource allocations. Have a look at the scheduler page for more information.

Rules and guidelines

The available processing power and memory is large, but still limited. You should use the available resources efficiently and fairly, have a look at the rules and guidelines page for some hints.

Server information

The compute servers are not all equal, so you will have to select the right server for your job. See the server information page for the server names and specifications. Real-time resource usage can be seen here and real-time cluster allocation can be seen here.


The cluster can be accessed using an SSH client. The servers are placed behind a firewall, so you have to connect via the TU Delft bastion server ( for students). From there you can login (again using SSH) to the INSY cluster login node insy-login. See the connecting page for more information on connecting to the servers.

File storage and transfer

The servers have direct access to the TU Delft home, group and bulk storage. You can use your TU Delft installed machine or an SCP or SFTP client to transfer files to and from the storage. See the file storage and transfer page for more information on using the storage.

Installing software

The servers run the CentOS 7 Linux distribution, which provides the general Linux software. Most common software, including programming languages, libraries and development files for compiling your own software, is installed on the servers. However, a not-so-common program that you need might not be installed. Or your research requires a state-of-the-art program that is not (yet) available as a package for CentOS. See the software installation page for more information on installing software in the cluster.

Kerberos authentication

Kerberos is an authentication protocol which uses tickets to authenticate users without passwords. TU Delft installed computers use Kerberos tickets when connecting to other computers or accessing your files. To protect you from misuse, the ticket expires after 10 hours (even when you're still logged in). See the Kerberos authentication page for more information about the use and renewal of tickets.