Rates and Policies

Our service rates for FY18 are available on our RCS Service Rates FY18 page

If your recent work was made possible by RCS resources, please see our
Citation and Acknowledgement

Service Rates

Research Computing Systems - FY18 Rates

High Performance Computing

Community Condo Model Node Prices (Chinook)

Node Type
Approximate Cost
Standard Compute Node Relion 1900: 28-core
Intel E5-2690v4 processors with 128 GB RAM, 3-year warranty
Relion 1900: 28-core
Intel E5-2690v4 processors with 128 GB RAM, 4-year warranty
Relion 1900: 28-core
Intel E5-2690v4 processors with 128 GB RAM, 5-year warranty
BigMem Compute Node Relion 1900: 28-core
Intel E5-2690v4 processors with 1.5 TB RAM, 3-year warranty


High Performance Computing Scratch Storage ($CENTER1)

Chinook Tier
Service Description
$HOME Quota
$CENTER1 Quota
Tier 1 Open to the UA research community using nodes procured for the community and unused portions of shareholder nodes No cost for UA faculty, staff, and students 10 GB PI: 1 TB
Additional: $0.15/GB/yr*
Tier 2 For the PI or project that requires CPUs beyond what can be offered by Tier 1 or requires priority access to HPC resources. Approximately $9200/standard node for 3-year share 10 GB PI: 1 TB + 1 TB/node
Appromixately $9500/standard node for 4-year share
Appromixately $9800/standard node for 5-year share Additional: $0.15/GB/yr*
Tier 3 For the PI or project that requires dedicated resources. Contact RCS Contact RCS Contact RCS

Online Spinning Disk Storage

Lease $0.12/GB/yr*
Purchase Price of hardware, 20 hours labor install, $5/TB/year under warranty

Offline Tape Archive Storage ($ARCHIVE)

PI Quota 10 TB
Additional $0.05/GB/year*

Restricted Data Services (PENDING)

File Share No cost for UA faculty, staff, and students.
60 day purge policy
Spinning Disk Storage $0.12/GB/year*
Archive Storage 2 TB per UA project

*Offered in 100 GB increments, 200 GB minimum.

Virtual Machines

1 GB
20 GB
2 GB
40 GB
4 GB
60 GB
8 GB
100 GB


  • All research project needs are assessed with a 1 hour consultation.
  • Services are invoiced upfront annually.
  • Additional labor needed to support project development or implementation may be coordinated between PI and RCS and direct charged to an award fund/org with permission granted by the PI through a Work Authorization.
  • All services are subject to availability and rates are subject to change.

Please contact RCS for assistance to assess your project IT needs or to request a Facilities Statement if required for your proposal submission.

Proposals and Citation

Facilities Statement

Access to the RCS Facilities Statement (requires UA login).

RCS Citation

Has your recent work using RCS resources resulted in publication? Please include the following text in your publication(s):

      This work was supported in part by the high-performance computing and data storage resources operated by the Research Computing Systems Group at the University of Alaska Fairbanks, Geophysical Institute.

Proposal Support and Cost Estimates

Please contact RCS if additional proposal support or information is needed. Any project subject to data restrictions such as ITAR or NIST standards should also contact RCS for assistance. For current service rates please refer to our current Service Rates.


Principle Investigators

General Policies

PIs are responsible for all activities relating to their project, including the activities of other project members. PIs are also responsible for meeting the licensing terms of any software or data that are used on RCS systems.

Subsidized Resources

Each PI is given the following subsidized resources to share across all projects:

  • 10 TB of tape storage on $ARCHIVE
  • 1 virtual machine

Additional Resources

If additional resources are required beyond what is subsidized, PIs should request funding for resources through their director or local business office. RCS will contact the PI if a project exceeds its resource quota and a 3-month grace period will be provided before resources are purged.

All Users

General Policies

Users of RCS systems agree to abide by published UAF policies and standards: http://www.alaska.edu/oit/services/policies-and-standards. Every user of RCS systems may rightfully expect their programs, data, and documents stored on RCS systems to be inaccessible by others, secure against arbitrary loss or alteration, and available for use at all times. To help protect system security and achieve this goal, RCS staff reserve the right to routinely examine user accounts. In the event of a suspected security incident, RCS staff may inactivate and examine the contents of user accounts without prior notification.

Account Sharing

Users of RCS systems may not share their account with anyone under any circumstances. This policy ensures every user is solely responsible for all actions from within their account. When shared access to a particular set of files on a system is desired, UNIX group permissions should be applied. Contact uaf-rcs@alaska.edu for more information regarding changing group permissions on files and directories.

User-owned Files and Directories

For home directories, RCS recommends authorizing write access to only the file/directory owner. Group and world write permissions in a home directory should be avoided under all circumstances.

For the $CENTER1 and $ARCHIVE filesystems, RCS recommends using caution when opening group and world read / execute permissions, and extreme caution when opening group and world write permissions.

Setuid and setgid permissions are prohibited on all user-owned files and directories.

User files may be scanned by RCS staff at any time for system security or maintenance purposes.


RCS uses University of Alaska (UA) credentials for user authentication. Therefore, passwords used to access RCS systems are subject to UA password guidelines. UA passwords may be changed using ELMO (https://elmo.alaska.edu). If you suspect your password has been compromised, contact the UAF OIT Helpdesk (helpdesk@alaska.edu, 907-450-8300) immediately.

SSH Public Keys

Sharing of private SSH keys to allow another user to access an RCS account is considered account sharing and is prohibited on RCS systems.

Users of SSH public keys are responsible for their private keys and ensuring they are protected against access from other users. Private SSH keys should be generated and stored only on trusted systems.

System-generated E-mail

RCS provides a ~/.forward file for users on each system. When the system generates an email, the message will be forwarded to email address(es) listed in the .forward file. Users are free to update their ~/.forward file to their preferred email address.

Respect Other Users

Do not attempt to break passwords, tamper with system files, access files in other users' directories without permission, or otherwise abuse the privileges given to you with your RCS account. Your privileges do not extend beyond the directories, files, and volumes which you rightfully own or to which you have been given permission to access.

Software and Data License Agreements

Users are responsible for meeting the license terms of any software or data that they install on RCS systems.

Restricted Services

Research projects with data and software restricted by International Traffic in Arms Regulations (ITAR), National Institute of Standards and Technology (NIST), or other are asked to contact uaf-rcs@alaska.edu for assistance. In addition, PI's should review Office of Research Integrity policies and procedures at http://www.uaf.edu/ori.

Account Deactivation and Removal

User accounts will be deactivated after a year of inactivity. RCS will notify the user and project's PI once the account is deactivated and give a 3-month grace period to transfer needed data out of the user's account before the user account's data is purged.

Service Availability

Workstation Support Hours

  • Mac workstation support is available from 9:30 AM - 4:00 PM, Monday - Friday.
  • Windows workstation support is available from 9:00 AM - 5:00 PM, Monday - Friday.

Chinook Maintenance Periods

  • Monthly: First Wednesday for non-interrupt Operating System security and Scyld ClusterWare updates
  • Quarterly: First Wednesday of Jan, Apr, Jul, and Oct for Operating System and Scyld ClusterWare updates that may require system downtime
  • Twice per year: The month of May during the FAST and over the winter closure for Operating System and Scyld ClusterWare updates that may require system downtime

Policy Enforcement

Abuse of RCS resources is a serious matter and is subject to immediate action. A perceived, attempted, or actual violation of standards, procedures, or guidelines pursuant with RCS policies may result in disciplinary action including the loss of system privileges and possibly legal prosecution in the case of criminal activity. RCS employs the following mechanisms to enforce its policies:

  • Contacting the user via phone or email to ask them to correct the problem.
  • Modifying the permissions on user's files or directories in response to a security violation.
  • Inactivating accounts or disabling access to resources to ensure availability and security of RCS systems.