Difference between revisions of "Accessing the cluster"

From ScientificComputing
Jump to: navigation, search
Line 3: Line 3:
 
<tr valign=top>
 
<tr valign=top>
 
<td style="width: 45%;">
 
<td style="width: 45%;">
== Request an account on the clusters ==
+
== Who can access the cluster ==
'''Prerequisites'''
+
{| class="wikitable" | style="background: white;"
 +
! || Euler || Leonhard Open
 +
|-
 +
| Shareholders who invested into a share of the clusters resources  || Yes || Yes
 +
|-
 +
| External collaboration partners of shareholders || Yes || Yes
 +
|-
 +
| All ETH members || Yes, as guest users with limited resources || No
 +
|}
 +
</td>
 +
<td style="width: 5%;>
 +
</td>
 +
<td style="width: 45%;">
 +
== Prerequisites ==
 
* A valid ETH account
 
* A valid ETH account
 
* [[Accessing_the_clusters#SSH|Local computer with an SSH client]]
 
* [[Accessing_the_clusters#SSH|Local computer with an SSH client]]
 
* [[Accessing_the_clusters#X11| An X11 server for graphical user interface]] (optional)
 
* [[Accessing_the_clusters#X11| An X11 server for graphical user interface]] (optional)
 +
</td>
 +
</tr>
 +
 +
  
'''How to get access'''
+
<tr valign=top>
 +
<td style="width: 45%;">
 +
== How to access the cluster ==
 
* Start your SSH client
 
* Start your SSH client
 
* Use ssh command to connect to the login node of Euler or Leonhard Open
 
* Use ssh command to connect to the login node of Euler or Leonhard Open
Line 15: Line 34:
 
   ssh username@login.leonhard.ethz.ch
 
   ssh username@login.leonhard.ethz.ch
 
* Use your ETH credentials to login
 
* Use your ETH credentials to login
 +
* [[Accessing_the_clusters#SSH_keys|Generate SSH keys for passwordless login]]
 +
 +
</td>
 +
<td style="width: 5%;>
 +
</td>
 +
<td style="width: 45%;">
 +
== For new users and unverified accounts ==
 
* Upon the first login, a verification code should be sent to your ETH email address (username@ethz.ch)
 
* Upon the first login, a verification code should be sent to your ETH email address (username@ethz.ch)
 
* Enter the verification code to the prompt
 
* Enter the verification code to the prompt
Line 27: Line 53:
  
 
* Accept the cluster’s usage rules upon the first access
 
* Accept the cluster’s usage rules upon the first access
* [[Accessing_the_clusters#SSH_keys|Generate SSH keys for passwordless login]]
 
  
 
</td>
 
</td>
<td style="width: 5%;>
+
</tr>
</td>
+
</table>
<td style="width: 30%;>
 
  
 
== External collaborators ==
 
== External collaborators ==
Line 38: Line 62:
 
* Their counterpart (“sponsor”) at ETH can create an ETH guest account, e-mail address and VPN service for them
 
* Their counterpart (“sponsor”) at ETH can create an ETH guest account, e-mail address and VPN service for them
 
* Then, they can access Euler like members of ETH
 
* Then, they can access Euler like members of ETH
 
</td>
 
</tr>
 
</table>
 
  
 
== Firewall ==
 
== Firewall ==
Line 49: Line 69:
 
[[Image:cluster.png|660px|]]
 
[[Image:cluster.png|660px|]]
  
 +
== Legal Compliance ==
 +
The HPC clusters are subject to ETH’s acceptable use policy for IT resources ([https://rechtssammlung.sp.ethz.ch/Dokumente/203.21en.pdf Benutzungsordnung für Telematik (BOT)] https://rechtssammlung.sp.ethz.ch/Dokumente/203.21en.pdf) in particular:
 +
* Cluster accounts are strictly personal
 +
* '''DO NOT''' share your account (password, sshkeys) with anyone
 +
* '''DO NOT''' use someone else’s account, even if they say it’s OK
 +
* If you suspect that someone used your account, [https://www.password.ethz.ch change your password] and contact cluster-support@id.ethz.ch
 +
 +
Consequences:
 +
 +
* In case of abuse, the offender’s account may be blocked temporarily or closed
 +
* System administrators are obliged by law to investigate abusive or illegal activities and report them to the relevant authorities
  
 
== Further reading ==
 
== Further reading ==
 
* [[New_account_request_process_for_HPC_clusters| New account request process for HPC clusters]]
 
* [[New_account_request_process_for_HPC_clusters| New account request process for HPC clusters]]
* [[Accessing_the_clusters|The complete guide to accessing the clusters]]
+
* [[Accessing_the_clusters|User guide: Accessing the clusters]]

Revision as of 10:43, 27 January 2021

Who can access the cluster

Euler Leonhard Open
Shareholders who invested into a share of the clusters resources Yes Yes
External collaboration partners of shareholders Yes Yes
All ETH members Yes, as guest users with limited resources No

Prerequisites

How to access the cluster

  • Start your SSH client
  • Use ssh command to connect to the login node of Euler or Leonhard Open
 ssh username@euler.ethz.ch
 ssh username@login.leonhard.ethz.ch

For new users and unverified accounts

  • Upon the first login, a verification code should be sent to your ETH email address (username@ethz.ch)
  • Enter the verification code to the prompt
An access code has been sent to your ETH email address.
Enter the access code at the prompt below.
If you do not receive the access code within a few minutes,
then contact us by opening a ticket at
http://smartdesk.ethz.ch

Access code (ending in ******Ls):
  • Accept the cluster’s usage rules upon the first access

External collaborators

Members of other institutions who have a collaboration with a research group at ETH may use the clusters for the purpose of said collaboration

  • Their counterpart (“sponsor”) at ETH can create an ETH guest account, e-mail address and VPN service for them
  • Then, they can access Euler like members of ETH

Firewall

  • To connect from outside of the ETH network to the clusters, establish first a VPN connection. Then, connect to the cluster through SSH.
  • To connect to an external service from a compute node, use the ETH proxy service:
module load eth_proxy

Cluster.png

Legal Compliance

The HPC clusters are subject to ETH’s acceptable use policy for IT resources (Benutzungsordnung für Telematik (BOT) https://rechtssammlung.sp.ethz.ch/Dokumente/203.21en.pdf) in particular:

  • Cluster accounts are strictly personal
  • DO NOT share your account (password, sshkeys) with anyone
  • DO NOT use someone else’s account, even if they say it’s OK
  • If you suspect that someone used your account, change your password and contact cluster-support@id.ethz.ch

Consequences:

  • In case of abuse, the offender’s account may be blocked temporarily or closed
  • System administrators are obliged by law to investigate abusive or illegal activities and report them to the relevant authorities

Further reading