Difference between revisions of "Accessing the cluster"
From ScientificComputing
Line 1: | Line 1: | ||
__NOTOC__ | __NOTOC__ | ||
− | <table style="width: 100%"> | + | <table style="width: 100%;"> |
<tr valign=top> | <tr valign=top> | ||
− | + | <td style="width: 45%;"> | |
− | <td style="width: | + | == Request an account on the clusters == |
− | == | ||
'''Prerequisites''' | '''Prerequisites''' | ||
* A valid ETH account | * A valid ETH account | ||
Line 11: | Line 10: | ||
'''How to get access''' | '''How to get access''' | ||
− | |||
* Start your SSH client | * Start your SSH client | ||
* Use ssh command to connect to the login node of Euler or Leonhard Open | * Use ssh command to connect to the login node of Euler or Leonhard Open | ||
Line 17: | Line 15: | ||
ssh username@login.leonhard.ethz.ch | ssh username@login.leonhard.ethz.ch | ||
* Use your ETH credentials to login | * Use your ETH credentials to login | ||
− | * | + | * Upon the first login, a verification code should be sent to your ETH email address (username@ethz.ch) |
− | * | + | * Enter the verification code to the prompt |
− | |||
− | + | An access code has been sent to your ETH email address. | |
− | + | Enter the access code at the prompt below. | |
+ | If you do not receive the access code within a few minutes, | ||
+ | then contact us by opening a ticket at | ||
+ | http://smartdesk.ethz.ch | ||
+ | |||
+ | Access code (ending in ******Ls): | ||
− | + | * Accept the cluster’s usage rules upon the first access | |
− | + | * [[Getting_started_with_clusters#SSH_keys|Generate SSH keys for passwordless login]] | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
</td> | </td> | ||
− | + | <td style="width: 5%;> | |
− | <td style="width: | ||
</td> | </td> | ||
+ | <td style="width: 30%;> | ||
− | |||
− | |||
− | |||
− | |||
== External collaborators == | == External collaborators == | ||
Members of other institutions who have a collaboration with a research group at ETH may use the clusters for the purpose of said collaboration | Members of other institutions who have a collaboration with a research group at ETH may use the clusters for the purpose of said collaboration | ||
* Their counterpart (“sponsor”) at ETH can create an ETH guest account, e-mail address and VPN service for them | * Their counterpart (“sponsor”) at ETH can create an ETH guest account, e-mail address and VPN service for them | ||
* Then, they can access Euler like members of ETH | * Then, they can access Euler like members of ETH | ||
+ | |||
+ | </td> | ||
+ | </tr> | ||
+ | </table> | ||
== Firewall == | == Firewall == | ||
Line 62: | Line 58: | ||
* In case of abuse, the offender’s account may be blocked temporarily or closed | * In case of abuse, the offender’s account may be blocked temporarily or closed | ||
* System administrators are obliged by law to investigate abusive or illegal activities and report them to the relevant authorities | * System administrators are obliged by law to investigate abusive or illegal activities and report them to the relevant authorities | ||
− | |||
− |
Revision as of 13:45, 20 January 2021
Request an account on the clustersPrerequisites
How to get access
ssh username@euler.ethz.ch ssh username@login.leonhard.ethz.ch
An access code has been sent to your ETH email address. Enter the access code at the prompt below. If you do not receive the access code within a few minutes, then contact us by opening a ticket at http://smartdesk.ethz.ch Access code (ending in ******Ls):
|
External collaboratorsMembers of other institutions who have a collaboration with a research group at ETH may use the clusters for the purpose of said collaboration
|
Firewall
Legal compliance
The HPC clusters are subject to ETH’s acceptable use policy for IT resources (Benutzungsordnung für Telematik (BOT)), in particular:
- Cluster accounts are strictly personal
- DO NOT share your account (password, sshkeys) with anyone
- DO NOT use someone else’s account, even if they say it’s OK
- If you suspect that someone used your account, change your password and contact cluster-support@id.ethz.ch
Consequences:
- In case of abuse, the offender’s account may be blocked temporarily or closed
- System administrators are obliged by law to investigate abusive or illegal activities and report them to the relevant authorities