Accessing the cluster

From ScientificComputing
Revision as of 22:57, 27 January 2021 by Jarunanp (talk | contribs)

Jump to: navigation, search

Who can access the cluster

Euler Leonhard Open
Shareholders who invest in the cluster resources
Euler shareholders

Leonhard Open shareholders
External collaborators of shareholders
Guest users
All ETH members can access Euler as guest users with limited resources


How to access the cluster

  • Start your SSH client
  • Use ssh command to connect to the login node of Euler or Leonhard Open
  • Use your ETH credentials to log in


  • To use GUI on the cluster, enable X11 forwarding when log in
 ssh -Y
 ssh -Y

For new users and unverified accounts

  • Upon the first login, a verification code should be sent to your ETH email address (
  • Enter the verification code to the prompt
An access code has been sent to your ETH email address.
Enter the access code at the prompt below.
If you do not receive the access code within a few minutes,
then contact us by opening a ticket at

Access code (ending in ******Ls):

External collaborators

Members of other institutions who have a collaboration with a research group at ETH may use the clusters for the purpose of said collaboration

  • Their counterpart (“sponsor”) at ETH can create an ETH guest account, e-mail address and VPN service for them
  • Then, they can access Euler like members of ETH


  • To connect from outside of the ETH network to the cluster, establish first a VPN connection. Then, connect to the cluster through SSH.
  • To connect from a compute node to an external service, use the ETH proxy service:
module load eth_proxy


Legal Compliance

The HPC clusters are subject to ETH’s acceptable use policy for IT resources (Benutzungsordnung für Telematik (BOT)), in particular:

  • Cluster accounts are strictly personal
  • DO NOT share your account (password, sshkeys) with anyone
  • DO NOT use someone else’s account, even if they say it’s OK
  • If you suspect that someone used your account, change your password and contact


  • In case of abuse, the offender’s account may be blocked temporarily or closed
  • System administrators are obliged by law to investigate abusive or illegal activities and report them to the relevant authorities

Further reading