Difference between revisions of "Accessing the clusters"

From ScientificComputing
Jump to: navigation, search
(Introduction)
Line 1: Line 1:
== Who can access the HPC clusters ==
+
== Who can access the HPC clusters of ETH Zurich ==
  
 
In order to connect to one of the HPC clusters of ID SIS HPC, users need a valid [[NETHZ]] account. The clusters are open to all members of ETH and can even be used by external users that have a collaboration with a research group at ETH Zurich. Members of ETH have immediate access to the clusters and can login with their [[NETHZ]] credentials. Members of other institutes who have a collaboration with a research group at ETH may use the HPC clusters for the purpose of said collaboration. Their counterpart ("sponsor") at ETH must ask the local IT support group (ISG) of the corresponding department to create a [[NETHZ]] guest account for them, including e-mail address and VPN service. Once the [[NETHZ]] guest account has been created, they can access the clusters like members of the ETH.
 
In order to connect to one of the HPC clusters of ID SIS HPC, users need a valid [[NETHZ]] account. The clusters are open to all members of ETH and can even be used by external users that have a collaboration with a research group at ETH Zurich. Members of ETH have immediate access to the clusters and can login with their [[NETHZ]] credentials. Members of other institutes who have a collaboration with a research group at ETH may use the HPC clusters for the purpose of said collaboration. Their counterpart ("sponsor") at ETH must ask the local IT support group (ISG) of the corresponding department to create a [[NETHZ]] guest account for them, including e-mail address and VPN service. Once the [[NETHZ]] guest account has been created, they can access the clusters like members of the ETH.

Revision as of 07:01, 3 August 2016

Who can access the HPC clusters of ETH Zurich

In order to connect to one of the HPC clusters of ID SIS HPC, users need a valid NETHZ account. The clusters are open to all members of ETH and can even be used by external users that have a collaboration with a research group at ETH Zurich. Members of ETH have immediate access to the clusters and can login with their NETHZ credentials. Members of other institutes who have a collaboration with a research group at ETH may use the HPC clusters for the purpose of said collaboration. Their counterpart ("sponsor") at ETH must ask the local IT support group (ISG) of the corresponding department to create a NETHZ guest account for them, including e-mail address and VPN service. Once the NETHZ guest account has been created, they can access the clusters like members of the ETH.

Legal compliance

The HPC clusters of ID SIS HPC are subject to ETH's acceptable use policy for IT resources (Benutzungsordnung für Telematik an der ETH Zürich, BOT). In particular:

  • Accounts are strictly personal.
  • You must not share your account (password, ssh keys) wih anyone else.
  • You must not use someone else's account, with our without their consent.
  • If you suspect that someone used your account, change your password and contact cluster-support@id.ethz.ch

In case of abuse, the offender's account may be blocked temporarily or closed. System administrators are obliged by law to investigate abusive or illegal activities and report them to the relevant authorities.

First login

On the first login, users need to accept the cluster's usage rules. Afterwards their account is created automatically. A user account on a HPC cluster includes a home directory.

SSH

Users connect to the HPC clusters via the SSH protocol. For this purpose they need to have an SSH client installed.

Linux, Mac OS X

Windows

X11

Linux

Mac OS X

Windows

VPN

Troubleshooting

Permission denied

If you enter 3 times a wrong password, then you will get a permission denied error:

samfux@bullvalene:~$ ssh sfux@euler.ethz.ch
sfux@euler.ethz.ch's password: 
Permission denied, please try again.
sfux@euler.ethz.ch's password: 
Permission denied, please try again.
sfux@euler.ethz.ch's password: 
Permission denied (publickey,password,hostbased).
samfux@bullvalene:~$

In case you receive a "Permission denied" error, please check if you entered the correct password. If you think that your account has been corrupted, then please contact the service desk of IT services of ETH Zurich.

If you enter a wrong password too many times or in a high frequency, then we might block access to the clusters for your account, because it could be correupted. If you account has been blocked by the HPC group, then please contact cluster support.

Timeout

If you try to login and receive a timeout error, then it is very likely that you tried to connect from outside of the ETH network to one of the HPC clusters. Please either connect from the inside of the ETH network, or establish a VPN connection.

Indirect GLX rendering error

When using an SSH connection with X11 forwarding enabled, newer versions of the Xorg server show an error message, when the graphical user interface of an application is started:

X Error of failed request: BadValue (integer parameter out of range for operation)
  Major opcode of failed request: 153 (GLX)
  Minor opcode of failed request: 3 (X_GLXCreateContext)
  Value in failed request: 0x0
  Serial number of failed request: 27
  Current serial number in output stream: 30

This error is cause by starting your X11 server without enabling the setting for indirect GLX rendering (iglx), that is required for X11 forwarding. Up to version 1.16 of the Xorg server, the setting iglx, has been enabled by default. With version 1.17, the default has changed from +iglx to -iglx. Now the setting needs to be enabled either in the Xorg configuration file or with a command line setting, when starting the Xorg server manually. For Xquartz versions up to 2.7.8, the iglx setting is enabled by default. If you would like to use XQuartz 2.7.9 or newer, then please make sure that you enable the iglx setting when the X-server is started.

This problem is described in the following article:

https://www.phoronix.com/scan.php?page=news_item&px=Xorg-IGLX-Potential-Bye-Bye

External links

Operating system Link
Red Hat Enterprise Linux (RHEL) https://elrepo.org/bugs/view.php?id=610
CentOS https://www.centos.org/forums/viewtopic.php?t=57409#p244528
Ubuntu http://askubuntu.com/questions/745135/how-to-enable-indirect-glx-contexts-iglx-in-ubuntu-14-04-lts-with-nvidia-gfx
Mac OS X http://www.macinchem.org/blog/files/c7703a635bc8b6fb3d28d76684a6b31c-1921.php