-
Jan Siwiec authoredJan Siwiec authored
- Accessing the Clusters
- Shell Access
- Karolina Cluster
- Barbora Cluster
- Salomon Cluster
- Authentication
- Private Key Authentication:
- Data Transfer
- Karolina Cluster
- Barbora Cluster
- Salomon Cluster
- Connection Restrictions
- Port Forwarding
- Port Forwarding From Login Nodes
- Port Forwarding From Compute Nodes
- Using Proxy Servers
- Graphical User Interface
- VPN Access
Accessing the Clusters
Shell Access
All IT4Innovations clusters are accessed by the SSH protocol via login nodes at the address cluster-name.it4i.cz. The login nodes may be addressed specifically, by prepending the loginX node name to the address.
!!! note The cluster-name.it4i.cz alias is currently not available through VPN connection. Use loginX.cluster-name.it4i.cz when connected to VPN.
Karolina Cluster
!!! important Karolina has gone into production with updated security requirements. Only clients based on OpenSSH 7.4p1 and later will be able to connect (including other SSH clients with compatible security algorithms). This means that starting with RHEL/Centos 7, Debian 9 or Ubuntu 18.04, you are good to go. Some users who still have DSA keys will be also unable to connect and are urged to update their keypairs, preferably to Ed25519 format.
Login address | Port | Protocol | Login node |
---|---|---|---|
karolina.it4i.cz | 22 | SSH | round-robin DNS record for login[1-4] |
login1.karolina.it4i.cz | 22 | SSH | login1 |
login2.karolina.it4i.cz | 22 | SSH | login2 |
login3.karolina.it4i.cz | 22 | SSH | login3 |
login4.karolina.it4i.cz | 22 | SSH | login4 |
Barbora Cluster
!!! important Barbora will have its security requirements updated. Only clients based on OpenSSH 7.4p1 and later will be able to connect (including other SSH clients with compatible security algorithms). This means that starting with RHEL/Centos 7, Debian 9 or Ubuntu 18.04, you are good to go. Some users who still have DSA keys will be also unable to connect and are urged to update their keypairs, preferably to Ed25519 format.
This change will be implemented in early October 2021.
Login address | Port | Protocol | Login node |
---|---|---|---|
barbora.it4i.cz | 22 | SSH | round-robin DNS record for login[1-2] |
login1.barbora.it4i.cz | 22 | SSH | login1 |
login2.barbora.it4i.cz | 22 | SSH | login2 |
Salomon Cluster
Login address | Port | Protocol | Login node |
---|---|---|---|
salomon.it4i.cz | 22 | SSH | round-robin DNS record for login[1-4] |
login1.salomon.it4i.cz | 22 | SSH | login1 |
login2.salomon.it4i.cz | 22 | SSH | login2 |
login3.salomon.it4i.cz | 22 | SSH | login3 |
login4.salomon.it4i.cz | 22 | SSH | login4 |
Authentication
Authentication is available by private key only. Verify SSH fingerprints during the first logon:
Karolina
ssh-rsa: AAAAB3NzaC1yc2EAAAADAQABAAABAQC9Cp8/a3F7eOPQvH4+HjC778XvYgRXWmCEOQnE3clPcKw15iIat3bvKc8ckYLudAzomipWy4VYdDI2OnEXay5ba8HqdREJO31qNBtW1AXgydCfPnkeuUZS4WVlAWM+HDlK6caB8KlvHoarCnNj2jvuYsMbARgGEq3vrk3xW4uiGpS6Y/uGVBBwMFWFaINbmXUrU1ysv/ZD1VpH4eHykkD9+8xivhhZtcz5Z2T7ZnIib4/m9zZZvjKs4ejOo58cKXGYVl27kLkfyOzU3cirYNQOrGqllN/52fATfrXKMcQor9onsbTkNNjMgPFZkddufxTrUaS7EM6xYsj8xrPJ2RaN
ssh-ed25519: AAAAC3NzaC1lZDI1NTE5AAAAIDkIdDODkUYRgMy1h6g/UtH34RnDCQkwwiJZFB0eEu1c
Barbora:
md5:
39:55:e2:b9:2a:a2:c4:9e:b1:8e:f0:f7:b1:66:a8:73 (RSA)
63:29:4c:3d:17:8c:be:73:4a:99:ff:83:66:ba:dd:c3 (ECDSA)
40:67:03:26:d3:6c:a0:7f:0a:df:0e:e7:a0:52:cc:4e (ED25519)
sha256:
TO5szOJf0bG7TWVLO3WABUpGKkP7nBm/RLyHmpoNpro (RSA)
lg+AaptpqFlEu5+lBecgaVdiSlYljo5+ADLItQRSYVA (ECDSA)
ZQzFTJVDdZa3I0ics9ME2qz4v5a3QzXugvyVioaH6tI (ED25519)
Salomon:
md5:
f6:28:98:e4:f9:b2:a6:8f:f2:f4:2d:0a:09:67:69:80 (DSA)
70:01:c9:9a:5d:88:91:c7:1b:c0:84:d1:fa:4e:83:5c (RSA)
66:32:0a:ef:50:01:77:a7:52:3f:d9:f8:23:7c:2c:3a (ECDSA)
ab:3d:5e:ff:82:68:c7:72:da:4a:2d:e3:ca:85:0d:df (ED25519)
sha256:
epkqEU2eFzXnMeMMkpX02CykyWjGyLwFj528Vumpzn4 (DSA)
WNIrR7oeQDYpBYy4N2d5A6cJ2p0837S7gzzTpaDBZrc (RSA)
cYO4UdtUBYlS46GEFUB75BkgxkI6YFQvjVuFxOlRG3g (ECDSA)
bFm3stNM8ETmj8Xd7iPXNtu5X5dC2apLNXGiH3VSTuw (ED25519)
!!! note SSH fingerprints are identical on all login nodes.
Private Key Authentication:
On Linux or Mac, use:
$ ssh -i /path/to/id_rsa username@cluster-name.it4i.cz
If you see a warning message UNPROTECTED PRIVATE KEY FILE!, use this command to set lower permissions to the private key file:
$ chmod 600 /path/to/id_rsa
On Windows, use the PuTTY SSH client.
After logging in, you will see the command prompt:
___ _____ _ _ ___ _ _
|_ _| |_ _| | || | |_ _| _ __ _ __ ___ __ __ __ _ | |_ (_) ___ _ __ ___
| | | | | || |_ | | | '_ \ | '_ \ / _ \ \ \ / / / _` | | __| | | / _ \ | '_ \ / __|
| | | | |__ _| | | | | | | | | | | | (_) | \ V / | (_| | | |_ | | | (_) | | | | | \__ \
|___| |_| |_| |___| |_| |_| |_| |_| \___/ \_/ \__,_| \__| |_| \___/ |_| |_| |___/
http://www.it4i.cz/?lang=en
Last login: Tue Jul 9 15:57:38 2013 from your-host.example.com
[username@login2.cluster-name ~]$
!!! note The environment is not shared between login nodes, except for shared filesystems.
Data Transfer
Data in and out of the system may be transferred by SCP and SFTP protocols.
Karolina Cluster
Address | Port | Protocol |
---|---|---|
karolina.it4i.cz | 22 | SCP, SFTP |
login1.karolina.it4i.cz | 22 | SCP, SFTP |
login2.karolina.it4i.cz | 22 | SCP, SFTP |
login3.karolina.it4i.cz | 22 | SCP, SFTP |
login4.karolina.it4i.cz | 22 | SCP, SFTP |
Barbora Cluster
Address | Port | Protocol |
---|---|---|
barbora.it4i.cz | 22 | SCP |
login1.barbora.it4i.cz | 22 | SCP |
login2.barbora.it4i.cz | 22 | SCP |
Salomon Cluster
Address | Port | Protocol |
---|---|---|
salomon.it4i.cz | 22 | SCP, SFTP |
login1.salomon.it4i.cz | 22 | SCP, SFTP |
login2.salomon.it4i.cz | 22 | SCP, SFTP |
login3.salomon.it4i.cz | 22 | SCP, SFTP |
login4.salomon.it4i.cz | 22 | SCP, SFTP |
Authentication is by private key only.
!!! note If you experience degraded data transfer performance, consult your local network provider.
On Linux or Mac, use an SCP or SFTP client to transfer data to Barbora:
$ scp -i /path/to/id_rsa my-local-file username@cluster-name.it4i.cz:directory/file
$ scp -i /path/to/id_rsa -r my-local-dir username@cluster-name.it4i.cz:directory
or
$ sftp -o IdentityFile=/path/to/id_rsa username@cluster-name.it4i.cz
A very convenient way to transfer files in and out of cluster is via the fuse filesystem SSHFS.
$ sshfs -o IdentityFile=/path/to/id_rsa username@cluster-name.it4i.cz:. mountpoint
Using SSHFS, the user's Barbora home directory will be mounted on your local computer, just like an external disk.
Learn more about SSH, SCP, and SSHFS by reading the manpages:
$ man ssh
$ man scp
$ man sshfs
On Windows, use the WinSCP client to transfer data. The win-sshfs client provides a way to mount the cluster filesystems directly as an external disc.
More information about the shared file systems is available here.
Connection Restrictions
Outgoing connections from cluster login nodes to the outside world are restricted to the following ports:
Port | Protocol |
---|---|
22 | SSH |
80 | HTTP |
443 | HTTPS |
873 | Rsync |
!!! note Use SSH port forwarding and proxy servers to connect from cluster to all other remote ports.
Outgoing connections from cluster compute nodes are restricted to the internal network. Direct connections from compute nodes to the outside world are cut.
Port Forwarding
Port Forwarding From Login Nodes
!!! note Port forwarding allows an application running on cluster to connect to arbitrary remote hosts and ports.
It works by tunneling the connection from cluster back to the user's workstations and forwarding from the workstation to the remote host.
Select an unused port on the cluster login node (for example 6000) and establish the port forwarding:
$ ssh -R 6000:remote.host.com:1234 cluster-name.it4i.cz
In this example, we establish port forwarding between port 6000 on the cluster and port 1234 on the remote.host.com
. By accessing localhost:6000
on the cluster, an application will see the response of remote.host.com:1234
. The traffic will run via the user's local workstation.
Port forwarding may be done using PuTTY as well. On the PuTTY Configuration screen, load your cluster configuration first. Then go to Connection > SSH > Tunnels to set up the port forwarding. Click the Remote radio button. Insert 6000 to the Source port textbox. Insert remote.host.com:1234
. Click Add, then Open.
Port forwarding may be established directly to the remote host. However, this requires that the user has an SSH access to remote.host.com
.
$ ssh -L 6000:localhost:1234 remote.host.com
!!! note Port number 6000 is chosen as an example only. Pick any free port.
Port Forwarding From Compute Nodes
Remote port forwarding from compute nodes allows applications running on the compute nodes to access hosts outside the cluster.
First, establish the remote port forwarding from the login node, as described above.
Second, invoke port forwarding from the compute node to the login node. Insert the following line into your jobscript or interactive shell:
$ ssh -TN -f -L 6000:localhost:6000 login1
In this example, we assume that port forwarding from login1:6000
to remote.host.com:1234
has been established beforehand. By accessing localhost:6000
, an application running on a compute node will see the response of remote.host.com:1234
.
Using Proxy Servers
Port forwarding is static; each single port is mapped to a particular port on a remote host. Connection to another remote host requires a new forward.
!!! note Applications with inbuilt proxy support experience unlimited access to remote hosts via a single proxy server.
To establish a local proxy server on your workstation, install and run the SOCKS proxy server software. On Linux, SSHD demon provides the functionality. To establish the SOCKS proxy server listening on port 1080 run:
$ ssh -D 1080 localhost
On Windows, install and run the free, open source Sock Puppet server.
Once the proxy server is running, establish the SSH port forwarding from cluster to the proxy server, port 1080, exactly as described above:
$ ssh -R 6000:localhost:1080 cluster-name.it4i.cz
Now, configure the applications proxy settings to localhost:6000
. Use port forwarding to access the proxy server from compute nodes, as well.
Graphical User Interface
- The X Window system is the principal way to get a GUI access to the clusters.
- Virtual Network Computing is a graphical desktop-sharing system that uses a Remote Frame Buffer protocol to remotely control another computer.
VPN Access
- Access IT4Innovations internal resources via VPN.