Skip to content
Snippets Groups Projects
Commit f066f7b9 authored by Lukáš Krupčík's avatar Lukáš Krupčík
Browse files

all

parent 0724ba63
No related branches found
No related tags found
No related merge requests found
Showing
with 128 additions and 379 deletions
......@@ -6,12 +6,12 @@ X Window System
The X Window system is a principal way to get GUI access to the clusters.
Read more about configuring [**X Window System**](x-window-system/x-window-and-vnc.html).
Read more about configuring [**X Window System**](x-window-system/x-window-and-vnc.md).
VNC
---
The **Virtual Network Computing** (**VNC**) is a graphical [desktop sharing](http://en.wikipedia.org/wiki/Desktop_sharing "Desktop sharing") system that uses the [Remote Frame Buffer protocol (RFB)](http://en.wikipedia.org/wiki/RFB_protocol "RFB protocol") to remotely control another [computer](http://en.wikipedia.org/wiki/Computer "Computer").
Read more about configuring **[VNC](../../../salomon/accessing-the-cluster/graphical-user-interface/vnc.html)**.
Read more about configuring **[VNC](../../../salomon/accessing-the-cluster/graphical-user-interface/vnc.md)**.
......@@ -20,7 +20,7 @@ Start vncserver
---------------
>To access VNC a local vncserver must be started first and also a tunnel using SSH port forwarding must be established.
[See below](vnc.html#linux-example-of-creating-a-tunnel) for the details on SSH tunnels. In this example we use port 61.
[See below](vnc.md#linux-example-of-creating-a-tunnel) for the details on SSH tunnels. In this example we use port 61.
You can find ports which are already occupied. Here you can see that ports " /usr/bin/Xvnc :79" and " /usr/bin/Xvnc :60" are occupied.
......@@ -199,7 +199,7 @@ Allow incoming X11 graphics from the compute nodes at the login node:
$ xhost +
```
Get an interactive session on a compute node (for more detailed info [look here](../../../../anselm-cluster-documentation/resource-allocation-and-job-execution/job-submission-and-execution.html)). Use the **-v DISPLAY** option to propagate the DISPLAY on the compute node. In this example, we want a complete node (24 cores in this example) from the production queue:
Get an interactive session on a compute node (for more detailed info [look here](../../../../anselm-cluster-documentation/resource-allocation-and-job-execution/job-submission-and-execution.md)). Use the **-v DISPLAY** option to propagate the DISPLAY on the compute node. In this example, we want a complete node (24 cores in this example) from the production queue:
```bash
$ qsub -I -v DISPLAY=$(uname -n):$(echo $DISPLAY | cut -d ':' -f 2) -A PROJECT_ID -q qprod -l select=1:ncpus=24
......@@ -213,5 +213,4 @@ $ xterm
Example described above:
![](gnome-compute-nodes-over-vnc.png)
![](gnome-compute-nodes-over-vnc.png)
\ No newline at end of file
......@@ -127,5 +127,4 @@ $ gnome-session &
In this way, we run remote gnome session on the cluster, displaying it in the local X server
Use System->Log Out to close the gnome-session
Use System->Log Out to close the gnome-session
\ No newline at end of file
......@@ -3,13 +3,13 @@ Accessing the Clusters
The IT4Innovations clusters are accessed by SSH protocol via login nodes.
>Read more on [Accessing the Salomon Cluste](../salomon/accessing-the-cluster.html)r or [Accessing the Anselm Cluster](../anselm-cluster-documentation/accessing-the-cluster.html) pages.
>Read more on [Accessing the Salomon Cluste](../salomon/accessing-the-cluster.html)r or [Accessing the Anselm Cluster](../anselm-cluster-documentation/accessing-the-cluster.md) pages.
### PuTTY
On **Windows**, use [PuTTY ssh client](accessing-the-clusters/shell-access-and-data-transfer/putty/putty.html).
On **Windows**, use [PuTTY ssh client](accessing-the-clusters/shell-access-and-data-transfer/putty.md).
### SSH keys
Read more about [SSH keys management](accessing-the-clusters/shell-access-and-data-transfer/ssh-keys.html).
Read more about [SSH keys management](accessing-the-clusters/shell-access-and-data-transfer/ssh-keys.md).
......@@ -8,31 +8,31 @@ PuTTY - before we start SSH connection
We recommned you to download "**A Windows installer for everything except PuTTYtel**" with **Pageant*** (SSH authentication agent) and **PuTTYgen** (PuTTY key generator) which is available [here](http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html).
>After installation you can proceed directly to private keys authentication using ["Putty"](putty.html#putty).
>After installation you can proceed directly to private keys authentication using ["Putty"](putty.md#putty).
"Change Password for Existing Private Key" is optional.
"Generate a New Public/Private key pair" is intended for users without Public/Private key in the initial email containing login credentials.
"Pageant" is optional.
### PuTTYgen
PuTTYgen is the PuTTY key generator. Read more how to load in an existing private key and change your passphrase or generate a new public/private key pair using [PuTTYgen](puttygen.html) if needed.
PuTTYgen is the PuTTY key generator. Read more how to load in an existing private key and change your passphrase or generate a new public/private key pair using [PuTTYgen](puttygen.md) if needed.
### Pageant SSH agent
[Pageant](pageant.html) holds your private key in memory without needing to retype a passphrase on every login. We recommend its usage.
[Pageant](pageant.md) holds your private key in memory without needing to retype a passphrase on every login. We recommend its usage.
PuTTY - how to connect to the IT4Innovations cluster
--------------------------------------------------------
- Run PuTTY
- Enter Host name and Save session fields with [Login address](../../../../salomon/accessing-the-cluster/shell-and-data-access/shell-and-data-access.html) and browse Connection - > SSH -> Auth menu. The *Host Name* input may be in the format **"username@clustername.it4i.cz"** so you don't have to type your login each time.In this example we will connect to the Salomon cluster using **"salomon.it4i.cz"**.
- Enter Host name and Save session fields with [Login address](../../../../salomon/accessing-the-cluster/shell-and-data-access.md) and browse Connection - > SSH -> Auth menu. The *Host Name* input may be in the format **"username@clustername.it4i.cz"** so you don't have to type your login each time.In this example we will connect to the Salomon cluster using **"salomon.it4i.cz"**.
![](PuTTY_host_Salomon.png)
- Category -> Connection - > SSH -> Auth:
Select Attempt authentication using Pageant.
Select Allow agent forwarding.
Browse and select your [private key](../ssh-keys.html) file.
Browse and select your [private key](../ssh-keys.md) file.
![](PuTTY_keyV.png)
......@@ -45,7 +45,7 @@ PuTTY - how to connect to the IT4Innovations cluster
![](PuTTY_open_Salomon.png)
- Enter your username if the *Host Name* input is not in the format "username@salomon.it4i.cz".
- Enter passphrase for selected [private key](../ssh-keys.html) file if Pageant **SSH authentication agent is not used.**
- Enter passphrase for selected [private key](../ssh-keys.md) file if Pageant **SSH authentication agent is not used.**
Another PuTTY Settings
----------------------
......
......@@ -7,7 +7,7 @@ PuTTYgen is the PuTTY key generator. You can load in an existing private key and
You can change the password of your SSH key with "PuTTY Key Generator". Make sure to backup the key.
- Load your [private key](../ssh-keys.html) file with *Load* button.
- Load your [private key](../ssh-keys.md) file with *Load* button.
- Enter your current passphrase.
- Change key passphrase.
- Confirm key passphrase.
......@@ -48,4 +48,4 @@ You can generate an additional public/private key pair and insert public key in
![](PuttyKeygenerator_006V.png)
- Now you can insert additional public key into authorized_keys file for authentication with your own private key.
You must log in using ssh key received after registration. Then proceed to [How to add your own key](../ssh-keys.html).
You must log in using ssh key received after registration. Then proceed to [How to add your own key](../ssh-keys.md).
......@@ -108,5 +108,4 @@ In this example, we add an additional public key, stored in file additional_key.
### How to remove your own key
Removing your key from authorized_keys can be done simply by deleting the corresponding public key which can be identified by a comment at the end of line (eg. username@organization.example.com).
Removing your key from authorized_keys can be done simply by deleting the corresponding public key which can be identified by a comment at the end of line (eg. username@organization.example.com).
\ No newline at end of file
VPN - Connection fail in Win 8.1
VPN - Connection fail in Win 8.1
================================
**Failed to initialize connection subsystem Win 8.1 - 02-10-15 MS patch**
......
......@@ -9,7 +9,4 @@ Anyone is welcomed to apply via the [Directors Discretion.](http://www.it4i.cz/o
Foreign (mostly European) users can obtain computational resources via the [PRACE (DECI) program](http://www.prace-ri.eu/DECI-Projects).
In all cases, IT4Innovations’ access mechanisms are aimed at distributing computational resources while taking into account the development and application of supercomputing methods and their benefits and usefulness for society. The applicants are expected to submit a proposal. In the proposal, the applicants **apply for a particular amount of core-hours** of computational resources. The requested core-hours should be substantiated by scientific excellence of the
proposal, its computational maturity and expected impacts. Proposals do undergo a scientific, technical and economic
evaluation. The allocation decisions are based on this
evaluation. More information at [Computing resources allocation](http://www.it4i.cz/computing-resources-allocation/?lang=en) and [Obtaining Login Credentials](obtaining-login-credentials.html) page.
In all cases, IT4Innovations’ access mechanisms are aimed at distributing computational resources while taking into account the development and application of supercomputing methods and their benefits and usefulness for society. The applicants are expected to submit a proposal. In the proposal, the applicants **apply for a particular amount of core-hours** of computational resources. The requested core-hours should be substantiated by scientific excellence of the proposal, its computational maturity and expected impacts. Proposals do undergo a scientific, technical and economic evaluation. The allocation decisions are based on this evaluation. More information at [Computing resources allocation](http://www.it4i.cz/computing-resources-allocation/?lang=en) and [Obtaining Login Credentials](obtaining-login-credentials.md) page.
\ No newline at end of file
Obtaining Login Credentials
Obtaining Login Credentials
===========================
Obtaining Authorization
-----------------------
The computational resources of IT4I are allocated by the Allocation
Committee to a [Project](../introduction.html),
investigated by a Primary Investigator. By allocating the computational
resources, the Allocation Committee is authorizing the PI to access and
use the clusters. The PI may decide to authorize a number of her/his
Collaborators to access and use the clusters, to consume the resources
allocated to her/his Project. These collaborators will be associated to
the Project. The Figure below is depicting the authorization chain:
The computational resources of IT4I are allocated by the Allocation Committee to a [Project](../introduction.md), investigated by a Primary Investigator. By allocating the computational resources, the Allocation Committee is authorizing the PI to access and use the clusters. The PI may decide to authorize a number of her/his Collaborators to access and use the clusters, to consume the resources allocated to her/his Project. These collaborators will be associated to the Project. The Figure below is depicting the authorization chain:
![](Authorization_chain.png)
You need to either [become the
PI](../applying-for-resources.html) or [be named as a
collaborator](obtaining-login-credentials.html#authorization-of-collaborator-by-pi)
by a PI in order to access and use the clusters.
You need to either [become the PI](../applying-for-resources.md) or [be named as a collaborator](obtaining-login-credentials.md#authorization-of-collaborator-by-pi) by a PI in order to access and use the clusters.
Head of Supercomputing Services acts as a PI of a project DD-13-5.
Joining this project, you may **access and explore the clusters**, use
software, development environment and computers via the qexp and qfree
queues. You may use these resources for own education/research, no
paperwork is required. All IT4I employees may contact the Head of
Supercomputing Services in order to obtain **free access to the
clusters**.
Head of Supercomputing Services acts as a PI of a project DD-13-5. Joining this project, you may **access and explore the clusters**, use software, development environment and computers via the qexp and qfree queues. You may use these resources for own education/research, no paperwork is required. All IT4I employees may contact the Head of Supercomputing Services in order to obtain **free access to the clusters**.
### Authorization of PI by Allocation Committee
The PI is authorized to use the clusters by the allocation decision
issued by the Allocation Committee.The PI will be informed by IT4I about
the Allocation Committee decision.
The PI is authorized to use the clusters by the allocation decision issued by the Allocation Committee.The PI will be informed by IT4I about the Allocation Committee decision.
### Authorization by web
This is a preferred way of granting access to project resources.
Please, use this method whenever it's possible.
This is a preferred way of granting access to project resources. Please, use this method whenever it's possible.
Log in to the [IT4I Extranet
portal](https://extranet.it4i.cz) using IT4I credentials
and go to the **Projects** section.
Log in to the [IT4I Extranet portal](https://extranet.it4i.cz) using IT4I credentials and go to the **Projects** section.
- **Users:** Please, submit your requests for becoming a
project member.
- **Primary Investigators:** Please, approve or deny users' requests
in the same section.
- **Users:** Please, submit your requests for becoming a project member.
- **Primary Investigators:** Please, approve or deny users' requests in the same section.
### Authorization by e-mail (an alternative approach)
In order to authorize a Collaborator to utilize the allocated
resources, the PI should contact the [IT4I
support](https://support.it4i.cz/rt/) (E-mail: [support
[at] it4i.cz](mailto:support%20%5Bat%5D%20it4i.cz)) and provide
following information:
In order to authorize a Collaborator to utilize the allocated resources, the PI should contact the [IT4I support](https://support.it4i.cz/rt/) (E-mail: [support [at] it4i.cz](mailto:support%20%5Bat%5D%20it4i.cz)) and provide following information:
1. Identify your project by project ID
2. Provide list of people, including himself, who are authorized to use
the resources allocated to the project. The list must include full
name, e-mail and affiliation. Provide usernames as well, if
collaborator login access already exists on the IT4I systems.
2. Provide list of people, including himself, who are authorized to use the resources allocated to the project. The list must include full name, e-mail and affiliation. Provide usernames as well, if collaborator login access already exists on the IT4I systems.
3. Include "Authorization to IT4Innovations" into the subject line.
Example (except the subject line which must be in English, you may use
Czech or Slovak language for communication with us):
Example (except the subject line which must be in English, you may use Czech or Slovak language for communication with us):
```bash
Subject: Authorization to IT4Innovations
Dear support,
......@@ -81,38 +48,25 @@ Czech or Slovak language for communication with us):
Thank you,
PI
(Digitally signed)
```
Should the above information be provided by e-mail, the e-mail **must
be** digitally signed. Read more on [digital
signatures](obtaining-login-credentials.html#the-certificates-for-digital-signatures)
below.
Should the above information be provided by e-mail, the e-mail **must be** digitally signed. Read more on [digital signatures](obtaining-login-credentials.md#the-certificates-for-digital-signatures) below.
The Login Credentials
-------------------------
Once authorized by PI, every person (PI or Collaborator) wishing to
access the clusters, should contact the [IT4I
support](https://support.it4i.cz/rt/) (E-mail: [support
[at] it4i.cz](mailto:support%20%5Bat%5D%20it4i.cz)) providing
following information:
Once authorized by PI, every person (PI or Collaborator) wishing to access the clusters, should contact the [IT4I support](https://support.it4i.cz/rt/) (E-mail: [support [at] it4i.cz](mailto:support%20%5Bat%5D%20it4i.cz)) providing following information:
1. Project ID
2. Full name and affiliation
3. Statement that you have read and accepted the [Acceptable use policy
document](http://www.it4i.cz/acceptable-use-policy.pdf) (AUP).
3. Statement that you have read and accepted the [Acceptable use policy document](http://www.it4i.cz/acceptable-use-policy.pdf) (AUP).
4. Attach the AUP file.
5. Your preferred username, max 8 characters long. The preferred
username must associate your surname and name or be otherwise
derived from it. Only alphanumeric sequences, dash and underscore
signs are allowed.
6. In case you choose [Alternative way to personal
certificate](obtaining-login-credentials.html#alternative-way-of-getting-personal-certificate),
a **scan of photo ID** (personal ID or passport or driver license)
is required
Example (except the subject line which must be in English, you may use
Czech or Slovak language for communication with us):
5. Your preferred username, max 8 characters long. The preferred username must associate your surname and name or be otherwise derived from it. Only alphanumeric sequences, dash and underscore signs are allowed.
6. In case you choose [Alternative way to personal certificate](obtaining-login-credentials.md#alternative-way-of-getting-personal-certificate),
a **scan of photo ID** (personal ID or passport or driver license) is required
Example (except the subject line which must be in English, you may use Czech or Slovak language for communication with us):
```bash
Subject: Access to IT4Innovations
Dear support,
......@@ -126,141 +80,85 @@ Czech or Slovak language for communication with us):
Thank you,
John Smith
(Digitally signed)
```
Should the above information be provided by e-mail, the e-mail **must
be** digitally signed. To sign an e-mail, you need digital certificate.
Read more on [digital
signatures](obtaining-login-credentials.html#the-certificates-for-digital-signatures)
below.
Should the above information be provided by e-mail, the e-mail **must be** digitally signed. To sign an e-mail, you need digital certificate. Read more on [digital signatures](obtaining-login-credentials.md#the-certificates-for-digital-signatures) below.
Digital signature allows us to confirm your identity in remote
electronic communication and provides an encrypted channel to exchange
sensitive information such as login credentials. After receiving your
signed e-mail with the requested information, we will send you your
login credentials (user name, key, passphrase and password) to access
the IT4I systems.
Digital signature allows us to confirm your identity in remote electronic communication and provides an encrypted channel to exchange sensitive information such as login credentials. After receiving your signed e-mail with the requested information, we will send you your login credentials (user name, key, passphrase and password) to access the IT4I systems.
We accept certificates issued by any widely respected certification
authority.
We accept certificates issued by any widely respected certification authority.
For various reasons we do not accept PGP keys.** Please, use only
X.509 PKI certificates for communication with us.**
For various reasons we do not accept PGP keys.** Please, use only X.509 PKI certificates for communication with us.**
You will receive your personal login credentials by protected e-mail.
The login credentials include:
You will receive your personal login credentials by protected e-mail. The login credentials include:
1. username
2. ssh private key and private key passphrase
3. system password
The clusters are accessed by the [private
key](../accessing-the-clusters/shell-access-and-data-transfer/ssh-keys.html)
and username.
Username and password is used for login to the information systems
listed on <http://support.it4i.cz/>.
The clusters are accessed by the [private key](../accessing-the-clusters/ssh-keys.md) and username. Username and password is used for login to the information systems listed on <http://support.it4i.cz/>.
### Change Passphrase
On Linux, use
`
```bash
local $ ssh-keygen -f id_rsa -p
`
```
On Windows, use [PuTTY Key
Generator](../accessing-the-clusters/shell-access-and-data-transfer/putty/puttygen.html).
On Windows, use [PuTTY Key Generator](../accessing-the-clusters/shell-access-and-data-transfer/puttygen.md).
### Change Password
Change password in your user profile at
<https://extranet.it4i.cz/user/>
Change password in your user profile at <https://extranet.it4i.cz/user/>
The Certificates for Digital Signatures
-------------------------------------------
We accept personal certificates issued by any widely respected
certification authority (CA). This includes certificates by CAs
organized in International Grid Trust Federation
(<http://www.igtf.net/>), its European branch EUGridPMA -
<https://www.eugridpma.org/> and its member organizations, e.g. the
CESNET certification authority - <https://tcs-p.cesnet.cz/confusa/>. The
Czech *"Qualified certificate" (Kvalifikovaný certifikát)* (provided by
<http://www.postsignum.cz/> or
<http://www.ica.cz/Kvalifikovany-certifikat.aspx>), that is used in
electronic contact with Czech authorities is accepted as well.
We accept personal certificates issued by any widely respected certification authority (CA). This includes certificates by CAs organized in International Grid Trust Federation (<http://www.igtf.net/>), its European branch EUGridPMA - <https://www.eugridpma.org/> and its member organizations, e.g. the CESNET certification authority - <https://tcs-p.cesnet.cz/confusa/>. The Czech *"Qualified certificate" (Kvalifikovaný certifikát)* (provided by <http://www.postsignum.cz/> or <http://www.ica.cz/Kvalifikovany-certifikat.aspx>), that is used in electronic contact with Czech authorities is accepted as well.
Certificate generation process is well-described here:
- [How to generate a personal TCS certificate in Mozilla Firefox web
browser
(in Czech)](http://idoc.vsb.cz/xwiki/wiki/infra/view/uzivatel/moz-cert-gen)
- [How to generate a personal TCS certificate in Mozilla Firefox web browser (in Czech)](http://idoc.vsb.cz/xwiki/wiki/infra/view/uzivatel/moz-cert-gen)
A FAQ about certificates can be found here: >[Certificates
FAQ](certificates-faq.html).
A FAQ about certificates can be found here: >[Certificates FAQ](certificates-faq.md).
Alternative Way to Personal Certificate
-------------------------------------------
Follow these steps **only** if you can not obtain your certificate in a
standard way.
In case you choose this procedure, please attach a **scan of photo ID**
(personal ID or passport or drivers license) when applying for [login
credentials](obtaining-login-credentials.html#the-login-credentials).
Follow these steps **only** if you can not obtain your certificate in a standard way. In case you choose this procedure, please attach a **scan of photo ID** (personal ID or passport or drivers license) when applying for [login credentials](obtaining-login-credentials.md#the-login-credentials).
1. Go to <https://www.cacert.org/>.
- If there's a security warning, just acknowledge it.
2. Click *Join*.
3. Fill in the form and submit it by the *Next* button.
- Type in the e-mail address which you use for communication
with us.
- Type in the e-mail address which you use for communication with us.
- Don't forget your chosen *Pass Phrase*.
4. You will receive an e-mail verification link. Follow it.
5. After verifying, go to the CAcert's homepage and login using
*Password Login*.
5. After verifying, go to the CAcert's homepage and login using *Password Login*.
6. Go to *Client Certificates* -&gt; *New*.
7. Tick *Add* for your e-mail address and click the *Next* button.
8. Click the *Create Certificate Request* button.
9. You'll be redirected to a page from where you can download/install
your certificate.
- Simultaneously you'll get an e-mail with a link to
the certificate.
9. You'll be redirected to a page from where you can download/install your certificate.
- Simultaneously you'll get an e-mail with a link to the certificate.
Installation of the Certificate Into Your Mail Client
-----------------------------------------------------
The procedure is similar to the following guides:
- MS Outlook 2010
- [How to Remove, Import, and Export Digital
Certificates](http://support.microsoft.com/kb/179380)
- [Importing a PKCS #12 certificate
(in Czech)](http://idoc.vsb.cz/xwiki/wiki/infra/view/uzivatel/outl-cert-imp)
- [How to Remove, Import, and Export Digital certificates](http://support.microsoft.com/kb/179380)
- [Importing a PKCS #12 certificate (in Czech)](http://idoc.vsb.cz/xwiki/wiki/infra/view/uzivatel/outl-cert-imp)
- Mozilla Thudnerbird
- [Installing an SMIME
certificate](http://kb.mozillazine.org/Installing_an_SMIME_certificate)
- [Importing a PKCS #12 certificate
(in Czech)](http://idoc.vsb.cz/xwiki/wiki/infra/view/uzivatel/moz-cert-imp)
- [Installing an SMIME certificate](http://kb.mozillazine.org/Installing_an_SMIME_certificate)
- [Importing a PKCS #12 certificate (in Czech)](http://idoc.vsb.cz/xwiki/wiki/infra/view/uzivatel/moz-cert-imp)
End of User Account Lifecycle
-----------------------------
User accounts are supported by membership in active Project(s) or by affiliation to IT4Innovations. User accounts, that loose the support (meaning, are not attached to an active project and are not affiliated with IT4I), will be deleted 1 year after the last project to which they were attached expires.
User accounts are supported by membership in active Project(s) or by
affiliation to IT4Innovations. User accounts, that loose the support
(meaning, are not attached to an active project and are not affiliated
with IT4I), will be deleted 1 year after the last project to which they
were attached expires.
User will get 3 automatically generated warning e-mail messages of the
pending removal:.
User will get 3 automatically generated warning e-mail messages of the pending removal:.
- First message will be sent 3 months before the removal
- Second message will be sent 1 month before the removal
- Third message will be sent 1 week before the removal.
The messages will inform about the projected removal date and will
challenge the user to migrate her/his data
The messages will inform about the projected removal date and will challenge the user to migrate her/his data
\ No newline at end of file
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment