Log in to Anunna

From HPCwiki
(Redirected from Log in to B4F cluster)
Jump to navigation Jump to search

Log on using ssh

One can log in to Anunna using the Secure Shell Protocol (SSH) (default port tcp 22). The address of the login server is:

 login.anunna.wur.nl

You will be automatically redirected to the currently valid login server. To log on one has to use an ssh (secure shell) client. Such client systems are always available from Linux or MacOS systems. For Windows an ssh-client may need to be installed. The most popular ssh-client for Windows is PuTTY.

Note that current access may be restricted to certain IP-ranges. Furthermore, ssh-protocols may be prohibited on systems where port 22 is unavailable due to firewall.

The ssh-connection can also be configured to work without password, which means that no password needs to be provided at each log-in or secure copy attempt.

 IMPORTANT: the Login server can only act as access point and is not to be used for any serious CPU or RAM intensive work. 
 Anything requiring even moderate resources should be scheduled using SLURM!

CLI from a Linux/MacOSX terminal

A Command Line Interface (CLI) ssh client is available from any Linux or MacOSX terminal. Secure shell (ssh) protocols require port 22 to be open. Should a connection be refused, the firewall settings of the system should be checked. Alternatively, local ICT regulations may prohibit the use of port 22. Wageningen UR FB-ICT for instance does not allow traffic through port 22 over WiFi to certain systems.

ssh [user name]@login.anunna.wur.nl


MobaXTerm on Windows

The program uses a full Cygwin stack, so commands from Mac and Linux can be used. Though MobaXTerm provides the Mobakeygen extension, which has an intuitive interface and is very convenient.

Generating an SSH key pair

  1. From the main menu choose Tools > MobaKeygen SSH Key Generator
  2. Click on Generate and move your mouse to generate entropy
  3. Type in a passphrase for the key
  4. Save keys with a meaningful name

PuTTY on Windows

Putty is a free, powerful, and widely used SSH client that runs on Windows. It is extremely useful for those people who have a computer running Windows on their desk but must remotely connect to a computer running UNIX/Linux. Putty is one of a set of utilities that all work together to provide convenient connectivity between Windows and UNIX/Linux environments. Some of these utilities include:

  • Putty -- the SSH client
  • Pageant -- the authentication agent used with Putty
  • Puttygen -- the RSA key generation utility
  • Pscp -- the SCP secure file copy utility

Depending on your tasks, the above utilities are probably your minimum set of tools to make convenient connections and file transfers between a computer running Windows and a computer running UNIX/Linux.

Putty Configuration

Putty is able to store the configuration or connection profiles for a number of remote UNIX/Linix clients. Each of profile can be created and later edited by Right-clicking on a putty window header and choosing "New Session...". The minimum set of items that need to be configured for a given connection are:

  • Session
    • Host Name [login.anunna.wur.nl]
    • Saved Session name [your name for this connection]
  • Terminal
    • Keyboard
      • Backspace key -> Control-H
  • Connection
    • Data
      • Auto-login username [your remote username]
    • SSH
      • Auth
        • Private key file for authentication [pathname to your .ppk file]

Obviously, there are many other useful things that can be configured and customized in Putty but the above list should be considered a minimum. Please note that after making any change to a putty session you must explicitly save your changes.

Creating an SSH Key Pair

Puttygen is the utility used for creating both a .ppk file (private key) and the public authorized key information. Briefly, here are the steps needed to create a key pair:

  • Run (double-click) the Puttygen application
  • Click on "Generate"
  • Replace the comment with something meaningful -- maybe your name
  • Type in your passphrase (password) twice
  • Save the .ppk file in a secure location on your Windows computer
  • Use your mouse to copy the public key string then paste it into the ~/.ssh/authorized_keys file on the remote computer

Note: The full pathname of this .ppk file is used in the last step of Putty configuration as described above.

Using Pageant as an Interface for Putty

Pageant is a Putty helper program that is used for two main purposes:

  • Pageant is used to hold the passphrase to your key pair
  • Pageant is used as a convenience application to run a Putty session from any of your saved profiles

There is no configuration needed in Pageant. You simply need to run this program at login. Any easy way to do this is to create a shortcut in your startup folder that points to the Pageant executable. Once this has been done, every time you log in you will see a little icon of a computer with a hat in your taskbar. The first step in using this is to right-click on it and select "Add Key". Navigate to your .ppk file and select "Open". It will prompt you for your passphrase. At this point your passphrase has been conveniently stored for you so that when you use Putty to connect to your various remote computers, you won't have to type in your passphrase over and over again. The next step is to right-click on the Pageant icon again and select one of your saved sessions. If you have done everything correctly you will be logged right in so that you no longer have to type your passphrase.

Log on to worker nodes

In a complete emergency, it is then possible to log on to any of the worker nodes via the login node. Logging on to the worker nodes does not require password authentication, you should therefore not be prompted to provide a password. This is not normally allowed - be aware that running tasks outside of SLURM is prohibited, but so far there has not been any serious abuse of this. This is provided to allow you to get a little more insight in what your job is doing.

ssh [user name]@[node name]

For instance:

ssh dummy001@node049

Again, it is not permitted to run jobs outside the scheduling software (slurm). So logging on to a worker node is for analyses of running jobs only.


See also

External links