beautypg.com

2 using the system, Logging in to the system, Lvs login routing – HP XC System 3.x Software User Manual

Page 27: Using the secure shell to log in, Overview of launching and managing jobs, Lvs login routing using the secure shell to log in

background image

2 Using the System

This chapter describes the tasks and commands that the general user must know to use the system. It addresses
the following topics:

Logging In to the System (page 27)

Overview of Launching and Managing Jobs (page 27)

Performing Other Common User Tasks (page 29)

Getting System Help and Information (page 30)

Logging In to the System

Logging in to an HP XC system is similar to logging in to any standard Linux system. Logins are performed
on nodes that have the login role.

LVS Login Routing

The HP XC system uses the Linux Virtual Server (LVS) facility to present a set of login nodes with a single
cluster name. When you log in to the system, LVS automatically routes your login request to an available
login node on the system. LVS load balances login sessions across the login nodes and improves the
availability of login access. When you log in to the HP XC system, you do not have to know specific node
names to log in, only the HP XC system's cluster name.

Using the Secure Shell to Log In

Secure Shell (ssh) is the preferred method for accessing the HP XC system.

Typically, you access the HP XC system using the ssh command to get a login shell or to execute commands.
For example:

$ ssh user-name@system-name

user-name@system-name's password:

The ssh service also allows file transfer using the scp or sftp commands over the same port as ssh.

The typical r* UNIX commands, such as rlogin, rsh, and rcp, are not installed on an HP XC system by
default because of their inherent insecurity. The ssh command transfers all login and password information
in an encrypted form instead of the plaintext form used by the r* UNIX commands (as well as telnet and
ftp

).

If you want to use ssh without password prompting, you must set up ssh authentication keys. See ssh(1)
for information about using ssh authentication keys.

The Secure Shell is further discussed in

Enabling Remote Execution with OpenSSH (page 91)

.

You can bypass the need to enter a login and password each time you log in by updating the ssh keys.
The ssh_create_shared_keys command, used on a one-time basis, updates the appropriate ssh key
files in your $HOME/.ssh directory, provided:

You have a user account on the HP XC system.

Your home directory is mounted on all the nodes to which you log in or on which you launch jobs.

Ensure that you deny write permission on your home directory to the group and others; otherwise the ssh
command . The following command accomplishes that for you:

$ chmod go -w $HOME

Overview of Launching and Managing Jobs

This section provides a brief description of some of the many ways to launch jobs, manage jobs, and get
information about jobs on an HP XC system. This section is intended only as a quick overview about some
basic ways of running and managing jobs. Full information and details about the HP XC job launch
environment are provided in

Using SLURM

) and the LSF-HPC section of

Using LSF

) of this document.

Logging In to the System

27