Changes

Jump to: navigation, search

SPO600 Servers

3,394 bytes added, 16:41, 21 February 2020
Sudo Access
[[Category:SPO600]]
{{Admon/important|Backup Your Data|These computers are NEVER backed up. Please save all important files on other storage. '''These machines may fail, be removed , be upgraded, or be reinstalled at any time.'''}}
In [[SPO600]], remote access to servers is provided for learning and project work. It is recommended that you also set up [[SPO600 Host Setup|a personal Linux system]].
 
== Preparatory Steps ==
In order to gain access to these computers, you must send an [[SSH]] key to your [[User:Chris Tyler|professor]].Please follow these instructions exactly:
# Follow the steps outlined under [[SSH#Using_Public_Keys_with_SSH|Using Public Keys with SSH]] to create your key.
# Copy the public key (<code>id_rsa.pub</code> or <code>id_dsa.pub</code>) to a file named <code>''yourUserId''.pub</code> -- for example, if your Seneca chosen user ID is "jldoe", save the key in the file <code>jldoejdoe.pub</code> using a command such as: <code>cp ~/.ssh/id_rsa.pub ''jldoejdoe''.pub</code># Attach that file to an e-mail message and send it to [mailto:chris.tyler@senecacollege.ca chris.tyler@senecacollege.ca] including with the course code subject line "SPO600Key" somewhere in the subject line.
An account will be created within a few work days of sending the key.
== Available Servers ==
 
{{Admon/important|Server Changes|The server configurations have changed several times changed -- previous mentions of these systems by name may have referred to different hardware. Note that servers may be added or removed as the semester proceeds.}}
 
=== AArch64: aarchie ===
The current [[ARMv8]] A main AArch64 system is available, known as ''aarchie''. This machine has a lot of weak cores. You can access this system at the hostname aarchie.cdot.systems; if you're using a command-line ssh system, you can access aarchie with a command such as this:  ssh '' or username''@aarchie.cdot.systems  === AArch64: bbetty === Another type AArch64 system is available as 'archie'bbetty''. This machine has a moderate number of low-medium cores. This is a system that is currently located inside the [[EHL]]. To connect to this system, you have to go through the EHL gateway on port 2200.
If you're using a command-line ssh system, you can issue a command such as this:
ssh -p 2200 ''username''@ehl.cdot.systems
=== x86_64: xerxes ===
Our x86_64 server === AArch64: ccharlie === Another AArch64 system similar to bbetty is known as named '''xerxes'ccharlie''. This is a system that is currently located inside the [[EHL]]. To connect to this system, you have to go through the EHL gateway on port 2205.
If you're using a command-line ssh system, you can issue a command such as this:
 
ssh -p 2205 ''username''@ehl.cdot.systems
 
 
=== AArch64: israel ===
 
A different AArch64 system is ''israel''. This machine has a good number of mid-level cores. This system is located outside of the EHL and can be reached directly:
 
ssh ''username''@israel.cdot.systems
 
 
=== x86_64: xerxes ===
 
The x86_64 server system is known as ''xerxes''. If you're using a command-line ssh system, you can access xerxes with a command such as this:
ssh ''username''@xerxes.cdot.systems
== Simplified SSH Access ==
If you're using OpenSSH (the ssh client used on most Linux systems and other platforms), you can simplify complex ssh command lines by placing host connection details in the file <code>~/.ssh/config</code>: <!-- Host "aarchie" hostname "ehl.cdot.systems" user "YourUserID" port 2200 Host "bbetty" hostname "ehl.cdot.systems" user "YourUserID" port 2202 Host "ccharlie" hostname "ehl.cdot.systems" user "YourUserID" port 2205 Host "xerxes" hostname "xerxes.cdot.systems" user "YourUserId" -->
Host "aarchie"
hostname "aarchie.cdot.systems"
user "YourUserID"
Host "bbetty"
hostname "ehl.cdot.systems"
user "YourUserID"
port 2200
Host "ccharlie"
hostname "ehl.cdot.systems"
user "YourUserID"
port 2205
Host "israel"
hostname "israel.cdot.systems"
user "YourUserID"
Host "xerxes"
hostname "ehlxerxes.cdot.systems" user "YourUserIdYourUserID
Once you have added these lines (inserting your user ID where appropriate) and set the permission on that file (<code>chmod 0600 ~/.ssh/config</code>) you can use these commands to access the servers:
ssh aarchie
ssh bbetty
ssh ccharlie
ssh israel
ssh xerxes
{{Admon/important|Common You can similarly configure simplified access in most other SSH Problems|Your ssh private key must be in your <code>~/.ssh</code> directory and have correct permissions (0600)client programs.  == SSH Access from Other Client Systems == If your you wish to access the servers from additional computers, you can append the SSH public key is not named keys from those computers to the <code>~/.ssh/id_rsaauthorized_keys</code>, your SSH client may not automatically find it. You can specify the identity (private key) file using the <code>-i</code> argument to the SSH command.}} 
== Sudo Access ==
{{Admon/caution|Danger! Use Superuser privilege at your Own Risk.|Note that the use of the superuser account via <code>sudo</code> removes almost all restrictions on what you can do. It is easily possible for you to completely destroy the operating system! Take your time, double-check your commands, and if in doubt, ask. Be aware that your actions may affect other users and vice-versa.}}
{{Admon/caution|Do Not Build or Install Software Except Via RPM (dnf/yum) or DEB (apt)|Do not build or install software as the root user (using <code>sudo</code>), except in RPM or DEB form using the <code>dnf</code>/<code>yum</code> or <code>yumapt</code> commands(as appropriate to the system). Building or installing software as root may overwrite system files and be very difficult to track down.<br /><br />It is OK to install software into your own directories (e.g., <code>~/bin</code> or <code>~/local</code>), which can be done without root privilege.}}
In order to use <code>sudo</code>, you will need to know your password. An initial random password is provided in the file <code>~/password.txt</code> (which is note that your password will be different on each server). Feel free to change this with the <code>passwd</code> command -- not by editing the file, which is provided only for your information.!
== Multiuser Access ==
Remember that these machines are multi-user systems. Use the <code>w</code> or <code>who</code> commands to see who else is using them; you can also try using the <code>write</code> command to communicate with another user if required.
 
 
== OS Versions ==
 
Note that the servers may have different operating system releases.
 
== Backup Your Accounts ==
 
These accounts are ''never'' backed up, and the machines may fail, lose data, or be reinstalled without warning at any time. Please back up your work frequently by copying it to another system or storage device.
 
 
== Common SSH Problems ==
 
With the OpenSSH client:
# Your ssh private key must be in your <code>~/.ssh</code> directory (which must have 0700 permission) and the private key file must have 0600 permissions -- no more and no less.
# If your SSH public key is not named <code>~/.ssh/id_rsa</code>, your SSH client may not automatically find it. You can specify the identity (private key) file using the <code>-i</code> argument to the SSH command.}}
 
With other SSH clients:
# Your key must be in OpenSSH format when you send it to your professor; this format is used by the default SSH client on Mac OS/X and Linux as well as PuTTY. If it is in SSH2 format, used by some other client programs, you can convert it with this command on a Linux system with OpenSSH (such as Matrix):
 
ssh-keygen -i -f ~/.ssh/''SSH2_PUBLIC_KEY_FILE''.pub > ~/.ssh/''OPENSSH_PUBLIC_KEY_FILE''.pub
 
Your professor will do this automatically as part of the key processing; however, you will need to manually perform this step for any keys that you append to your <code>~/.ssh/authorized_keys</code> file(s).
== Disconnect/Reconnect Ability ==
The [[Screen Tutorial|screen]] utility provides disconnect/reconnect capability, which is very useful for unstable network connections, long interactive operations, and changing your work location.

Navigation menu