Presentation is loading. Please wait.

Presentation is loading. Please wait.

Interacting with the cluster ssh, sftp, & slurm batch scripts

Similar presentations


Presentation on theme: "Interacting with the cluster ssh, sftp, & slurm batch scripts"— Presentation transcript:

1 Interacting with the cluster ssh, sftp, & slurm batch scripts
Host: Darren G. thifault

2 Ssh “the Secure shell” A Secure Shell (SSH) is a network security protocol used to protect a users data while operating on unsecured networks. A shell is the interface used to access an operating system (Windows, Linux, and OS X).

3 Why do we need data security?

4 In the digital world, data travels across networks in the form of signals called data streams.

5 Throughout networks, data streams encounter programs commonly referred to as Packet Sniffers.
A Packet Sniffers sole purpose is to intercept data, with malicious intent, and eavesdrop.

6 SSH protocols act as a line of defense to resist packet sniffers by encrypting data with an encryption key, which then requires a decryption key before it can be read.

7 So how do I get a key? You already have one! Its your ASURITE login and password. But you’ll first need to have your ASURITE account added to the HPC Users List before your key will work with the clusters key. You can have your account added by clicking the “CREATE AN ACCOUNT” icon located at the top of the ASU Research Computing home page;

8 WHERE DO I GO TO USE THE CLUSTER?
Anywhere you want! The benefit of using the SSH protocol is that you can access the cluster securely from any computer you'd like, whenever you'd like.

9 Ok, I’VE BEEN ADDED TO THE HPC USERs LIST, but how do I go about interacting with the cluster?

10 SSH terminals Windows: PuTTY Mac OS X: Built in Terminal
Linux: Built in Terminal

11 remote desktops Windows: NoMachine Mac OS X: NoMachine
Linux: NoMachine

12 WHAT IF I NEED TO TRANSFER FILES TO OR FROM THE CLUSTER TO A LOCAL COMPUTER?

13 Sftp: secure shell file transfer protocol
Utilizes the same security protocols as the Secure Shell (SSH) but also allows the user to transfer files securely over a network. Windows: PSFTP Mac OS X: Built in Terminal Linux: Built in Terminal

14 GUI-based SFTP: FileZilla

15

16 Now that you’re on the cluster, how do you use it?

17 Slurm (Simple Linux Utility for Resource Management): Linux based Workload Manager Software. Allocates and monitors a clusters resources (compute nodes). Batch Script: Text file which consists of a series of commands to be read and executed by Slurm.

18 The Batch Script, Finally!

19 Batch Scripts To create a batch script, complete the following in your terminal; Enter “nano example.sh” to open the text editor Enter the text as shown in the script below Press “Ctrl O” to save the file Press “Enter” to accept the file name Press “Ctrl X” to exit the text editor

20 To submit your script, enter the command “sbatch example
To submit your script, enter the command “sbatch example.sh” in the terminal.

21 A successfully submitted batch script will provide you with a job id #

22 Additional Script Options
Header: List of general commands to identify the user and request resources. A complete list can be found at . Body: Specific commands to call upon modules. This section is specific to each software. Do Not Include in Script parallel Header Body

23 reminder Any time you use an executable file you should either be submitting a batch script or initiating an interactive session. Failure to do so will result in your file being executed on the login nodes. You can monitor the clusters status in real time at the ASU Research Computing website .

24 Questions?


Download ppt "Interacting with the cluster ssh, sftp, & slurm batch scripts"

Similar presentations


Ads by Google