コンテンツにスキップ

2. Getting Started

2.1. Get an account

In order to use this system, it is necessary to register a user account.

Please refer Getting Accounts Page for details, as the procedure depends on your affiliation and program to apply.

2.2. Login

You need to upload the SSH public key to access the login node.

Please refer to TSUBAME portal User's Guide "SSH public key registration" for the operation of public key registration.

When you finish registration of the SSH public key, you can login to the login node. You will be redirected to one of the login nodes automatically by DNS round-robin.

Warning

As login nodes are shared with many users, please do not execute heavy operations there.

The use case is shown below.

Connect to the login node with SSH. And you can transfer files using SFTP.

login.t4.gsic.titech.ac.jp

To connect to a specific login node, log in with the following hostname (FQDN).

login1.t4.gsic.titech.ac.jp
login2.t4.gsic.titech.ac.jp

The following example shows a connection method with X transfer option enabled from Linux / Mac / Windows (Cygwin).

example) UserName gsic_user, and Private key: ~/.ssh/t4-key

$ ssh gsic_user@login.t4.gsic.titech.ac.jp -i ~/.ssh/t4-key -YC

Info

If you have the key pair in the standard path and with the standard file name, the -i option is not required.

In the first connection, the following message may be sent depending on the client's setting. In that case, enter yes.
(fingerprint type depens on your ssh version)

The authenticity of host 'login.t4.gsic.titech.ac.jp (131.112.133.51)' can't be established.
ECDSA key fingerprint is SHA256:CyUFJvJ9ExAE4QEM3BTcKHZ2g7Mw57NnCzbvqIM0ewo.
ECDSA key fingerprint is MD5:d0:99:50:c7:ae:d4:32:62:a6:b8:5e:c0:bc:11:37:96.
ED25519 key fingerprint is SHA256:l++Qi9lvnHIRQbQ+638MgWsZdSyZvdAWicwDsYq5KBI.
Are you sure you want to continue connecting (yes/no)?

2.2.1. Restrictions for heavy work in login nodes

As login nodes (login, login0, login1) are shared with many users at the same time, please do not execute programs which dominate CPU time. For parallel or long-time computation, please use compute nodes using qsub and qrsh commands, Followings are examples of judgment criteria. When the system administrator noticed your program is preventing others, it will be terminated even if it is permitted or not prohibited here,

Permitted operations

  • File transfer, compression, decompression (e.g., scp, sftp, rsync, tar)
  • Program compilation (If you consume lots of resources by parallel compilation etc., use compute nodes)

Prohibited operations

  • Calculation using commercial applications, freeware, or programs made by yourself
  • Execution of programs that exceeds 10 minutes (except for file transfer)
  • Execution of parallel programs (including python and MPI)
  • Execution of programs that consumes lots of memory
  • Execution of lots of processes simultaneously (e.g., parallel compilation)
  • Execution of server programs or auto-restart programs (e.g., VSCode Server, Jupyter Notebook)
  • Other operations which use lots of CPU resources

Info

Jupyter Lab and code-server(VS Code clone) can be invoked in compute nodes via Open OnDemand.

The login nodes have 4 GB memory limit per process. The system administrator will terminate programs with excessive loads without prior notice. If you want to execute such operations, or you feel login nodes are too heavy, please use compute nodes as interactive jobs via job scheduler.

2.3. Password Management

The user account of this system is managed by the LDAP, and authentication in the system is done by SSH key authentication.

For this reason, you do not need a password to use the compute nodes, but you will need a password to access the Windows/Mac terminal in the university, storage system.

If you need to change the password, please change from the TSUBAME4.0 portal. The rules of available passwords are described on the TSUBAME4.0 portal password setting page.

2.4. Changing default login shell

At the time of user registration, the login shell of each user account is /bin/bash. If you want to change the default login shell, please use the chsh command. The available login shells are bash, tcsh and zsh.

You can check the available login shell with the chsh command without arguments.

$ chsh
Usage: chsh shell(/bin/bash /usr/bin/zsh /usr/bin/tcsh).

Info

It may take one hour to complete the change at most.

The following is an example of changing the default login shell to tcsh.

$ chsh /usr/bin/tcsh
Please input Web Portal Password(not SSH Passphrase)
Enter LDAP Password: xxxxxx        <-- Enter your password.

Changing shell succeded!!

2.5. How to check TSUBAME points

You can check TSUBAME points with t4-user-info group point command as below.

$ t4-user-info  group point -g  TESTGROUP
gid     group_name                        deposit      balance
--------------------------------------------------------------
xxxx  TESTGROUP                               10          5000
In this case, current deposit point is 10, and remaining TSUBAME point of TESTGROUP is 5000.