skill-tree:use:1:5:b
Differences
This shows you the differences between two versions of the page.
Next revision | Previous revisionLast revisionBoth sides next revision | ||
skill-tree:use:1:5:b [2020/06/05 17:06] – external edit 127.0.0.1 | skill-tree:use:1:5:b [2020/06/25 19:56] – [Outcomes] kai_h | ||
---|---|---|---|
Line 2: | Line 2: | ||
# Background | # Background | ||
- | A HPC system is accessed remotely and has its own file systems that contain data and programs to execute. | + | An HPC system is accessed remotely and has its particular |
- | Learning the ways of general interaction with the remote system and tools involved is essential for newcomers. | + | Learning the ways of general interaction with the remote system and the tools involved is essential for newcomers. |
- | Users must connect to a HPC system typically using the Secure Shell (SSH) which then starts a shell and allows | + | Users must connect to an HPC system typically using the Secure Shell (SSH), which then starts a shell and allows |
- | When the user disconnects such a session is terminated. | + | When the user disconnects, such a session is terminated. |
- | Starting of a server-sided session that persists after disconnection enables to execute long-running programs remotely and allows | + | A server-sided session that persists after disconnection enables |
- | Data transfer between a local users system (e.g., desktop or laptop) and remote system requires special tools and allows even for interactive | + | Data transfer between a local user system (e.g., desktop or laptop) and a remote system requires special tools. Interactive |
- | Tools discussed are generally valid for user systems using Linux, Mac, and Windows | + | The tools discussed |
# Aim | # Aim | ||
Line 18: | Line 18: | ||
* Describe how SSH-authentication works | * Describe how SSH-authentication works | ||
- Password authentication | - Password authentication | ||
- | - Public-Key authentication | + | - Public-key authentication |
- The role of an authentication agent and the security implications | - The role of an authentication agent and the security implications | ||
* Generate an SSH public/ | * Generate an SSH public/ | ||
- | * Registering | + | * Register |
* Perform a remote login from Linux using SSH | * Perform a remote login from Linux using SSH | ||
+ | * Use SSH-agent or Windows equivalents | ||
+ | * Use Agent forwarding to connect to a third HPC system from an HPC system that you logged into with ssh from your computer | ||
* Know when to use and how to create a config file | * Know when to use and how to create a config file | ||
- | * Utilize tools to transfer data between local and remote system | + | * Utilize tools to transfer data between |
- scp | - scp | ||
- sftp | - sftp | ||
- rsync (-avz) | - rsync (-avz) | ||
- | * Describing | + | * Describe |
- | * Utilizing | + | * Utilize |
- | - creation | + | - Creation |
- | - detaching | + | - Detaching |
- | - resuming | + | - Resuming |
# Subskills | # Subskills | ||
skill-tree/use/1/5/b.txt · Last modified: 2020/07/19 21:27 by lucy