Access

The supercomputer system consists of 3 computing system and one storage. Please refer to IIMC HP for more details.

Supercomputer system can be accessed via SSH key authentication only. You must generate a public/private key pair and register a public key via the User Portal. Password login is not available, make sure to register a public key in advance.

Login process is shown as below. For the details of each operating system, see On Windows or On Mac and Linux.

Host names of each system type are listed in the following table. To log in to the supercomputer, use both the login name(user ID) included in an approval letter for supercomputer use, and the private key paired with the public key you registered via the user portal.

System Host Name (FQDN) Notes
A (Camphor2) camphor.kudpc.kyoto-u.ac.jp Two login nodes help distribute the load. This is available to system A users only.
B (Laurel2) laurel.kudpc.kyoto-u.ac.jp Three login nodes help distribute the load.
B (with SAS) sas.kudpc.kyoto-u.ac.jp
C (Cinnamon2) cinnamon.kudpc.kyoto-u.ac.jp You can login to the same login nodes as the system B with automatically loaded the environment for the system C.

When a GUI is not required, you can log in to the supercomputer using an SSH client.

Windows does not come with an SSH client. You must install an SSH client and create a public/private key pair, and then register the public key via the user portal. The following procedure describes how to log in using the most popular SSH client, PuTTY.

  1. Installing PuTTY
  2. Generating Key Pair and Registering Public Key
  3. Logging In On Windows

Mac and Linux generally come with an SSH client. You can generate a key pair using a proper command via SSH, and you can log in to the supercomputer after registering a public key via the user portal.

  1. Generating Key Pair and Registering Public Key
  2. Logging In On Mac and Linux

PC X server software, Exceed onDemand is available. In Exceed onDemand, traffic is reduced using a data compression technique. It allows users to get fast remote access. It does not support a key authentication with SSH, so you need to set up port forwarding.

The following procedure describes how to do portforwarding with PuTTY, which is a relative simple way.

  1. Installing PuTTY (Not required if Putty is already installed.)
  2. Generating Key Pair and Registering Public Key (Not required if you have logged in to System A, B, C before.)
  3. Installing Exceed onDemand
  4. Logging In With Exceed onDemand

The following procedure describes how to port forward with the SSH command.

  1. Generating Key Pair and Registering Public Key (Not required if you have logged in to System A, B, C before.)
  2. Installing Exceed onDemand
  3. Logging In With Exceed onDemand

When transferring files to or from the supercomputer, you can use SCP or SFTP that are protocols to transfer files using SSH. SCP stands for Secure CoPy, SFTP stands for Secure FTP. To transfer files, you must log in with a public/private key pair that are registered via the user portal.

Windows does not come with an SCP or an SFTP client, so you need to install it first. The following procedure describes how to transfer files using the most popular SCP client, WinSCP.

  1. Installing WinSCP
  2. Generating Key Pair and Registering Public Key (Not required if you have logged in to System A, B, C before.)
  3. Transferring Files On Windows

The following procedure describes how to transfer files with the SCP command.

  1. Generating Key Pair and Registering Public Key (Not required if you have logged in to System A, B, C before.)
  2. Transferring Files on Mac and Linux.

Silver Bullet is a data transfer software which is capable of high-speed communication over long distances, powered by SSBP communication protocol via UDP. If you want to use Silver Bullet on the supercomputer system, please contact to our programming support desk. Silver Bullet client works on your Windows, Mac, and Linux.

Our supercomputer system has two login nodes on the system A, and three login nodes in common between the system B and C. And each system is load balanced by DNS round robin. When a failure occurs in some login nodes out of those, a login attempt with DNS round robin can fail. In such case, please use a specific hostname below.

Any failures will be notified to users on the Current Trouble. We inform the unavailable host name when the failure of some of login nodes occurs, so please specify any other host name except that. Notifications can sometimes be delayed depending on the circumstances. We appreciate for your understanding.

Host names of login nodes that correspond to host names for DNS round robin are listed below.

System Host Name for DNS Round Robin (FQDN) Host Name of Login Node (FQDN)
A camphor.kudpc.kyoto-u.ac.jp camphor1.kudpc.kyoto-u.ac.jp
camphor2.kudpc.kyoto-u.ac.jp
B
C
laurel.kudpc.kyoto-u.ac.jp laurel1.kudpc.kyoto-u.ac.jp
laurel2.kudpc.kyoto-u.ac.jp
laurel3.kudpc.kyoto-u.ac.jp
B (with SAS) sas.kudpc.kyoto-u.ac.jp * laurel2.kudpc.kyoto-u.ac.jp

* Only one login node is implemented when using SAS, therefore the user will be unable to login when this node is in failure.

Note that you need to maintain the confidentiality of your User Portal password and private key passphrase(s) for login authentication. Therefore, when creating a password or passphrase, you must make it strong using a string of characters to prevent unauthorized persons from guessing easily your account information.

The following websites help you to create strong passwords and passphrases (Japanese version only)


Copyright © Academic Center for Computing and Media Studies, Kyoto University, All Rights Reserved.