Hp XC System 2.x Software Uživatelský manuál Strana 27

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 154
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 26
2
Using the System
This chapter describes tasks and commands that the general user must know to use the system .
It contains the following topics:
Loggingintothesystem(Section2.1)
Setting u p the user environment (Section 2.2)
Launching and m anaging jobs (Section 2.3)
Performing some common user tasks (Section 2.4)
Getting help (Section 2.5)
2.1 Logging in to the System
Logging in to an HP XC system is similar to logging in to any standard Linux system. Logins
are performed on nodes that have the login role. Secure Shell (ssh) is the preferred method
for accessing the H P XC system.
2.1.1 LVS Login Routing
The HP X C system uses the Linux Virtual Server (LVS) facility to present a set of login nodes
with a single cluster name. When yo u log in to the system, LVS automatically routes your login
requesttoanavailableloginnodeonthesystem. LVS load balances login sessions across the
login n odes and improves the availability of login access. When you log in to the HP XC system,
you do not have to know specific n ode names to log in, only the HP XC system’s cluster name.
2.1.2 Using ssh to Log In
TologintoanHPXCsystem,youmustuseSecureShell(ssh). Typically, you access the H P
XC system using the ssh com mand to get a l ogin shell or to execute commands. For example:
$ ssh user-name@system-name
user-name@system-name’s password:
The ssh service also allo ws file transfer usi ng the scp or sftp commands over the same
port as ssh.
The typical r* UNIX comman
ds, such as rlogin, rsh,andrcp,arenotinstalledonanHP
XC system by default becau
se of their inherent insecurity. The ssh command transfers all login
and password i nform atio
n in an e ncrypt ed form inst ead of the plaintext form used by the r*
UNIX commands (as well as
telnet and ftp).
If you want to use ssh w ith out password p ro mpting, you must set up ssh authentication keys.
Refer to the ssh
(1) manpage for information a bo ut using ssh authentication keys.
ssh is further discussed in Section 10.1.
2.2 Configuring Your Environm ent with M odulefiles
The HP XC system s upp orts the use of Mod ules software to make it easier to configure and
modify the your environment. Modules software enables dynamic modification of your
environment by the use of modulefiles. A modulefile contains information to configu re the
shell for an application. Typically, a modulefile contains instructions that alters or sets shell
Using the System 2-1
Zobrazit stránku 26
1 2 ... 22 23 24 25 26 27 28 29 30 31 32 ... 153 154

Komentáře k této Příručce

Žádné komentáře