Every group or project requires designated administrators, whether they're principal investigators (PIs) or chosen members. These administrators play a crucial role in managing encryption, onboarding, offboarding, and more.
It is recommended that PIs delegate and share these administrative responsibilities with other members of their team.
Please contact us to designate the appropriate people for the role.
Ask your PI or the designated Group/Project administrators to request an account via the ticket system at m3c-support@zdv.uni-tuebingen.de including the following information:
Once we have this information, we will create your account and notify you by email.
Afterwards you will be able to SSH into the login nodes using a command such as
ssh <your_username>@l1.m3c.uni-tuebingen.de
Information on how to execute computations on the M3 Cluster can be found in the Slurm and Storage sections.
Below are the SSH host key fingerprints of our login nodes. Please ensure you are connecting to the correct host:
l1.m3c.uni-tuebingen.de (193.196.25.97, 2001:7c0:800:1:be24:11ff:fec3:1e15) :
l2.m3c.uni-tuebingen.de (193.196.25.98, 2001:7c0:800:1:be24:11ff:feea:b380) :
Be aware that our login nodes are resource-constrained and are limited to 40G RAM and 4 CPU cores per user. You should run your calculations on the compute nodes and not on a login node.
ssh-keygen -t ed25519 -C "your_email@example.com". This command generates an SSH key with your email as the comment./home/your_username/.ssh/ folder by default and start with "id_".ssh-keygen does not support ed25519 key pairs, simply use ssh-keygen -t rsa -b 3072 -C "your_email@example.com" instead..pub extension) to yourself. Only the public part of your key, identified by the .pub extension, needs to be shared.~/.ssh/authorized_keys.~/.ssh/ , the ssh command will not find it automatically. Instead you need to specify it as an argument (e.g. ssh -i /path/to/your/private.key your_username@l1.m3c.uni-tuebingen.de - replace /path/to/your/private.key with the appropriate path on your PC) or define it permanently in the ~/.ssh/config as described below.chmod 600 /path/to/your/privat.key. If your file permissions are to open the ssh client refuses to use the key.Most Windows versions (10+11) also contain ssh-keygen . If yours does not have it, you can easily find tutorials on how to generate ssh keys by searching the web.
The process may vary slightly depending on the specific tools (e.g. PuTTYgen or MobaXterm) or software you're using.
Should you have trouble logging in please report the complete output of
date ; ssh -v your_username@l1.m3c.uni-tuebingen.de
to m3c-support@uni-tuebingen.de.
Once you have access, you can manage your keys by inspecting the ~/.ssh/authorized_keys file.
It saves time to define aliases and permanently set parameters for your SSH connection. This can be done by inserting the following snippet into the config file ~/.ssh/config (on Windows the location is $HOME\.ssh\config) on your PC:
Host m3l1
Hostname l1.m3c.uni-tuebingen.de
Host m3l2
Hostname l2.m3c.uni-tuebingen.de
Host m3l*
User your_username
IdentityFile /path/to/your/private.key
ForwardAgent yes
If the config file does not exist yet, simply create it. Replace your_username and /path/to/our/private.key with the appropriate values for yourself. The option ForwardAgent yes enables SSH agent forwarding, allowing you to log in to compute nodes allocated by your jobs.
After modifying the config file you should be able to log in by using the aliases m3l1 and m3l2,
e.g. ssh m3l1 will be sufficient to access the first login server.
The config file can be used to configure multiple SSH connections and allows to specify a lot of other parameters. See man ssh_config or search for more information online.
In some cases the operating system of your PC might not start the ssh-agent automatically.
E.g. ssh-add -l reports something like Could not open a connection to your authentication agent on your PC.
While you do not always need it for the M3 Cluster it can be practical.
Here are some ways to start it (automatically):
$ systemctl --user [status|start|enable] ssh-agent
use enable if you want to automatically start the service at every boot.ssh-agent on the webpage.There might also be other program and keyrings which can act as ssh-agent, which require their own specific configuration. E.g. gpg-agent ...