 restart the recording. Okay, so now we are at the second module, which is connecting to Triton or whatever cluster you may have. So the traditional way of interacting with a cluster is via a terminal, which is why we had the Linux shell crash course Friday. And secure shell or SSH is the most common way of doing that, which will work on almost any cluster. Some clusters have their own ways of getting a terminal. For example, maybe either Jupyter or virtual desktops or things like that. But anyway, you're going to get there somehow. So if you are not at Alto, this will be different. So though at least be a different hostname you need to connect to in order to to get access, you'll need to look at your own information for this. There might be some other different hops you have to go through for security. At Alto, your account needs to be activated for Triton. So it's the same account as the normal Alto account, but we need to set it up for connecting to the cluster. So hopefully you've already done that by now because if you haven't, it will be a little bit too late. Just a quick, by the way, mention that we forgot at the start that in the Zoom meeting that Enrico is hosting, there's probably going to be help available. Like if you have problems connecting and stuff like that, then you can ask there and Enrico will figure out how to solve the problem. So if you encounter some connection problems or something like that, you can't access the cluster right now, then let Enrico know. Yeah. Okay. Should we give a quick demonstration on the connection just to make sure everyone's on the same page and have a demo? So our general plan here is we'll demonstrate what to do and then we'll have a break where you can go to the Zoom meeting and then you can get hands-on help if needed. And you can talk about the different local sites and things like that. Yeah. Just like I added that the reason for these hops and skips and jumps is that like the secure shell, even though it's secure, we don't want to reveal the whole cluster interface to the wider internet. So that's why you have to come into the alter network so that you can access Triton. From VEP and I think I'm not completely certain does it work out of the box that you can from the VEP and connect to Triton. If you're connected to VEP network, but at least from the jump hosts like Delta and so forth, you can access Triton. So basically, you have to go through some other machine in order to get to the alter network before you can access Triton. Yes. Okay. So Seema, would you like to demonstrate connecting or should I? Maybe you should because I think I have so many custom variables that I might not have get the user experience. Okay. So here we go. This is a shell on my own computer. And in order to connect from outside the alter network, first, we have to go through a particular host which is cosh.alto.v. So I'll SSH to cosh.alto.v, but I need to give my username like this. So I think this will work. So I have hidden my existing, I've removed my existing SSH configuration. So we see it's requesting, it wants to verify key fingerprint. So I type yes here, which means that it will store the identity of cosh. And every time I connect in the future, it will be sure that I'm connecting to the same computer, which is good for security. So what most people will do is say yes once when they're on a secure network, and then when they're traveling or something, they can know they are safe. So I type my password. And what is going wrong here? Am I typing my password wrong? I hope I don't get myself locked out of the machine. I hope you're enjoying the demo effect here. See what might be good if you're preparing to do this as an emergency. Yeah, just move my SSH folders to the plate. Yeah, if you can see my screen, then show my screen. As you can see, we're doing this live. Yeah. Yeah, so here is that, here is my terminal. And let's try the same thing as Richard. So let's go to cosh.alto at the time. Yeah, I got a better access. There we go. I don't know what happened. But yeah, so now I'm at the cosh, but this is not yet part of Triton. So this is Altos, Altos ITs. So you can see Altos University IT services over here. So it means that it's Altos IT that has this server under their control. So in order to get to Triton, we need to take another leap. So to Triton.alto.fi. And now it asks for the fingerprint. I say yes. And well, I have the settings so that it automatically allows me to connect there. But in your case, it would ask for a password. But when you type the Altos password to the password question, you should get to this system and you should see this beautiful ASCII art that we have. And now you're in Triton. Like after you have taken these two leaps, you're in Triton and you're here. And yeah. Yeah. And there's fancier ways of doing this as well. So technically doing a SSH hop and then typing your password in again on the other computer isn't the best for security. But if you read through our hints here, you can see some more ideas. For example, this dash j option. Yes. And you can also set up your like that we have tutorial on how to set up the how to set up an SSH key so that you don't have to type your password or every time you make a connection. But it will use this key that's been opened for a certain amount of time. So basically once you log into your computer, you open this key and then you connect to Triton and then you can keep it open for hours. And after you finish your work, it will close the key and you don't anymore have to type your password over and over again. Yeah. So if you're on Mac, SSH is installed by default, same as Linux. If you're on Windows, there's different options. And we went over some of these in the connection session Friday. Putty is a common program to use to get the SSH connection. Let's see. Yeah. So yeah, here are a few examples on how you can do the connection. So you can use this jump host to tell the shell to do a jump through one of the hosts. And then well, in Mac, you can use the SSH in Windows, like Richard said, the parties. And over here, we have links to documentation on how to do these advanced SSH options so that you don't have to write these. Yeah. I guess I'd strongly recommend you make a SSH key that can be used to log in without a password. And that would save you from the problem I just had of typing my password wrong three times and getting locked out. SSH is a super advanced program that can take its own hour long course someday. But anyway, let's see. So once you're connected, there are some things to do. So we can change your shell to bash, which shouldn't be needed anymore. If you type echo dollar shell, it should say bin bash. So what is this shell? Can you? Yeah. So the shell is basically the thing that does the interaction with the operating system. So we went over bash a bit more on Friday, but there's different options besides bash. And it used to be before 2018. The default shell at Alto was ZSH, which is more powerful, but had some slight quirks and some things didn't quite work out of the box with it. And to, well, to make things a bit more standard, we recommended people change things to bash. So if your account is not older than 2018, this will already be what we see here. Okay. So there's other options for connecting to Triton. For example, you can use jupiter.triton.alto.fi to get a shell connection, or you can use the virtual desktops vdi.alto.fi to log in and then use SSH from there. But I think we don't really need to go into these right now. So I think now is a time to go to the breakout sessions. So what should you do right now? So we'll have a maybe 10 minute break to let things get going. And you can go to your respective Zoom sessions. And here's what we would like you to do. Let's see. I will put this in the bottom of HackMD. So let's see. Hands-on sessions. So connect to the cluster and verify your shell. So this will be a little bit annoying to some people because some people may need to a little bit more time here. And most of you have probably already done this. But anyway, we need an opportunity for you to investigate what's happened at your local sites. So let's take a, how long of a break do you think is good? Maybe 10 minutes break. Yes. Yeah. So maybe at 15 to 1, like it's almost, like that's probably the better time. So 30 minute break. 13. Okay. But just for the users, if you, well, our first time using HBC resources, and you think that, okay, this shell thing looks pretty scary. So do I need to start learning matrix, like reading code that's dropping next? That's not the whole reality. But learning shell is very important because that's a very helpful tool to get access to the cluster and work with certain workflows. So many things you can do on other ways as well, like Richard mentioned, VDI, the Jupyter notebook. But it's a good idea to get accustomed to the idea of taking a shell connection to Trigen because that in many cases, that's the best way of working there. So don't let it be like about barrier of entry. Okay, so let's send you to the zoom and we'll combine this with a general break and continue. So I just saw something here. So if you can't get into the cluster, what should you do? So at Alto, you can ask directly in the zoom. If you're at another university, you need to find whatever support email is there or chat thing. Yes. We can answer more questions in the hack and D. So yeah, let's go to the break. Yeah. Okay. Yep.