Logging In

Here, you’ll find DNS names for our login nodes, sorted by cluster, their hostkey fingerprints and some examples showing how you can connect from the command line.

The Login Nodes

Names and Aliases

The proper DNS names of all frontend nodes and convenient aliases are provided in the table below. For square brackets with a number range, substitute any number in the range.

ClusterCluster island/PurposeAliasesLogin node/s
SCCloginlogin-mdc.hpc.gwdg.de
login-mdc[1-2].hpc.gwdg.de
gwdu[101-102].gwdg.de (deprecated)
gwdu[101-102].hpc.gwdg.de
transfertransfer-mdc.hpc.gwdg.de
transfer-scc.gwdg.de
gwdu108.gwdg.de (deprecated)
gwdu108.hpc.gwdg.de
CIDBN (restricted)login-dbn02.hpc.gwdg.de
sa/hh (restricted)ngs01.hpc.gwdg.de
NHREmmy Phase 2glogin-p2.hpc.gwdg.de
glogin.hpc.gwdg.de
glogin.hlrn.de (deprecated)
glogin[3-8].hlrn.de (deprecated)
glogin[3-8].hpc.gwdg.de
Emmy Phase 3glogin-p3.hpc.gwdg.deglogin[11-13].hpc.gwdg.de
Grete, REACT, KISSKIglogin-gpu.hpc.gwdg.deglogin[9-10].hpc.gwdg.de
Note

The login nodes marked as restricted in the table above are restricted to specific research groups.

Aliases marked as deprecated will eventually disappear and stop working.

The SCC login nodes are not reachable directly from outside GÖNET if you are not using VPN. You may have to use the NHR login nodes as jumphosts with the -J command line switch or the ProxyJump option. It is not recommended to directly ssh to them as an SCC user, since your home and/or scratch directories are not reachable from there and you will receive respective warnings and error messages.

Info

The login nodes for each phase of NHR match the CPU architecture and default software stack of their respective compute nodes. Compilers, by default, will either compile for the most generic version of the host’s architecture (poor performance) or for the exact CPU the host is running (which could then crash and/or have sub-optimal performance on a compute node with a different CPU architecture).

SSH key fingerprints

When first connecting, SSH will warn you that the host’s key is unknown and to make sure that it is correct, in order to avoid man-in-the-middle attacks. The following table contains all SHA-256 fingerprints of the host keys of the login nodes and jumphosts, arranged by key algorithm:

Hostkey fingerprints
Node(s)sha256 fingerprint ed25519
gwdu[101-102].hpc.gwdg.de
login-dbn02.hpc.gwdg.de
glogin[1-13].hpc.gwdg.de
ngs01.hpc.gwdg.de
SHA256:PPK0aO2QZ/k4duUx18Pp5AOKG/gFEBHgw/bl8vg9oJk
gwdu108.hpc.gwdg.deSHA256:Vylg/10HwDRxPUuOarcngRFH2jmDlnxWOqte7rnR3OI
Node(s)sha256 fingerprint rsa
gwdu[101-102].hpc.gwdg.de
login-dbn02.hpc.gwdg.de
glogin[1-13].hpc.gwdg.de
ngs01.hpc.gwdg.de
SHA256:EJyZLROEobVuCm2hSeEhcAIEB80PbZ85U4u4XNnvM4k
gwdu108.hpc.gwdg.deSHA256:RMgbCZ58sWYfZZv5T2DE9bOAFfN06xm9aMw1MjzjvLM
Node(s)sha256 fingerprint ecdsa
gwdu108.hpc.gwdg.deSHA256:sIJNEepmILeEq/7Zqq4HCtpTM8L98arWTny5EiAX+gI
Note

The SSH key fingerprints are not the public keys themselves, but a checksum of them. Fingerprints are a compact fixed-size way to verify SSH keys, as the keys themselves can be large enough to be unwieldy. The lines in ~/.ssh/known_hosts on your client machine store the SSH public keys of each known server whose key has been accepted, rather than the fingerprints. Do not copy and paste SSH key fingerprints into ~/.ssh/known_hosts.

Note

When you connect to a login node for the first time or when its SSH key changes, your SSH client will show you the new fingerprint (and the old one if it changed). If it is your first time connecting to the node, it will ask you to check the fingerprint and accept it if it’s correct. If it has changed, it will tell you that you need to delete the old key in ~/.ssh/known_hosts. With OpenSSH’s client, it will print the line number of the line to be deleted and often a command you can use to remove the offending line/s more easily. You can also use ssh-keygen -R to remove outdated hostkeys.

For example: ssh-keygen -R glogin.hpc.gwdg.de
(You might have to repeat the command with any other combination of aliases and hostnames you have used in the past, i.e. glogin9.hpc.gwdg.de, glogin.hlrn.de, etc.)

After that, you’ll be able to confirm the hostkey on your next login with the fingerprints from the table above.

Example Logins with OpenSSH

Logging into an SCC login node

With the .ssh/config file setup as in the Simple configuration examples, you can just run ssh SCC. Your terminal session could look something like

jdoe1@laptop:~> ssh SCC
Enter passphrase for key '/home/jdoe1/.ssh/id_ed25519':
Last login: Wed Mar 20 09:05:45 2024 from 10.45.123.45
Loading software stack: scc-lmod
Your current login node is part of login-mdc
gwdu101:90 15:58:26 ~ >

When using a jumphost, you may have to enter the passphrase for your private key twice (once for the jumphost and once for the actual login node).

If you are not using a configured Host entry (not recommended) or want to know how to connect “manually” (useful for troubleshooting), here is how you would do so (using a jumphost):

ssh jdoe1@login-mdc.hpc.gwdg.de -i .ssh/id_ed25519 -J jdoe1@glogin.hpc.gwdg.de

Or, if you are using an older SSH client:

ssh jdoe1@login-mdc.hpc.gwdg.de -i .ssh/id_ed25519 -o ProxyCommand="ssh -i .ssh/id-rsa -W %h:%p jdoe1@glogin.hpc.gwdg.de"

Make sure to replace jdoe1 with your actual username.

Logging into an NHR Grete login node

With the .ssh/config file setup as in the Simple configuration examples, you can run just ssh Grete. The terminal session could look something like

jdoe1@laptop:~> ssh Grete
Enter passphrase for key '/home/jdoe1/.ssh/id_ed25519':
Last login: Wed Mar 20 09:05:45 2024 from 123.4.56.78
Loading software stack: nhr-lmod
Found scratch directory, setting $WORK to '/scratch/usr/nimjdoe'
Found temporary files directory, setting $TMPDIR to '/scratch/tmp/nimjdoe'
 __          ________ _      _____ ____  __  __ ______   _______ ____
 \ \        / /  ____| |    / ____/ __ \|  \/  |  ____| |__   __/ __ \
  \ \  /\  / /| |__  | |   | |   | |  | | \  / | |__       | | | |  | |
   \ \/  \/ / |  __| | |   | |   | |  | | |\/| |  __|      | | | |  | |
    \  /\  /  | |____| |___| |___| |__| | |  | | |____     | | | |__| |
  _  \/ _\/  _|______|______\_____\____/|_|  |_|______|____|_|__\____/
 | \ | | |  | |  __ \     ____    / ____\ \        / /  __ \ / ____|
 |  \| | |__| | |__) |   / __ \  | |  __ \ \  /\  / /| |  | | |  __
 | . ` |  __  |  _  /   / / _` | | | |_ | \ \/  \/ / | |  | | | |_ |
 | |\  | |  | | | \ \  | | (_| | | |__| |  \  /\  /  | |__| | |__| |
 |_| \_|_|  |_|_|  \_\  \ \__,_|  \_____|   \/  \/   |_____/ \_____|
                         \____/

 Documentation  https://docs.hpc.gwdg.de   Support nhr-support@gwdg.de
PARTITION    NODES (BUSY/IDLE)     LOGIN NODES
grete:shared       53 /    9     glogin-gpu.hpc.gwdg.de
grete-h100          4 /    0     glogin-gpu.hpc.gwdg.de
Your current login node is part of glogin-gpu
[nimjdoe@glogin9 ~]$

Logging into a specific node

This is essential if one needs to

  • Reconnect to a tmux or screen session
  • Reconnect to a session started by an IDE over SSH
  • Use a dedicated login node for one’s research group (for those with such a login node)
  • Use a login node with particular hardware

With the .ssh/config file setup as in the Advanced configuration examples for all nodes configured individually, you would run just ssh NODE where NODE is the name of the node or a suitable alias.