Difference between revisions of "Rocky Access Form"

From NIMBioS
(Created page with "= Where is the form? = https://cloud.nimbios.org/apps/forms/Q9neqZd5TF9sGDwt = Form Fields = == Name == Please provide your full name. == Email == Your email address is how we'll contact you. == UTK NetID == If you are affiliated with University of Tennessee - Knoxville, please enter your NetID. You can find more information about UTK NetID at: https://oit.utk.edu/accounts/netid/ == Association (Lab, Dept, etc) == Your primary association for access to Ro...")
Tag: visualeditor-switched
 
 
(16 intermediate revisions by the same user not shown)
Line 1: Line 1:
= Where is the form? =
= About the Rocky Access Form=
https://cloud.nimbios.org/apps/forms/Q9neqZd5TF9sGDwt


= Form Fields =
The Rocky Access Form is required to gain access to the Rocky Compute or the Quarrel Storage Cluster.


The form can be accessed at the following location:
https://cloud.nimbios.org/apps/forms/LnRT6m7fBDXpg94G


== Name ==
= Rocky Access Form's Fields =
 
 
=== Name ===


Please provide your full name.
Please provide your full name.




== Email ==
=== Email ===


Your email address is how we'll contact you.
Your email address is how we'll contact you.




== UTK NetID ==
=== UTK NetID ===


If you are affiliated with University of Tennessee - Knoxville, please enter your NetID.   
If you are affiliated with University of Tennessee - Knoxville, please enter your NetID.   
Line 22: Line 26:




== Association (Lab, Dept, etc) ==
=== Association (Lab, Dept, etc) ===


Your primary association for access to Rocky.  Secondary associations may be listed in the Additional Notes field.
Your primary association for access to Rocky.  Secondary associations may be listed in the Additional Notes field.
Line 30: Line 34:




== Access Needed ==
=== Access Requested ===
 
If you are going to run programs on the cluster processors then check '''Compute'''. 


If you are going to run programs on the cluster then check Compute. 
If you need to store or access data (beyond what is needed to run programs), check '''Storage'''.
If you need to store data (beyond what is needed to run programs), check Storage.




== Storage Requirements ==
=== Storage Requirements ===


A general assessment of how much space you will require.  If you only need enough space for your programs and libraries and not any data of significance this can be answered as '''nominal'''
A general assessment of how much space you will require.  If you only need enough space for your programs and libraries and not any data of significance this can be answered as '''nominal'''




== Memory Requirement ==
=== Memory Requirement ===


A general assessment of how much RAM you will require.
A general assessment of how much RAM you will require.




== Check all technologies with which you are familiar ==
=== Check all technologies with which you are familiar ===


Please check all technologies with which you have experience.  
Please check all technologies with which you have experience.  




== Software ==
=== Software ===


If you are using compute, list the software/languages you will be using.  If you intend to use something uncommon, please provide links to the software.   
If you are using compute, list the software/languages you will be using.  If you intend to use something uncommon, please provide links to the software.   
Line 58: Line 63:




== Code Repository ==
=== Code Repository ===


Links to code repositories you'll be using.  This information is used to help with troubleshooting if needed.
Links to code repositories you'll be using.  This information is used to help with troubleshooting if needed.




== SSH Public Key ==
=== SSH Public Key ===
 
Rocky uses Public Key Authentication for access instead of passwords.  We will need your public key only.  Keep your private key safe.


The public key for the key pair you will use to connect to Rocky.
Take a few moments to review the pages listed below on connecting to Rocky.  Each page has a section on generating the key pair needed for Rocky Access.


A decent guide on key generation can be found here:  https://kb.iu.edu/d/aews
{| class='wikitable'
|-
| [[Rocky_Access_SSH]] || Linux or Mac
|-
| [[Rocky_Access_Windows]] || Windows
|}




== Additional Notes ==
=== Additional Notes ===


Any additional notes you would like to provide.
Any additional notes you would like to provide.

Latest revision as of 17:59, 5 July 2022

About the Rocky Access Form

The Rocky Access Form is required to gain access to the Rocky Compute or the Quarrel Storage Cluster.

The form can be accessed at the following location: https://cloud.nimbios.org/apps/forms/LnRT6m7fBDXpg94G

Rocky Access Form's Fields

Name

Please provide your full name.


Email

Your email address is how we'll contact you.


UTK NetID

If you are affiliated with University of Tennessee - Knoxville, please enter your NetID.

You can find more information about UTK NetID at: https://oit.utk.edu/accounts/netid/


Association (Lab, Dept, etc)

Your primary association for access to Rocky. Secondary associations may be listed in the Additional Notes field.


A primary association would be the name of the lab, department, center, or faculty with which you are working. If you are undergrad you might put the department of the class or major. If access is for general usage at the university and none of these fit you should enter UTK.


Access Requested

If you are going to run programs on the cluster processors then check Compute.

If you need to store or access data (beyond what is needed to run programs), check Storage.


Storage Requirements

A general assessment of how much space you will require. If you only need enough space for your programs and libraries and not any data of significance this can be answered as nominal


Memory Requirement

A general assessment of how much RAM you will require.


Check all technologies with which you are familiar

Please check all technologies with which you have experience.


Software

If you are using compute, list the software/languages you will be using. If you intend to use something uncommon, please provide links to the software.

This information is used to provide assistance using the Environmental Modules (Lmod).


Code Repository

Links to code repositories you'll be using. This information is used to help with troubleshooting if needed.


SSH Public Key

Rocky uses Public Key Authentication for access instead of passwords. We will need your public key only. Keep your private key safe.

Take a few moments to review the pages listed below on connecting to Rocky. Each page has a section on generating the key pair needed for Rocky Access.

Rocky_Access_SSH Linux or Mac
Rocky_Access_Windows Windows


Additional Notes

Any additional notes you would like to provide.