11-April-2014 - noric and yakut aliases being removed on 5-May-2014
On 5-May-2014, the noric and yakut aliases will be removed.
Please use the following names to access the compute interactive login machines:
rhel5-32
rhel5-64
rhel6-32
rhel6-64
It was previously announced on comp-change that the noric alias would be
moved from rhel5-32 to rhel6-64. However, at the latest quarterly Town Hall
Meeting for Unix Services, there was a request from the community to simply
remove the old aliases to avoid confusion.
24-March-2014 - Turning off authenticated ftp on ftp.slac.stanford.edu
Authenticated (as opposed to anonymous) FTP generally sends a clear-text account name and
password across the network making it one of the least secure protocols still in use today.
We need to phase out the use of authenticated FTP as soon as we can.
Anonymous FTP does not by its nature expose passwords, and is not a target of this phase out.
The first phase of this process occurred a number of years ago when we restricted FTP
connections from offsite to a small set of approved FTP servers (those with hostnames
beginning with "ftp"), and set the default configuration for newly installed Linux
systems to disable FTP service.
Secure alternatives include scp, sftp, rsync via ssh, bbcp, bbftp, and direct copy using
the AFS client on Windows, Macs, or UNIX systems. UNIX users can find more information
about most of these programs from their man pages. Windows users can find information
about WinSCP, a popular scp client program for Windows, at https://xweb.slac.stanford.edu/.
29-January-2014 - Subnet Router reconfiguration work scheduled for 30 January 2014, 2-3pm PST.
SLAC IT Network Engineering will be doing some router reconfiguration on Thursday, 30 January 2014 from 2pm-3pm PST. There will be a 20 second outage on each subnet during the reconfiguration. However, there is no anticipated impact on services or applications. Network Engineering and Unix Admin will be monitoring hosts, the network, and services during this work.
If you do notice any problems, please notify unix-admin@slac.stanford.edu right away.
The following single page lists all hosts which are connected to the subnets being reconfigured (you can quickly grep or find hosts you are interested in):
http://www.slac.stanford.edu/comp/unix/news/2014-Jan-30-subnet-reconfig.txt
The subnets being reconfigured are below.
VLAN 16 NETHUB http://www-lanmon.slac.stanford.edu/reports.cgi?rm=hosts&layer=vlan¶m=16
VLAN 174 NETHUB-IFZ-LITE http://www-lanmon.slac.stanford.edu/reports.cgi?rm=hosts&layer=vlan¶m=174
VLAN 175 NETHUB-IFZ http://www-lanmon.slac.stanford.edu/reports.cgi?rm=hosts&layer=vlan¶m=175
VLAN 831 SERV01-PRIVATE http://www-lanmon.slac.stanford.edu/reports.cgi?rm=hosts&layer=vlan¶m=831
VLAN 844 SERV01-SEC-PRIV http://www-lanmon.slac.stanford.edu/reports.cgi?rm=hosts&layer=vlan¶m=844
VLAN 846 SERV01-CONSOLE http://www-lanmon.slac.stanford.edu/reports.cgi?rm=hosts&layer=vlan¶m=846
VLAN 847 SERV01-DHCP http://www-lanmon.slac.stanford.edu/reports.cgi?rm=hosts&layer=vlan¶m=847
VLAN 880 SERV01-SEC-PRIV02 http://www-lanmon.slac.stanford.edu/reports.cgi?rm=hosts&layer=vlan¶m=880
VLAN 890 SERV01-NS-MASTER http://www-lanmon.slac.stanford.edu/reports.cgi?rm=hosts&layer=vlan¶m=890
VLAN 1412 SERV01-LOGIN http://www-lanmon.slac.stanford.edu/reports.cgi?rm=hosts&layer=vlan¶m=1412
VLAN 1418 SERV01-IFZLITE http://www-lanmon.slac.stanford.edu/reports.cgi?rm=hosts&layer=vlan¶m=1418
VLAN 1432 SERV01-SMTP http://www-lanmon.slac.stanford.edu/reports.cgi?rm=hosts&layer=vlan¶m=1432
VLAN 1433 SERV01-CPP-SENSOR http://www-lanmon.slac.stanford.edu/reports.cgi?rm=hosts&layer=vlan¶m=1433
VLAN 1441 SERV01-IEPM http://www-lanmon.slac.stanford.edu/reports.cgi?rm=hosts&layer=vlan¶m=1441
VLAN 1445 SERV01-SEC-LITE http://www-lanmon.slac.stanford.edu/reports.cgi?rm=hosts&layer=vlan¶m=1445
VLAN 1464 SERV01-NS-INT http://www-lanmon.slac.stanford.edu/reports.cgi?rm=hosts&layer=vlan¶m=1464
VLAN 1466 SERV01-NS-EXT http://www-lanmon.slac.stanford.edu/reports.cgi?rm=hosts&layer=vlan¶m=1466
VLAN 1808 SERV01-PUBLIC http://www-lanmon.slac.stanford.edu/reports.cgi?rm=hosts&layer=vlan¶m=1808
VLAN 1812 SERV01-AFS http://www-lanmon.slac.stanford.edu/reports.cgi?rm=hosts&layer=vlan¶m=1812
VLAN 1814 SERV01-WEBSERV http://www-lanmon.slac.stanford.edu/reports.cgi?rm=hosts&layer=vlan¶m=1814
VLAN 1848 WINLB1 http://www-lanmon.slac.stanford.edu/reports.cgi?rm=hosts&layer=vlan¶m=1848
21-January-2014 - NFS bug in some RHEL6 kernels
There is a bug in some later RHEL6 kernels which can cause data corruption under some specific scenarios.
There is an open bugzilla and upstream kernel patch. RH is working with upstream to get the patch included, after which time an updated kernel RPM will be released. We have reverted the batch cluster to a backlevel kernel which does not have this bug. Let us know if you have any questions or concerns.
8-January-2014 - SU-HPC seminar at Stanford: OpenMP 4.0
...