RCC Security Infrastructure
To maintain a safe and trusted compute platform, RCC's security infrastructure includes the following measures:
To maintain a safe and trusted compute platform, RCC's security infrastructure includes the following measures:
To use any RCC resources, you must first sign-up for an RCC System Account. This page describes how RCC System Accounts work.
Anybody can create an RCC System Account. This account provides a general level of service on the HPC and Spear, and access to various other services.
If you are a currently-employed FSU faculty members, you can create an account immediately with no approval required. Additionally, you may sponsor non-faculty users (students, staff, and outside collaborators).
This page describes how to compile code for the HPC, Spear, or Condor using compilers on our login nodes.
Although the RCC provides a large number of built-in, precompiled software programs on our systems, many users will need to compile custom code into an executable program before submitting it to the Slurm scheduler. For this, we provide compilation resources on our systems:
The three primary compiler suites on our systems include:
On RCC Linux systems, most software packages are made available via Linux Environment Modules. These modules allow us to maintain an enormous software library without users having to worry about details such as paths to different software versions or libraries; modules will set or unset the right paths for you.
To connect to RCC Resources from off-campus, you must use the FSU VPN Service. Once you are on the VPN, you can then connect to our services (via SSH or other protocol) as if you were on campus.
SSH stands for Secure Shell. It allows you to remotely connect to our login nodes and Spear servers and interact with our services via the command-line. This is the primary way that most people use our services.
If you're unfamiliar with SSH, you might want to check out this LinkedIn Learning overview video.