Guidelines for Remote Worker Shift

From Hall D Ops Wiki
Revision as of 10:32, 6 August 2021 by Shepherd (Talk | contribs) (Created page with "The role of the remote worker is to support the data acquisition and monitoring that is being conducted by the shift leader that is physically located in the counting room. R...")

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

The role of the remote worker is to support the data acquisition and monitoring that is being conducted by the shift leader that is physically located in the counting room. Remote workers will have access to a counting room desktop display via VNC and will be able to interact with it exactly as if they were in the counting room. The remote worker should monitor data quality and data acquisition as well is keep in constant live communication with the shift leader. The remote worker should never conduct an operation that will result in the change of hardware configuration in hall, e.g., manipulating high voltages, moving the diamond, etc.

Days prior to taking any remote shifts, shifters should:

  • verify they able to establish a VNC connection to the counting room, which necessarily involves using two-factor authentication to login to hallgw.jlab.org, and
  • obtain, as necessary, proper training and orientation from an experienced shift worker.

Initiating a Remote Connection to the Counting Room

The remote VNC session must be run through a ssh tunnel though hallgw.jlab.org. The instructions below describe how to establish this tunnel and then connect a VNC client which will be run locally on the workers machine to the tunneled port where the VNC server is running in the counting room.

Initial setup instructions

  • Linux: minimum requirement for remote shift taker is vnc client referred to generically as vncviewer on linux in the instructions below. This client could be TightVNC, TigerVNC, RealVNC, …
  • Mac: likely the stock macOS is sufficient if one wants to initiate the VNC session through Safari
  • Windows:
  1. install both PuTTY from https://www.putty.org and version 2.x of TightVNC for Windows from https://www.tightvnc.com
  2. configure and test a PuTTY session for the VNC tunnel in advance by open PuTTY and enter the following customizations. The words underlined reference the side menu and italics are the fields to adjust. (replace XX with a user preferred number: 01 to 99)
    1. SessionHost Name: your_jlab_userid@hallgw.jlab.org
    2. Connection → SSHRemote command: echo “Enter hdops password next…”; ssh -X -t -L59XX:localhost:5933 hdops@gluon03”
    3. Connection → SSH → X11Enable X11 forwarding: check box
    4. Connection → SSH → X11Add new forwarded port:
      1. Source port: 59XX
      2. Destination: localhost:59XX
      3. click Add
    5. Return to Session and in the Saved Sessions area name this session something like “Hall D VNC Tunnel” and click Save.