This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
public:artn:remote_observing [2020/05/19 23:23] davner [bigartn] |
public:artn:remote_observing [2025/02/19 11:24] (current) prue_hammond [Setup VPN] |
||
---|---|---|---|
Line 1: | Line 1: | ||
======Remote Observing====== | ======Remote Observing====== | ||
- | **05/19/2020**\\ | + | **10/30/2020**\\ |
Currently our remote observing still requires a user at the telescope. However, we are working on developing monitoring tools and making it easier to reach the remote observing goal. | Currently our remote observing still requires a user at the telescope. However, we are working on developing monitoring tools and making it easier to reach the remote observing goal. | ||
+ | =====Using An SSH Tunnel===== | ||
+ | The simplest way of accessing the telescope and observing websites is to use an SSH tunnel. All you | ||
+ | need to do this is knowledge of the rts2obs password and/or your own ssh key. First, add some hosts | ||
+ | to your ~/ | ||
+ | so edit that to suit your own key: | ||
+ | # + | ||
+ | # rts2obs | ||
+ | # - | ||
+ | Host rts2obs | ||
+ | Hostname kuiper.as.arizona.edu | ||
+ | User rts2obs | ||
+ | IdentityFile / | ||
+ | # + | ||
+ | # rts2artn | ||
+ | # - | ||
+ | Host rts2artn | ||
+ | Hostname 10.30.1.24 | ||
+ | User rts2obs | ||
+ | ForwardAgent yes | ||
+ | ProxyCommand ssh -X -Y rts2obs nc %h %p 2> /dev/null | ||
+ | IdentityFile / | ||
+ | # + | ||
+ | # rts2pi | ||
+ | # - | ||
+ | Host rts2pi | ||
+ | Hostname 10.30.1.25 | ||
+ | User pi | ||
+ | ForwardAgent yes | ||
+ | ProxyCommand ssh -X -Y rts2obs nc %h %p 2> /dev/null | ||
+ | IdentityFile / | ||
+ | |||
+ | To check that this has worked, you should now be able to login to both those machines using the shorthand | ||
+ | hostnames. Note that this might prompt for a password until you install your public key in the authorized_keys file on the remote machine: | ||
+ | |||
+ | % ssh -XY rts2obs | ||
+ | rts2obs@gerard: | ||
+ | % ssh -XY rts2pi | ||
+ | pi@raspberrypi: | ||
+ | |||
+ | Add the following commands to a ~/.alias file: | ||
+ | |||
+ | alias rts2pi_tunnel=" | ||
+ | alias rts2artn_tunnel=" | ||
+ | alias xrts2pi_tunnel=" | ||
+ | alias xrts2artn_tunnel=" | ||
+ | |||
+ | When ready to remote eavesdrop, source the file: | ||
+ | |||
+ | % source ~/.alias | ||
+ | | ||
+ | Now, either run the simple tunnel in a regular terminal or use the terminal start: | ||
+ | |||
+ | % xrts2pi_tunnel | ||
+ | % xrts2artn_tunnel | ||
+ | |||
+ | NB: you *must* wait until the tunnel is complete and you are logged into the remote machine. | ||
+ | |||
+ | Then--voila!--point your local browser to: | ||
+ | |||
+ | http:// | ||
+ | http:// | ||
+ | http:// | ||
+ | http:// | ||
+ | |||
+ | | ||
=====Smart VPN===== | =====Smart VPN===== | ||
Compatible with Draytek Router. | Compatible with Draytek Router. | ||
Line 37: | Line 102: | ||
* [[https:// | * [[https:// | ||
+ | |||
+ | ===Remote Dome Open Only=== | ||
+ | To open: | ||
+ | * echo BIG61 UPPERDOME 123 COMMAND DOMESLIT OPEN FORCE | nc bigudome 5750 | ||
+ | |||
+ | It can take a few seconds to start so give it a minute. | ||
+ | |||
+ | To close: | ||
+ | *echo BIG61 UPPERDOME 123 COMMAND DOMESLIT CLOSE FORCE | nc bigudome 5750 | ||
Line 44: | Line 118: | ||
Our web presence is currently being updated and this will change soon. | Our web presence is currently being updated and this will change soon. | ||
- | * [[http:// | + | * [[http:// |
- | * [[http:// | + | * [[http:// |
* [[http:// | * [[http:// | ||