PCLBRICH02
This is the DAQ PC for the readout with the miniDAQ. Log in as
lbrich
.
User accounts
Login |
Type |
Notes |
lbrich |
Local |
Use this to operate the DAQ |
lhcbrich |
AFS |
Use for offline and AFS access |
LBRICHMD1
This is the original miniDAQ PC.
User accounts
LBRICHTB
This is the PC used for the Chimaera2-based readout. For the 2017 beam tests this PC is used for the Chimaera2 readout of the silicon tracker.
The PC has a second NIC that is reserved for DAQ. The network addresses are:
Interface |
MAC |
IP |
Notes |
eth0 |
00:22:4D:AA:E4:42 |
128.141.217.56 |
General purpose network |
eth1 |
E8:94:F6:08:4A:41 |
192.168.2.128 |
DAQ network |
DAQ switch |
00:14:22:82:be:92 |
192.168.2.1 |
DAQ switch |
User accounts
Login |
Type |
Notes |
lhcbrich |
AFS |
Use for offline and AFS access |
richtbuser |
Local |
Use this to operate the DAQ |
richtbuser
is granted the permission to run certain programs with elevated privileges through
sudo
.
Using wireshark
Wireshark is a useful tool for debugging the Chimaera2 readout. It has to be run with enhanced privileges. The
richtbuser@lbrichtb
account is allowed to run wireshark using the command
sudo wireshark
An additional step is needed for this to work when using it remotely, e.g.
ssh -Y richtbuser@lbrichtb
echo $DISPLAY # to find the display name.
xauth list # to locate the line corresponding to the display (look for the display number after host/unix:).
sudo xauth add <line-copied-from-xauth-list-output>
Now you can run wireshark with sudo as before.