Nanofab Staff Internal Pages: Difference between revisions

From UCSB Nanofab Wiki
Jump to navigation Jump to search
(moving Video Trianing to separate Equip Group pages)
Line 1: Line 1:
Pages intended for NanoFab Staff, internal.
Pages intended for NanoFab Staff, internal.


== Equipment Group ==
==Equipment Group==


* [[Equipment Group - Video Training Procedures|Video Training Procedures]] - How to record, edit and publish a video training.
*[[Equipment Group - Video Training Procedures|Video Training Procedures]] - How to record, edit and publish a video training.


==Process Group==
==Process Group==
Line 18: Line 18:
*[https://ucsbnanofab.app.ondema.tech/jobs/wall/opportunities?kw=NanoFab-it '''Jobs List for NanoFab-IT tasks (OnDema)''']
*[https://ucsbnanofab.app.ondema.tech/jobs/wall/opportunities?kw=NanoFab-it '''Jobs List for NanoFab-IT tasks (OnDema)''']
*Instructions+Procedures can be found in ''gDrive > Facilities Group > Computer Systems''
*Instructions+Procedures can be found in ''gDrive > Facilities Group > Computer Systems''
*Generating New WireGard VPN Credentials
*#Server-Side
*##'''Commend for generating the keys''' wg genkey | tee /etc/wireguard/privatekey_<<replace it with username>> | wg pubkey > /etc/wireguard/publickey_<<replace it with username>>
*##'''Add to the config file''' PublicKey = <<public_key_of_new_user>> AllowedIPs = 10.1.10.XXX/32
*##'''Service Restart''' sudo /etc/rc.d/wireguard restart
*#Client Side
*##Generate the a new file with .conf extensionn [Interface] Address = 10.1.10.XXX/32 DNS = 10.1.1.1 PrivateKey = <<privatekey_of_new_user>> <br />[Peer] PublicKey = hHngYmJZUxRfLAmCxhC00m80hjsNDKl4LKV4iDYN+TY= Endpoint = nanofiles1.ece.ucsb.edu:5900 AllowedIPs = 10.1.0.0/16 PersistentKeepalive = 25


==Useful UCSB Pages==
==Useful UCSB Pages==

Revision as of 17:58, 24 July 2023

Pages intended for NanoFab Staff, internal.

Equipment Group

Process Group

NanoFab IT

Computers, Networks, FTP/File-Sync etc.

  • Jobs List for NanoFab-IT tasks (OnDema)
  • Instructions+Procedures can be found in gDrive > Facilities Group > Computer Systems
  • Generating New WireGard VPN Credentials
    1. Server-Side
      1. Commend for generating the keys wg genkey | tee /etc/wireguard/privatekey_<<replace it with username>> | wg pubkey > /etc/wireguard/publickey_<<replace it with username>>
      2. Add to the config file PublicKey = <<public_key_of_new_user>> AllowedIPs = 10.1.10.XXX/32
      3. Service Restart sudo /etc/rc.d/wireguard restart
    2. Client Side
      1. Generate the a new file with .conf extensionn [Interface] Address = 10.1.10.XXX/32 DNS = 10.1.1.1 PrivateKey = <<privatekey_of_new_user>>
        [Peer] PublicKey = hHngYmJZUxRfLAmCxhC00m80hjsNDKl4LKV4iDYN+TY= Endpoint = nanofiles1.ece.ucsb.edu:5900 AllowedIPs = 10.1.0.0/16 PersistentKeepalive = 25

Useful UCSB Pages

  • Facilities Work Requests - Here's where you report facilities repair requests, like replacing light bulbs, building problems (doors, elevators) etc.

Old / Defunct

Old pages we don't use on the Wiki anymore, but are kept for possible utility later on.