cat > layouts/partials/flex/body-beforecontent.html << 'EOF'

New Server Best Practices

Planning and Deploying Servers at CSAIL

This page helps you determine whether your research group needs a dedicated server and guides you through the deployment process.


Do You Actually Need a Dedicated Server?

Before buying or deploying hardware, consider CSAIL-wide resources that may meet your needs without the management overhead:

For web applications, databases, and general services:

For compute-intensive research:

For large datasets:

Consider a dedicated server only if:


Server Purchasing and Deployment

Contact TIG before making any hardware purchases. We will help you determine the right approach and facility location based on your requirements, timeline, and current capacity.

TIG actively manages server procurement to give you access to competitive pricing and enterprise support:

Start here: Contact help@csail.mit.edu as soon as you think you need hardware. Even if you’re just exploring options, TIG can save you time and money. See Server Purchasing Support and Strategy for details.


Best Practices for Deployed Servers

If you’ve decided you need a dedicated server, follow these practices:

Hostnames

Choose clear, pattern-matchable hostnames that indicate the machine’s purpose and owning group:

Good: xyz-gpu01, xyz-gpu02 (for GPU cluster in XYZ group)
Avoid: mercury, venus, pluto (group affiliation unclear, hard to pattern-match)

Benefits:

Email Configuration

Arrange for root email to reach someone in your group with management responsibility for the machine.

On CSAIL Linux:

Edit or create /etc/facter/facts.d/local.txt and add:

root_alias=yourname@csail.mit.edu

Changes take effect within 30 minutes.

On legacy CSAIL Debian:

Edit the root: line in /etc/aliases. For example:

root: tig-server-root@csail.mit.edu, yourname@csail.mit.edu

Remote Management

For servers requiring remote access, configure IPMI (Intelligent Platform Management Interface) for out-of-band console and reboot capability. TIG will set this up during deployment.


Security and Responsibility

TIG strives to provide secure platforms and services. However, you are responsible for the security of systems you deploy or manage on TIG-provided infrastructure.

  • Keep your OS and applications patched and current
  • Protect confidential data with appropriate access controls
  • Implement strong authentication and encryption where required
  • Report security concerns to help@csail.mit.edu immediately

See Data Security for detailed guidelines.


Next Steps

  1. Determine if you need dedicated hardware - Review options above
  2. Contact TIG early - Email help@csail.mit.edu with your requirements, timeline, and any constraints
  3. Work with TIG on procurement - If purchasing, TIG will handle vendor coordination and pricing
  4. TIG coordinates deployment - We determine facility location and handle initial setup
  5. You maintain the system - Patching, monitoring, and day-to-day management

See Also


Questions? Email help@csail.mit.edu