Step 1: Serve the bootstrap scripts (head)
cd $HOME ./serve_windows_bootstrap.sh start 8088 7200 ./serve_windows_bootstrap.sh status
Step 2A: Bootstrap the Windows node (PowerShell as Administrator)
Set-ExecutionPolicy Bypass -Scope Process -Force
$head = 'HEAD_NODE_HOST'
$port = 8088
$out = Join-Path $env:TEMP 'bootstrap_windows_worker.ps1'
Invoke-WebRequest "http://${head}:$port/bootstrap_windows_worker.ps1" -OutFile $out -UseBasicParsing
powershell.exe -NoProfile -ExecutionPolicy Bypass -File $out -HeadIp $head -HeadHttpPort $port -RayPort 6380 -EnableSsh -InstallHeadSshKey -SshAuthorizedKeysPath "$env:USERPROFILE\.ssh\authorized_keys" -ConfigureFirewall -PurgeRayWorkerVenv -InstallPython
Step 2B (optional): Bootstrap over SSH from the head (prompts for password once)
cd $HOME ./bootstrap_windows_remote.sh WINDOWS_WORKER_HOST
- This prompts for your Windows SSH password in your terminal and does not store it.
- After bootstrap, key-based SSH should work (
BatchMode=yes), so automation can manage the worker.
Step 3: Install/repair Ollama (LAN-serving) on Windows (recommended)
Set-ExecutionPolicy Bypass -Scope Process -Force
$head = 'HEAD_NODE_HOST'
$port = 8088
$out = Join-Path $env:TEMP 'install_ollama.ps1'
Invoke-WebRequest "http://${head}:$port/install_ollama.ps1" -OutFile $out -UseBasicParsing
powershell.exe -NoProfile -ExecutionPolicy Bypass -File $out -BindHost LAN_HOST -ConfigureFirewall -AllowFrom $head -PullModels
Step 4: Validate from the head
cd $HOME ./cluster_excellence_run.sh --repair python3 ray_test.py
Notes
- This workflow does not write to your USB boot drive.
- If SSH still prompts for password, re-run Step 2 and confirm OpenSSH Server is enabled and the head key was installed into
authorized_keys. - If remote Ollama stays down, run Step 3 again and confirm Windows Firewall allows TCP 11434 from the head.