Installing The Ssh Key - Red Hat NETWORK 4.1.0 Reference Manual

Hide thumbs Also See for NETWORK 4.1.0:
Table of Contents

Advertisement

168
required between the systems and RHN. This may be especially desirable if you already
have
running. To configure the daemon for monitoring use:
sshd
1. Ensure the SSH package is installed on the systems to be monitored:
rpm -qi ssh
2. Identify the user to be associated with the daemon. This can be any user
available on the system, as long as the required SSH key can be put in the user's
~/.ssh/authorized_keys
3.
Identify the port used by the daemon, as identified in its
configuration file. The default is port 22.
4. Install the SSH public key on all client systems to be monitored, as described in
Section 7.2.4 Installing the SSH key.
5. Start the
sshd
service sshd start
6. When adding probes requiring the daemon, insert the values derived from steps 2
and 3 in the RHNMD User and RHNMD Port fields.

7.2.4. Installing the SSH key

Whether you use
rhnmd
mon public SSH key on the systems to be monitored to complete the secure connection.
To install it:
1. Navigate to the Monitoring ⇒ Scout Config Push page of the RHN website and
click the name of the RHN Server that will monitor the client system. The SSH
id_dsa.pub
2. Copy the character string (beginning with
of the RHN Server).
3. On the command line of the system to be monitored, switch to the user aligned with
the daemon. This is accomplished for
su - nocpulse
4. Paste the key character string into the
mon's user. For
If config management is enabled on the systems to be monitored, you
may deploy this file across systems using a config channel. Refer to
Section 6.6.6.1 Preparing Systems for Config Management for details.
file.
on all client systems using the command:
, you must install the Red Hat Network Monitoring Dae-
or
sshd
key is visible on the resulting page.
, this is
rhnmd
/opt/nocpulse/.ssh/authorized_keys
/etc/ssh/sshd_config
and ending with the hostname
ssh-dss
with the command:
rhnmd
~/.ssh/authorized_keys
Chapter 7. Monitoring
file for the dae-
.

Advertisement

Table of Contents

Troubleshooting

loading

Table of Contents