Installing The Ssh Key - Red Hat NETWORK SATELLITE 5.1.0 Reference Manual

Hide thumbs Also See for NETWORK SATELLITE 5.1.0:
Table of Contents

Advertisement

Chapter 7. Monitoring
rpm -qi openssh-server
2. Identify the user to be associated with the daemon. This can be any user available on the
system, as long as the required SSH key can be put in the user's
file.
3. Identify the port used by the daemon, as identified in its
configuration file. The default is port 22.
4. Install the SSH public key on all client systems to be monitored, as described in
"Installing the SSH
5. Start the
on all client systems using the command:
sshd
service sshd start
6. When adding probes requiring the daemon, insert the values derived from steps 2 and 3 in
the RHNMD User and RHNMD Port fields.

2.4. Installing the SSH key

Whether you use
rhnmd
public SSH key on the systems to be monitored to complete the secure connection. To install it:
1. Navigate to the Satellite Tools # Satellite Configuration # Scout Config Push page on the
Satellite interface and click the name of the RHN Server that will monitor the client system.
The SSH
id_dsa.pub
2. Copy the character string (beginning with
Server).
3. On the command line of the system to be monitored, switch to the user aligned with the
daemon. This is accomplished for
su - nocpulse
4. Paste the key character string into the
For
, this is
rhnmd
/opt/nocpulse/.ssh/authorized_keys
If config management is enabled on the systems to be monitored, you may deploy this file
across systems using a config channel. Refer to
Management"
for details.
166
key".
or
, you must install the Red Hat Network Monitoring Daemon
sshd
key is visible on the resulting page.
with the command:
rhnmd
~/.ssh/authorized_keys
/etc/ssh/sshd_config
and ending with the hostname of the RHN
ssh-dss
.
Section 7.1, "Preparing Systems for Config
~/.ssh/authorized_keys
Section 2.4,
file for the daemon's user.

Advertisement

Table of Contents
loading

Table of Contents