rhnmd
)rhnmd
enables the RHN Satellite to communicate securely with the client system to access internal processes and retrieve probe status.
sshd
instead. Refer to Section 8.2.3, “Configuring SSH” for details.
sshd
, is required on client systems for the following probes to run:
sshd
to allow secure connections between the RHN monitoring infrastructure and the monitored systems. Refer to Section 8.2.3, “Configuring SSH” for instructions.
rhnmd
package can be found in the RHN Tools channel for all Red Hat Enterprise Linux distributions. To install it:
rhnmd
package (under 'R').
service rhnmd start
nocpulse
and 4545
, respectively.
sshd
to provide the encrypted connection required between the systems and RHN. This may be especially desirable if you already have sshd
running. To configure the daemon for monitoring use:
rpm -qi openssh-server
~/.ssh/authorized_keys
file.
sshd
on all client systems using the command:
service sshd start
rhnmd
or sshd
, you must install the Red Hat Network Monitoring Daemon public SSH key on the systems to be monitored to complete the secure connection. To install it:
ssh-dss
and ending with the hostname of the RHN Server).
rhnmd
with the command:
su - nocpulse
~/.ssh/authorized_keys
file for the daemon's user. For rhnmd
, this is /var/lib/nocpulse/.ssh/authorized_keys
.
authorized_keys
, add the daemon key to the file rather than replacing the existing key. To do so, save the copied text to id_dsa.pub
in the same .ssh/
directory and then run the following command: cat ~/.ssh/id_dsa.pub >> ~/.ssh/authorized_keys
.
.ssh/
directory and authorized_keys
file have the appropriate permissions set. This can be done as the daemon's user with the following commands:
chmod 700 ~/.ssh chmod 600 ~/.ssh/authorized_keys
ssh
connections between the Monitoring infrastructure and the monitored system. You may then schedule probes requiring the monitoring daemon to run against the newly configured systems.