At 06.03 28/09/00 -0400, Ted Pavlic wrote:
Alright, personally I always prefer
Over the option you've outlined. This plugs up some security holes.
From each server which needs to accept SSH requests, ssh FROM them into your
monitoring system. (your LVS, from what it sounds like) Do this as root so
that the keys from your LVS are stored in root's known_hosts file. (Be sure
you answer yes to any question asking you to save the file)
I was adding to "known_host" file only "Ip number + associated RSA key",
and not "canonical name + associated RSA key", so it was refusing me
Now everything works fine. Thanks again.
jJst another question: is there a way to limit syslog logging? (I've got a
Sep 28 17:12:51 lvs1 nanny: running command "ssh" "172.16.0.11" "uptime"
entries in the log file! Sorry if this was already asked before!)
P.S.: yes, I'm running LVS via piranha/pulse on VALinux/RedHat.