InfoScale™ 9.0 Virtualization Guide - Linux on ESXi
- Section I. Overview
- Section II. Deploying Veritas InfoScale products in a VMware environment
- Getting started
- Understanding Storage Configuration
- Getting started
- Section III. Use cases for Veritas InfoScale product components in a VMware environment
- Application availability using Cluster Server
- Multi-tier business service support
- Improving data protection, storage optimization, data migration, and database performance
- Protecting data with InfoScale™ product components in the VMware guest
- Optimizing storage with InfoScale™ product components in the VMware guest
- About Flexible Storage Sharing
- Migrating data with InfoScale™ product components in the VMware guest
- Improving database performance with InfoScale™ product components in the VMware guest
- Setting up virtual machines for fast failover using InfoScale Enterprise on VMware disks
- About setting up InfoScale Enterprise on VMware ESXi
- Section IV. Reference
Enable Password-less SSH
The installer will configure password-less SSH/RSH among the cluster nodes, but it will not be able to enable this required functionality between the cluster nodes and the CP servers. This is necessary if there are any future changes in the IO fencing configurations, etc. In this configuration we are going to configure password-less SSH between the node that we will be using to configure the cluster and the rest of the nodes.
The following are the instances where Password-less SSH will be enabled:
Table: Instances to enable password-less SSH
Source | Target | Reason |
---|---|---|
cfs01 | cfs02 | Cluster configuration |
cfs01 | cfs03 | Cluster configuration |
cfs01 | cfs04 | Cluster configuration |
cfs01 | cps01 | Non-SCSI-3 fencing configuration |
cfs01 | cps2 | Non-SCSI-3 fencing configuration |
cfs01 | cps3 | Non-SCSI-3 fencing configuration |
cps01 | cps01 | Secure cluster configuration |
cps2 | cps01 | Secure cluster configuration |
cps3 | cps01 | Secure cluster configuration |
If you do not enable Password-less SSH, then follow the manual configuration instructions given at the end of this document.