Please enter search query.
Search <book_title>...
NetBackup™ Web UI Nutanix AHV Administrator's Guide
Last Published:
2023-10-26
Product(s):
NetBackup & Alta Data Protection (10.3.0.1, 10.3)
- Overview
- Managing AHV clusters
- Managing credentials
- Protecting AHV virtual machines
- Recovering AHV virtual machines
- Troubleshooting AHV operations
- API and command line options for AHV
SSH key fingerprint
To obtain the SSH key fingerprint of the Linux target host:
- Use the following command on RHEL or SUSE OS target host to get the SHA256-based RSA key.
cat /etc/ssh/ssh_host_rsa_key.pub |awk '{print $2}' |base64 -d |sha256sum | awk '{print $1}'
Note:
The output of the commands is the RSA key. Similarly, change the public key path, execute the command to get ecdsa or DSS SSH key fingerprint configured on target host.
RSA key example:
cat /etc/ssh/ssh_host_rsa_key.pub |awk '{print $2}'|base64 -d | sha256sum |awk '{print $1}'
Command output:
b2352722053ac9f40bc1XXXXXXXXXXXXXXXXXXXXXXXXX419fa241ba9431fd6b9
- Copy the RSA fingerprint. You can provide this SSH key fingerprint when you add the target host details. Or you can also verify the displayed SSH key fingerprint after you click, Fetch SSH Key fingerprint on the Recovery Host page.
To generate SSH private key:
- Execute the following commands on Linux target host:
ssh-keygen -t rsa
-t option supports "ecdsa | rsa | dss"
- You must add/append target host public key in target
vm ~/.ssh/authorized_keys
file.