6.10. Allowing root Access to Cluster Nodes over SSHΒΆ

In certain situations, you or the technical support team may need root access to cluster nodes via SSH. We recommend using SSH keys as they are generally more secure than passwords. You can generate a key pair on a client from which you will connect to the nodes via SSH. The private key will be stored on the client. Make sure you do not share the private key with anyone for security reasons. The public key will need to be uploaded to Acronis Cyber Infrastructure.

To create and upload a public key, do the following:

  1. Obtain an SSH public key from the technical support team, or generate an SSH key pair on a client using the ssh-keygen utility:

    # ssh-keygen -t rsa
    

    By default, the generated public key is located in /root/.ssh/id_rsa.pub.

  2. Open the SETTINGS > Security > SSH screen and click ADD.

  3. On the Add public key panel, paste the key and click ADD KEY.

    ../_images/stor_image1_6_ac.png

To delete the key after root access is no longer required, select the key and click Delete.