The Client Automation AM remote agent installs and uses Plink (PuTTY Link) as an SSH client to communicate with most types of remote hosts. However, the first time that Plink connects as a given user to a new target it displays the host key and, as a security measure, interactively asks if the host is legitimate. Obviously, the AM remote agent does not support such interactivity with a user, so you must first reassure Plink before gathering inventory.
Since Plink saves the remote host’s key in the registry, you can generate such a registry entry for a convenient login user and then save the same key under the LocalSystem account that the asset management agent runs as.
To generate a registry entry and save the host key under the LocalSystem account
"C:\Program Files\CA\DSM\Agent\units\00000001\uam\plink" -ssh -i "private_key_file" root@target ls
The variable private_key_file is the absolute path of the file, and target is the remote host name. Adjust the Plink path if Client Automation is installed at some other location.
Plink must be configured for each remote host for which the AM remote agent gathers inventory; so connect to all remote hosts in order to generate host keys, and then run the above export-import procedure once.
If you suspect that Plink may not be configured correctly for the LocalSystem account, run the asset management agent (“caf start amagent”), wait for all AM processes to finish, and then examine the trace file, TRC_UAM_amvminvux_*.log. Search for “The server's host key is not cached in the registry.” If you find such an error, Plink is not correctly configured. Also, if you see the "Access denied" error in the trace file, this usually means a problem with the credentials used to access the remote host, for example, an incorrect password or SSH key.
Note: For detailed information about Plink, refer to the PuTTY/Plink manual on the following website: http://www.chiark.greenend.org.uk/~sgtatham/putty/docs.html
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|