Registered users
Linkedin Twitter Facebook Google+
Close

In order to improve user's experience and to enable some functionalities by tracking the user accross the website, this website uses its own cookies and from third parties, like Google Analytics and other similar activity tracking software. Read the Privacy Policy
33HOPS, IT Consultants
33HOPS ::: Proveedores de Soluciones Informáticas :: Madrid :+34 91 663 6085Avda. Castilla la Mancha, 95 - local posterior - 28700 S.S. de los Reyes - MADRID33HOPS, Sistemas de Informacion y Redes, S.L.Info

<< Return to index

XSIBACKUP - Link servers by SSL key pair

Up until version 4.5.0 XSIBackup would use the ESXi server's key pair to link to a secondary ESXi box. This was not the best way to accomplish this as the ESXi server changes it's key on every reboot thus breaking up the trust relationship, so you had to manually issue the command

--link-srv=[Remote ESXi IP]

after every reboot. Since version 4.5.0 XSIBackup uses its own key pair stored in the same directory where XSIBackup is installed, so this key pair is preserved accross reboots and allows also persistence of the trust relationships stablished by means of the SSL key pair.

What do I have to do to upgrade if I have an older version of XSIBackup into production?
Well, it's very easy, simply overwrite xsibackup file and relink to the secondary server by issuing

--link-srv=[Remote ESXi IP]

This will generate a new key pair into XSIBackup installation directory and use it as XSIBackup's key pair instead of using the ESXi server's (that will change on every reboot).

Any other thing that I should change?

If you didn't change XSIBackup's install dir all other functionalities will keep on working the same.

NEW FILES:

These are the new files that will show up in XSIBackup's install dir after linking to a secondary ESXi server for the first time.

-rw------- 1 root root 668 Aug 13 10:41 xsibackup_id_dsa
-rw-r--r-- 1 root root 604 Aug 13 10:41 xsibackup_id_dsa.pub


The .pub key will be copied to the /etc/ssh/keys-root/authorized_keys file on every linked server, thus allowing transparent secure commutication between the two servers. This publick key will be invoked by XSIBackup on every Rsync over TCP/IP backup operation and tunnel data through SSH.

UPDATE (2016-04-18):

Since version 5.0.0 XSIBackup will change from a DSA key pair to RSA. Thus you will need to relink your servers. This has been imposed by a change in VMWare ESXi 6.0.0 update 2, which does not allow to use DSA keys any more.





Website Map
Consultancy
IT Manager
In Site
Resources & help
Index of Docs
33HOPS Forum

Fill in to download
The download link will be sent to your e-mail.
Name
Lastname
E-mail


            Read our Privacy Policy