Log in to the backup server as root
, and generate a pair of SSH keys - public and private:# ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/root/.ssh/id_rsa):
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /root/.ssh/id_rsa.
Your public key has been saved in /root/.ssh/id_rsa.pub.
The key fingerprint is:
c6:19:a8:2c:67:31:15:e6:30:23:2b:8a:b0:63:77:8f root@dhcp-130.virtuozzo.com
Note that you must leave an empty passphrase in the above procedure. The private key is saved by default in /root/.ssh/id_rsa
, and the public key is saved in /root/.ssh/id_rsa.pub
.
Transfer your public key to the /root/.ssh
directory on each source Node (use some intermediary name for the file not to overwrite the corresponding file on the source Node):# scp /root/.ssh/id_rsa.pub root@dhcp-129.virtuozzo.com:/root/.ssh/temp_name
The authenticity of host 'dhcp-129.virtuozzo.com (192.168.1.129)' can't be established.
RSA key fingerprint is 01:fc:b6:e9:26:40:1f:1a:41:5f:7a:fb:cf:14:51.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added 'dhcp-129.virtuozzo.com,192.168.1.129' (RSA) to the list of known hosts.
root@dhcp-129.virtuozzo.com's password:
id_rsa.pub 100% |*****************************| 235 00:00