IBM Books

Software Planning and Installation Guide


Step 1. Configure the remote shell

A distributed shell program (dsh) is used to run commands on the nodes. It is contained in the csm.dsh RPM and installed by the installms command. The dsh program uses the remote shell of your choice to issue remote commands to the managed nodes from the management server (rsh is the default, but Step 6. Deciding which remote shell to use showed you how choose another shell). To enable the remote shell, you must perform the following tasks on each node before dsh is installed. Note that these tasks are only necessary when doing a CSM-only installation.

Note:
Be aware that the dsh command does not provide the set up for a specific security configuration. The user is responsible for fulfilling the particular security obligations of a specified security environment. At a minimum, you can configure rsh with the /root/.rhosts file on nodes. A more secure environment might have Kerberos configured or might be using some type of shell that conforms to the IETF (Internet Engineering Task Force) secure remote command protocol.

To ensure that dsh will work on each of the nodes, use the remote shell to run a remote command from the node that will be the management server to each node that will be in the cluster. For example you can run the following command for each node:

dsh -n nodename date
 

In the example above, if dsh is working, the date command returns a list of the nodes in the cluster, showing the date for each node.

Note:
The Distributed Command Execution Environment (DCEM) graphical user interface is provided to make it easy to use the dsh command functions. See the dcem man page and the CSM for Linux: Administration Guide for information on how to start up and use DCEM.

For more information on dsh, see the man page or the commands chapter of CSM for Linux: Administration Guide.


[ Top of Page | Previous Page | Next Page | Table of Contents | Index ]