cluster: restructure ssh role section

Move the example into the bulletin points, makes it clearer that they
are connected and avoids interrupting the flow when reading.

Make the whole "important" part a admontion, as such notes should be
self-contained (not split between note and non-note), it also gives
it more visibility.

Signed-off-by: Thomas Lamprecht <t.lamprecht@proxmox.com>
This commit is contained in:
Thomas Lamprecht 2020-11-24 11:52:04 +01:00
parent 39aa8892b4
commit 9d999d1bf6

View File

@ -869,28 +869,31 @@ pvecm status
If you see a healthy cluster state, it means that your new link is being used. If you see a healthy cluster state, it means that your new link is being used.
Role of SSH in {PVE} Clustering Role of SSH in {PVE} Clusters
------------------------------- -----------------------------
{PVE} utilizes SSH tunnels for various operations: {PVE} utilizes SSH tunnels for various operations.
* Proxying terminal sessions on the GUI * Proxying terminal sessions of node and containers between nodes
+
* VM/CT Migrations (if not configured 'insecure' mode) When you connect another nodes shell through the web interface, for example, a
* Storage replications
For example when you connect another nodes shell through the interface, a
non-interactive SSH tunnel is started in order to forward the necessary ports non-interactive SSH tunnel is started in order to forward the necessary ports
for the VNC connection. for the VNC connection.
Similarly during a VM migration an SSH tunnel is established between the target * VM and CT memory and local-storage migration, if the cluster wide migration
and source nodes. This way the local `qemu` socket can be used for the migration. settings are not configured 'insecure' mode. During a VM migration an SSH
tunnel is established between the target and source nodes.
IMPORTANT: In case you have a custom `.bashrc` or similar file that gets * Storage replication
executed on login, `ssh` will automatically run it once the session is
established. This can cause some unexpected behavior (as commands may be .Pitfalls due to automatic execution of `.bashrc` and siblings
executed as a side-effect). [IMPORTANT]
====
In case you have a custom `.bashrc`, or similar files that get executed on
login by the configured shell, `ssh` will automatically run it once the session
is established successfully. This can cause some unexpected behavior, as those
commands may be executed with root permissions on any above described
operation. That can cause possible problematic side-effects!
In order to avoid such complications, it's recommended to add a check in In order to avoid such complications, it's recommended to add a check in
`/root/.bashrc` to make sure the session is interactive, and only then run `/root/.bashrc` to make sure the session is interactive, and only then run
@ -899,12 +902,13 @@ In order to avoid such complications, it's recommended to add a check in
You can add this snippet at the beginning of your `.bashrc` file: You can add this snippet at the beginning of your `.bashrc` file:
---- ----
# If not running interactively, don't do anything # Early exit if not running interactively to avoid side-effects!
case $- in case $- in
*i*) ;; *i*) ;;
*) return;; *) return;;
esac esac
---- ----
====
Corosync External Vote Support Corosync External Vote Support