Top
PRIMECLUSTER  Reliant Monitor Services (RMS) with Wizard Tools Configuration and Administration Guide 4.6
FUJITSU Software

A.1.2 /root/.rhosts (Linux) and /.rhosts (Solaris)

Contains entries to control trusted login from remote hosts.

The Wizard Tools require automatic login or authentication as root on every machine in the cluster. One method is to include the names of trusted hosts in the .rhosts file, which must be modified appropriately on each node. See the rhosts manual page for a complete description of the format.

Example

If the cluster consists of hosts shasta1 and shasta2, then every machine's .rhosts file should contain the following lines:

shasta1 root
shasta2 root

Note

The Cluster Foundation (CF) provides the equivalent of .rhosts functionality (CF shell, CFCP). Therefore, if cfsh and cfcp of the Cluster Foundation are configured, all RMS configuration, administration, and operation tasks can be performed without .rhosts configuration.