Guys,
  In development/testing, I occasionally run into issues with the ssh
keys on the system VMs.  Today specifically, I've been trying to hunt
down issues most of the day and still only have a hunch about the
process.  Most of what I'm finding are the default authorized_keys
(anthony@mobl-ant), but I've got a variety; one generated on a test
management server that has long been decommissioned, one that was
generated on the current management server. I've got keys in the VMs
on /root/.ssh/authorized_keys, /var/cache/cloud/authorized_keys, in
the systemvm.iso, in the systemvm template qcow2, in the systemvm
template copied to local storage, in the patch disk, I have an
id_rsa.pub.cloud on some of my hosts. I'm not quite sure how to
recover, short of hunting down absolutely every one of these
authorized_keys files and changing them to a known good keypair. I've
found the injectkeys.sh script that seems to be intended to update the
systemvm.iso, but even in working clusters the systemvm.iso just has
the default anthony auth key.

If someone could even briefly describe how the private keys end up on
the host and how the public key ends up on the system VM it would help
me dramatically. As it is I think some of this stuff I've been digging
through is either unused or unnecessary, which just confuses things.

Thanks

Reply via email to