Log in to the Backup Server as
root, and generate a pair of SSH keys - public and private:
# ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/root/.ssh/id_rsa):
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /root/.ssh/id_rsa.
Your public key has been saved in /root/.ssh/id_rsa.pub.
The key fingerprint is:
Note that you must leave an empty passphrase in the above procedure. The private key is saved by default in
Transfer your public key to the
/root/.ssh/id_rsa, and the public key is saved in
/root/.ssh directory on each Source Node (use some intermediary name for the file not to overwrite the corresponding file on the Source Node):
# scp /root/.ssh/id_rsa.pub email@example.com:/root/.ssh/temp_name
The authenticity of host 'dhcp-129.parallels.com (192.168.1.129)' can't be established.
RSA key fingerprint is 01:fc:b6:e9:26:40:1f:1a:41:5f:7a:fb:cf:14:51.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added 'dhcp-129.parallels.com,192.168.1.129' (RSA) to the list of known hosts.
id_rsa.pub 100% |*****************************| 235 00:00