Secure Connection
- Establish secure connection from the workstation to the servers.
- Run deployment tasks
- Upload configuration files
- Log in
- Put the public key on the server
- Create a secure connection using the private key
- Avoid password based authentication
- Use SSH tunneling to reuse the connection for other services
SSH Keys
Setup passwordless login on the server
- Use ssh-keygen to make a new pair of SSH keys
- Create a virtual private server in the admin panel
- Copy the SSH keys using ssh-copy-id utility for providers that setup password-based authentication
Success Criteria
Login using SSH as root
ssh root@server-hostname-or-ip-address
Remote Shell
- Install ssh-agent on Mac OS
- Connect to server from the client, use ssh command
- Define USER environment variable to specify hte user on the host
- Define HOST environment variable to specify the remote server's hostname or IP address
- The default configuration file used is ~/.ssh/config
- The default identity file (private key) is ~/.ssh/id_rsa
- The identity_file, login_name and port values can be specified per host in the configuration file (~/.ssh/config)
File Transfers
Steps
- Signup for hosting provider
- Create a node
- Provision a node
- Deploy code
- Maintain node
- Figure out which steps are done by the customer and which steps are done by the product.
- Establish secure