
The authenticity of host 'localhost (::1)' can't be established.
ECDSA key fingerprint is fa:86:a7:9c:6c:d3:f2:2e:25:12:3f:27:2c:c2:f9:13.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added 'localhost' (ECDSA) to the list of known hosts.
success
If it is still not possible to login to localhost without a password, the user should make sure the private key
file
.ssh/id_rsa
is not readable by anyone but themselves and that their
.ssh
and
.ssh/authorized_keys
directories are not writable by anyone but themselves.
Once it is possible to log into localhost without a password, execute proxied commands without a password.
To test, execute the following:
$
utp-launch true; echo $
?
The authenticity of host 'host-os (192.168.122.1)' can't be established.ECDSA
key fingerprint is 52:b4:f8:5a:9d:af:f6:ad:70:c4:a4:4b:df:44:e7:42.
Are you sure you want to continue connecting (yes/no)? yes
0
Note the '
0
' that is printed on the last line. If this is not '
0
' there may be an underlying issue. The second and
subsequent times this is run, the user will not be prompted for host authenticity. This is shown below:
$
utp-launch true; echo $?
0
7.5
Tenancy
On Urika-GX, tenancy refers to the ability to host users inside of a virtualized environment that is isolated from
physical cluster resources, while providing access to selected physical node services through a proxy
mechanism. The intent of tenancy is to contain users who are leasing time or resources on Urika-GX and keep
them separated from site users who are permitted access to physical nodes, such as a login node. On Urika-GX,
tenancy is implemented through the use of tenant VMs that run on physical nodes and provides controlled access
to services on the physical nodes through a command proxy mechanism.
Urika-GX Tenant Proxy
The Urika-GX tenant proxy mechanism provides access to a whitelist of commands that can be used from the
tenant VM. The whitelist of commands is stored in
/etc/utp.d/command_whitelist
, and contains the
following definitions:
●
Kubernetes command -
kubectl logs
●
Spark commands:
○
spark-submit
○
spark-shell
○
pyspark
○
run-example
○
sparkR
○
spark-sql
Security
S3016
183