From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from firstgate.proxmox.com (firstgate.proxmox.com [212.224.123.68]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by lists.proxmox.com (Postfix) with ESMTPS id B3557BC068 for ; Thu, 21 Dec 2023 10:29:57 +0100 (CET) Received: from firstgate.proxmox.com (localhost [127.0.0.1]) by firstgate.proxmox.com (Proxmox) with ESMTP id 97D6216D50 for ; Thu, 21 Dec 2023 10:29:27 +0100 (CET) Received: from proxmox-new.maurer-it.com (proxmox-new.maurer-it.com [94.136.29.106]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by firstgate.proxmox.com (Proxmox) with ESMTPS for ; Thu, 21 Dec 2023 10:29:26 +0100 (CET) Received: from proxmox-new.maurer-it.com (localhost.localdomain [127.0.0.1]) by proxmox-new.maurer-it.com (Proxmox) with ESMTP id 6106948A2F for ; Thu, 21 Dec 2023 10:29:26 +0100 (CET) From: =?UTF-8?q?Fabian=20Gr=C3=BCnbichler?= To: pve-devel@lists.proxmox.com Date: Thu, 21 Dec 2023 10:29:21 +0100 Message-Id: <20231221092922.115949-1-f.gruenbichler@proxmox.com> X-Mailer: git-send-email 2.39.2 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-SPAM-LEVEL: Spam detection results: 0 AWL 0.064 Adjusted score from AWL reputation of From: address BAYES_00 -1.9 Bayes spam probability is 0 to 1% DMARC_MISSING 0.1 Missing DMARC policy KAM_DMARC_STATUS 0.01 Test Rule for DKIM or SPF Failure with Strict Alignment SPF_HELO_NONE 0.001 SPF: HELO does not publish an SPF Record SPF_PASS -0.001 SPF: sender matches SPF record T_SCC_BODY_TEXT_LINE -0.01 - Subject: [pve-devel] [PATCH docs 1/2] fix #5140: qdevice SSH access documentation X-BeenThere: pve-devel@lists.proxmox.com X-Mailman-Version: 2.1.29 Precedence: list List-Id: Proxmox VE development discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 21 Dec 2023 09:29:57 -0000 rephrase in order to not make it seem like password-based access is required. Signed-off-by: Fabian Grünbichler --- pvecm.adoc | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/pvecm.adoc b/pvecm.adoc index 1f78585..03fba9f 100644 --- a/pvecm.adoc +++ b/pvecm.adoc @@ -1052,13 +1052,13 @@ pve# pvecm qdevice setup The SSH key from the cluster will be automatically copied to the QDevice. -NOTE: Make sure that the SSH configuration on your external server allows root -login via password, if you are asked for a password during this step. +NOTE: Make sure to setup key-based access for the root user on your external +server, or temporarily allow root login with password during the setup phase. If you receive an error such as 'Host key verification failed.' at this stage, running `pvecm updatecerts` could fix the issue. -After you enter the password and all the steps have successfully completed, you -will see "Done". You can verify that the QDevice has been set up with: +After all the steps have successfully completed, you will see "Done". You can +verify that the QDevice has been set up with: ---- pve# pvecm status -- 2.39.2