Contact
[email protected]
1 855 796 6269
Support
If you are an existing customer and in need of support, please reach us through our Ticket System available from your Client Area.
[email protected]
1 855 796 6269
If you are an existing customer and in need of support, please reach us through our Ticket System available from your Client Area.
[Resolved] Feb 8th, 2019 - 05:30 AM MST
Patch has been applied to fix the issue. All necessary information is now displaying correctly in the Client Area. We do apologize for the inconvenience this may have caused.
[Investigating] Feb 8th, 2019 - 01:02 AM MST
Due to a bug in the code of the recent upgrade of Symmcom Client Area, some areas of user's product details were not showing necessary information. A fix is in progress.
[Issue] Feb 7th, 2019 - 09:42 PM MST
Users notified that few areas of the Symmcom Client Area not showing information as expected under Product Details.
Built on librados, Ceph Object Gateway is object storage which supports both S3 and Swift compatible interface using RESTful API. An HTTP based server daemon named radosgw is used to interact with Ceph Storage Cluster. Ceph is an extremely powerful distributed storage system which offers redundancy out of the box over multiple nodes beyond just single node setup. It is highly scalable and resilient to be used in an enterprise environment. Check out how CERN has been using Ceph to quench their immense thirst of big data need.
In this guide, we are going to learn how to configure Ceph Object Gateway to serve S3 compatible interface. The examples used in this guide are for 4 nodes Ceph cluster on Debian.
It is important to ensure the Ceph cluster is healthy and no data rebalancing is in progress. A healthy Ceph cluster should appear as following after typing # ceph -s command:
cluster: id: 3921019cb-adfs3-4347-owier90-sl23498fjds
health: HEALTH_OK
services: mon: 3 daemons, quorum cph-01,cph-02,cph-03,cph-042
mgr: cph-01(active), standbys: cph-02,cph-03,cph-04
mds: cephfs-01-1/1/1 up {0=cph-01=up:active}, 2 up:standby
osd: 40 osds: 40 up, 40 in
rgw: 1 daemon active
data: pools: 10 pools, 2384 pgs
objects: 1.63M objects, 6.17TiB
usage: 18.5TiB used, 54.3TiB / 72.8TiB avail
pgs: 2383 active+clean
io:
client: 24.6MiB/s rd, 2.23MiB/s wr, 271op/s rd, 126op/s wr
Also, ensure that all member nodes in the Ceph cluster are fully updated.
In Ceph, a Keyring file stores Ceph authentication keys and their associated permissions rights specifications. Authentication is extremely important in Ceph as it protects against a man-in-the-middle attack. Important to keep in mind that, authentication data is sent in the network is not encrypted. This may include authentication keys, permission info etc. Ceph is designed to be used inside a fully trusted environment.
We are going to use ceph-authtool to create the required Keyring file:
[email protected]:~# ceph-authtool --create-keyring /etc/ceph/ceph.client.radosgw.keyring
We are going to use the same ceph-authtool to generate the required keys and add them to the previously created keyring:
[email protected]:~# ceph-authtool /etc/ceph/ceph.client.radosgw.keyring -n client.radosgw.cph1 --gen-key
[email protected]:~# ceph-authtool /etc/ceph/ceph.client.radosgw.keyring -n client.radosgw.cph2 --gen-key
[email protected]h3:~# ceph-authtool /etc/ceph/ceph.client.radosgw.keyring -n client.radosgw.cph3 --gen-key
[email protected]:~# ceph-authtool /etc/ceph/ceph.client.radosgw.keyring -n client.radosgw.cph4 --gen-key
In this step we are going to add read, write and execute capabilities to the previously created keys:
[email protected]:~# ceph-authtool -n client.radosgw.cph1 --cap osd 'allow rwx' --cap mon 'allow rwx' /etc/ceph/ceph.client.radosgw.keyring
[email protected]:~# ceph-authtool -n client.radosgw.cph2 --cap osd 'allow rwx' --cap mon 'allow rwx' /etc/ceph/ceph.client.radosgw.keyring
[email protected]:~# ceph-authtool -n client.radosgw.cph3 --cap osd 'allow rwx' --cap mon 'allow rwx' /etc/ceph/ceph.client.radosgw.keyring
[email protected]:~# ceph-authtool -n client.radosgw.cph4 --cap osd 'allow rwx' --cap mon 'allow rwx' /etc/ceph/ceph.client.radosgw.keyring
Once the keys are generated and capabilities are added, we can add the keys to the cluster:
[email protected]:~# ceph -k /etc/ceph/ceph.client.admin.keyring auth add client.radosgw.cph1 -i /etc/ceph/ceph.client.radosgw.keyring
[email protected]:~# ceph -k /etc/ceph/ceph.client.admin.keyring auth add client.radosgw.cph2 -i /etc/ceph/ceph.client.radosgw.keyring
[email protected]:~# ceph -k /etc/ceph/ceph.client.admin.keyring auth add client.radosgw.cph3 -i /etc/ceph/ceph.client.radosgw.keyring
[email protected]:~# ceph -k /etc/ceph/ceph.client.admin.keyring auth add client.radosgw.cph4 -i /etc/ceph/ceph.client.radosgw.keyring
Ceph configuration file is located in /etc/ceph/ceph.conf. Edit it to add the following lines:
[client.radosgw.cph1]
host = cph1
keyring = /etc/pve/priv/ceph.client.radosgw.keyring
log file = /var/log/ceph/client.radosgw.$host.log
rgw_dns_name = s3.domain.com
[client.radosgw.cph2]
host = cph2
keyring = /etc/pve/priv/ceph.client.radosgw.keyring
log file = /var/log/ceph/client.radosgw.$host.log
rgw_dns_name = s3.domain.com
[client.radosgw.cph3]
host = cph3
keyring = /etc/pve/priv/ceph.client.radosgw.keyring
log file = /var/log/ceph/client.rados.$host.log
rgw_dns_name = s3.domain.com
[client.radosgw.cph4]
host = cph4
keyring = /etc/pve/priv/ceph.client.radosgw.keyring
log file = /var/log/ceph/client.rados.$host.log
rgw_dns_name = s3.domain.com
Access each node in the cluster and install RADOSGW package:
[email protected]:~# apt install radosgw
[email protected]:~# systemctl restart radosgw
At this stage, RADOSGW has created few default pools and it should be ready to be accessed. We can test if RADOSGW installation was successful by accessing any nodes on port 7480, http://<node_ip>:7480. If RADOSGW is fully configured we should see some XML code as following:
<ListAllMyBucketsResult xmlns="http://s3.amazonaws.com/doc/2006-03-01/">
<Owner>
<ID>anonymous</ID>
<DisplayName/>
</Owner>
<Buckets/>
</ListAllMyBucketsResult>
By default, SSL is not enabled in RADOSGW. SSL can be enabled using either Civetweb or FastCGI. In this guide, we are going to use Civetweb to enable SSL for Ceph Object Storage. Although SSL can be configured Self-signed SSL, it is highly recommended to use paid 3rd party SSL provider or Let’s Encrypt SSL. This is important if the S3 interface would need to be exposed for public access over the Internet. Check out the SSL offerings by Symmcom powered by Sectigo, formerly Comodo CA.
Enabling SSL in RADOSGW requires a single certificate file with the main certificate, CA certificate and private key added. For our example, we have three files:
The CA bundle usually contains all necessary certificates provided by the Certificate Authority. We are going to combine all three files into a single file named cph_radosgw.pem as following:
[email protected]:~# cat /etc/ssl/certs/sectigo_ca_bundle.crt >> /etc/ssl/certs/cph_radosgw.pem
[email protected]:~# cat /etc/ssl/private/cph_domain_com.key >> /etc/ssl/certs/cph_radosgw.pem
Copy the certificate file to all member nodes in the cluster.
Add the following line in /etc/ceph/ceph.conf. Change IP as needed based on the network environment. Note that the ‘s’ after the port number is not typo:
rgw_frontends = civetweb port=10.0.0.11:443s num_threads=50 ssl_certificate=/etc/ssl/certs/cph_domain_com.pem
The final configuration for RADOSGW will be as following:
[client.radosgw.cph1]
host = cph1
keyring = /etc/pve/priv/ceph.client.radosgw.keyring
log file = /var/log/ceph/client.radosgw.$host.log
rgw_dns_name = s3.domain.com
rgw_frontends = civetweb port=10.0.0.11:443s num_threads=50 ssl_certificate=/etc/ssl/certs/cph_domain_com.pem
Restart RADOSGW service using the following command to apply the changes:
[email protected]:~# systemctl restart radosgw
Although the installation process of RADOSGW is very straight forward, issues can occur due to few common mistake and misconfiguration.
Misconfigured DNS name in the configuration file. The rgw_dns_name in the Ceph configuration file is how RADOSGW will respond any request to. So if the value entered as FQDN but you are trying to access it with IP address, the S3 interface will be inaccessible.
It is a common practice to allow users to connect over the Internet to S3 object storage using FQDN. Usually, the format is bucketname.s3.domain.com or something similar. If the configured RADOSGW is placed in a multi-tenant environment where different users all from different entities need to access their own S3 buckets, then using bucketname.s3.domain.com is a better way to go.
In such a scenario, each bucket name would require an A record in the nameserver associated with the domain name. Depending on the number of users, manual creation of these DNS records can become a tedious task. So a DNS record such as *.s3.domain.com will work best for all bucket users. The free plan of Cloudflare does not offer the creation of wildcard record for a subdomain. Create the records manually or use Cloudflare Enterprise Plan.
SInce RADOSGW require a single certificate file, an error can occur when combining all the certificate files into one. Ensure to have the certificate content as following order:
Refer to section Configuring SSL for a full command to combine certificate files.
Ceph Object Gateway daemon RADOSGW comes with a wide range of commands to manage every aspect of the storage. Visit RADOSGW Documentation for more detailed commands.
RADOSGW includes a utility program for all administrative tasks named radosgw-admin. The command format for all user related management is:
# radosgw-admin user [options …]
To create a new user:
#radosgw-admin user create --display-name=”John Doe” --uid=jdoe --email=This email address is being protected from spambots. You need JavaScript enabled to view it.
To remove the user and purge all data:
#radosgw-admin user rm --uid=jdoe --purge-data
To check full info of a specific user:
#radosgw-admin user stats --uid=jdoe
The command format for all bucket related management is:
# radosgw-admin bucket [options …]
To see a full list of buckets:
#radosgw-admin bucket list
To link a user to a specific bucket:
#radosgw-admin bucket link --bucket=<bucket_name> --uid=<user_name>
To unlink a user to a specific bucket:
#radosgw-admin bucket unlink --bucket=<bucket_name> --uid=<user_name>
The command format for to manage RADOSGW Realm is::
# radosgw-admin realm [options …]
This is a hosted service to store and serve websites over the internet by individuals or businesses. All software and hardware needed to serve websites are set up and maintained by the hosting provider. When a user makes a request to go to a site through the use of a browser, all data for the site is then downloaded and the browser renders the full page content for the user.
Besides hosting a website, the hosting service may also refer to hosting emails, files, database, etc. So in a sense, just because it is called Web Hosting service, it does not need to serve websites only.
A web hosting plan is usually connected to a domain name such as domain.com. The domain can be purchased directly from the hosting provider or from another provider. If the domain name is hosted elsewhere, then the website for the domain can be easily pointed to the web hosting provider by the use of DNS entries. Usually, these DNS entries are made where the actual domain is hosted. Basically, a DNS entry translates the domain name to the IP address of the server where the hosting plan is located.
The importance to have a good web presence through a good web site cannot be stressed. But it all starts with a great hosting provider. A web hosting provider is not just a service provider but they are also your business partner to help you succeed. A great hosting provider should have some of the following characteristics. Use this as a measuring stick when shopping around for a great web hosting provider:
Top-notch Customer Service
Day or Night, Rain or Shine, you should be able to reach the hosting provider in a time of need. You don’t need a reply many hours later, you need it now. A great hosting provider understands that and will do everything to be available when you need them the most.
A great hosting provider must know their stuff. Not all businesses are the same, not all personal websites are alike. You should be able to ask the most difficult technical questions based on your needs and the hosting provider should be able to offer a solution that works just for you.
A great hosting plan should never force you to think about your finance before making a hosting plan decision. It should not cut features to offer great price either. A great hosting plan will give you all the bells and whistles at an amazing price.
Most hosting plans come with loads of features. Some feature lists are so extensive that they can be as cumbersome as studying for a college degree for an average user. Following are some of the important features to look for that should never be ignored:
No, there is no Typo in this Promotion. This is indeed a Web Hosting offering for just $1 per month, that is soon to launch your way. In this product blog, we will try to give you all the details you need to know, so you can take full advantage of this promotional offer.
This is as clear as the title itself. You pay just $1 USD every month for the selected web hosting plan charged on a Yearly basis at $12 for as long as you continue the hosting service.
“I am surely missing lots of features at this price,” you say? Absolutely Not! No features have been taken out nor the service quality has been lowered in order for us to offer you this promotion.
Then, how in the world are we able to do this? Of course, we are not in the charity business. Like all other businesses, we also have bills to pay, employees to feed, servers to upgrade. We are doing this promotion simply to put ourselves out there to serve as many people as we can. Our hope is that with the low price for a quality feature rich web hosting plan, you are going to become a long term Symmcom cloud user and maybe tell others about the amazing service you are enjoying.
The promotion is going to run for one whole month to give enough exposure so everybody can be part of this. This promotion is for everyone, whether you are a freelance web developer or an individual in charge of managing the corporate site. The selected promotional hosting plan you will purchase during this period will remain at the same price point even long after the promo is over.
Here are a few ideas of how you can take full advantage of this promotional hosting plan to get you started:
Want to give us a try to test how good we are? Give this promotional web hosting plan a try before committing to more services.
This is a perfect promotional web hosting plan for any freelance web developer. A web developer usually purchases hosting plans for their clients. At $1-A-Month web hosting plan, the markup of hosting fees they can charge to their client base is clearly very significant.
Are your websites scattered over multiple hosting providers? This is usually the case when site decisions were based on prices to take advantage of different promotions over some length of time. The $1-A-Month promotion is the closest you can come to get free web hosting plans. And we all know how much trouble those freebies cost us. Bring all your sites under one roof with this lowest hosting plan in the industry. We even will help you throughout the website migration process from beginning to end.
It is a hosted service to store and serve websites over the internet by individuals or businesses. All software and hardware needed to serve websites are set up and maintained by the hosting provider. When a user makes a request to go to a site through the use of a browser, all data for the site is then downloaded and the browser renders the full page content for the user.
Besides hosting a website, the hosting service may also refer to hosting emails, files, database, etc. So in a sense, just because it is called Web Hosting service, it does not need to serve websites only.
A web hosting plan is usually connected to a domain name such as domain.com. The domain can be purchased directly from the hosting provider or from another provider. If the domain name is hosted elsewhere, then the website for the domain can be easily pointed to the web hosting provider by the use of DNS entries. Usually, these DNS entries are made where the actual domain is hosted. Basically, a DNS entry translates the domain name to the IP address of the server where the hosting plan is located.
The importance to have a good web presence through a good web site cannot be stressed. But it all starts with a great hosting provider. A web hosting provider is not just a service provider but they are also your business partner to help you succeed. A great hosting provider should have some of the following characteristics. Use this as a measuring stick when shopping around for a great web hosting provider:
Day or Night, Rain or Shine, you should be able to reach the hosting provider in a time of need. You don’t need a reply many hours later, you need it now. A great hosting provider understands that and will do everything to be available when you need them the most.
A great hosting provider must know their stuff. Not all businesses are the same, not all personal websites are alike. You should be able to ask the most difficult technical questions based on your needs and the hosting provider should be able to offer a solution that works just for you.
A great hosting plan should never force you to think about your finance before making a hosting plan decision. It should not cut features to offer great price either. A great hosting plan will give you all the bells and whistles at an amazing price.
Most hosting plans come with loads of features. Some feature lists are so extensive that they can be as cumbersome as studying for a college degree for an average user. Following are some of the important features to look for that should never be ignored:
The $1-A-Month promotion is going to apply to only one of our hosting plans. Currently, there are three hosting plans available from Symmcom. Following are the details of what is included in the plan:
Plan Name: Web Hosting Web-L1
The offer is going to continue from Feb 1st, 2019 to Feb 28th, 2019 for new orders. Any Web-L1 hosting plan purchased during this period will remain at $1 /month or $12/yearly as long as the client continues the service.
The web hosting industry is saturated with hundreds of different hosting providers. That is a fact. So what sets Symmcom Web Hosting service apart? Hopefully, the following few points will answer that question.
We do our day to day activities just like everyone else but our focus is always in the future. We are obsessed to stay ahead of the wave by continuously learning about upcoming changes or improvements in the web hosting industry. In a rapidly changing industry such as Cloud where things are reinvented every few months, it is crucial to keep up with the changes, so you don’t have to.
Unlike lots of “Here Today, Gone Tomorrow” businesses, we are an extreme believer and follower of “Here Today, Thriving Tomorrow”. We challenge you to test us.
We stand firmly behind our 30 Day money back guarantee. If for whatever reason you did not like our service in your first 30 days, simply ask and we will provide you a 100% refund. No question asked. We do request that you let us know the reason of cancellation so we can better our services.
We will walk with you throughout the process of the site transfer from your existing hosting provider at absolutely no cost. Just ask. We will also tackle any issue that may arise during the site transfer.
All of our web hosting plans come with cPanel dashboard to manage every part of your web hosting plan. cPanel today is the most popular and powerful platform to manage hosting service. With over 20 years under their belt, cPanel is feature-rich, stable and user-friendly.
Along with cPanel, all hosting plans also come loaded with over 450 apps which are installable with just a click. App Installer provided by Softaculous comes with fully browseable categorized app list, app demo, single click installer, and feature-packed backup option.
Our technical support is free from the boundaries of timezone or region. It does not matter what time of the day or from where you open a support ticket, somebody will send a real reply within a few hours. We are also never shut down even during Christmas or New Year. All you have to do is reach out to us with your issue.
We protect your digital data as you protect your home and family. To us, no data is less important no matter the service. Your uploaded data is monitored 24/7 and guarded behind multiple encryptions and security layers. All hosting accounts are fully backed up twice a month. You can add more frequent backups for an extra charge.
Sooner or later the world will fully run on IPv6 as the existing IPv4 will be fully unable to sustain the future internet connected devices. IPv4 is being consumed at an unprecedented rate. We are ready now. You can serve your site on IPv6 network and be future ready.
Reach out to us using any of the media and we will be more than happy to answer your question. Whether you are a paid customer or just need a question answered, we are here for you. Simply fill out the Contact Form above.
If you are an existing customer, you can open a Support Ticket through your Symmcom Client Area. This will provide you the fastest support. Our ticket system is monitored 24/7 so we can provide a live response regardless of time of the day across all time zones.
Become part of the Community by connecting with us on various Social Media platform. Help others with Cloud questions or receive help.
This terms and conditions sets out the rights, responsibilities and limitations of the parties involved with Cloud service provided by Symmcom hereon referred to as “service provider” and an individual, group or entity placing order hereon referred to as “client”, “customer” or “end user”. This Terms & Conditions is effective upon placing order for any cloud service through Symmcom website. This terms are subject to change with or without prior notice.
CLIENT MUST FOLLOW THE CONTENT LIMITATIONS LAID OUT IN THIS SECTION. FAILURE TO DO SO WILL CAUSE IMMEDIATE SUSPENSION OF SERVICE.
Forked from MySQL, created with love by original MySQL developers, MariaDB is one of the most popular open source database platforms to this date. MariaDB is guaranteed to stay open source. In this guide, we are going to see how to install MariaDB 10.x on Ubuntu 18.04.
Using CentOS 7.0? Here is the guide on How To Install and Secure MariaDB 10.x on CentOS 7.0.
We are going to start the installation of MariaDB by first updating the Ubuntu 18.04 operating system. Simply run the following command to fully update
# sudo apt update
# sudo apt dist-upgrade
Since MariaDB 10.x is already included in the Ubuntu 18.04 repository, the installation of MariaDB is very straightforward using the following command. We are going to install both MariaDB server and client component:
# sudo apt install mariadb-server mariadb-client
We are going to enable MariaDB Server to auto start during boot then start the service.
# systemctl enable mariadb
# systemctl start mariadb
MariaDB comes with a built-in script to help secure a MariaDB server. The requires several user inputs. The following command will start the securing script:
# sudo mysql_secure_installation
Type in y when asked to set root password and type in the new password twice.
NOTE: RUNNING ALL PARTS OF THIS SCRIPT IS RECOMMENDED FOR ALL MariaDB
SERVERS IN PRODUCTION USE! PLEASE READ EACH STEP CAREFULLY!
In order to log into MariaDB to secure it, we'll need the current
password for the root user. If you've just installed MariaDB, and
you haven't set the root password yet, the password will be blank,
so you should just press enter here.
Enter current password for root (enter for none):
OK, successfully used password, moving on...
Setting the root password ensures that nobody can log into the MariaDB
root user without the proper authorization.
Set root password? [Y/n] y
New password:
Re-enter new password:
Password updated successfully!
Reloading privilege tables..
... Success!
Type in y to remove the built-in anonymous user.
By default, a MariaDB installation has an anonymous user, allowing anyone
to log into MariaDB without having to have a user account created for
them. This is intended only for testing, and to make the installation
go a bit smoother. You should remove them before moving into a
production environment.
Remove anonymous users? [Y/n] y
... Success!
Type in y to disallow root access into the database outside the server itself.
Normally, root should only be allowed to connect from 'localhost'. This
ensures that someone cannot guess at the root password from the network.
Disallow root login remotely? [Y/n] y
... Success!
Type in y to remove the built-in database named test.
By default, MariaDB comes with a database named 'test' that anyone can
access. This is also intended only for testing and should be removed
before moving into a production environment.
Remove test database and access to it? [Y/n] y
- Dropping test database...
... Success!
- Removing privileges on test database...
... Success!
Type in y to apply all the changes thus far.
Reloading the privilege tables will ensure that all changes made so far
will take effect immediately.
Reload privilege tables now? [Y/n] y
... Success!
At this point, the MariaDB server is fully configured and ready to serve. Connect to the database to ensure root credential is working.
# mysql -u root -p
MariaDB [(none)]>
Congratulations! Your MariaDB Server 10.x is now fully configured and secured on Ubuntu 18.06.
[Resolved] Jan 4th, 2019 - 20:10:02 PM MST
The Symmcom Client Area is now fully accessible normally. Due to PHP update, there was a version mismatch for IonCube which caused the client area inaccessible.
[Issue] Jan 4th, 2019 - 19:42 PM MST
The Symmcom Client Area which is accessible from https://cloud.symmcom.com became completely inaccessible. The Client Area allows users to manage all Symmcom provided services and access Support Ticket System when needed.
[Scheduled Maintenance] Dec 26th, 2018 - 01:00 AM MST
This is scheduled maintenance to patch operating systems for Web Servers. This patch will upgrade the platform in preparation to launch $1-A-Month Web Hosting packages.
This issue occurs when a node rejoins a Proxmox cluster using the same IP address or there are no static DNS entries for Proxmox nodes. Even if the passwordless SSH works between nodes, we may see an error as following through GUI when trying to migrating or replicating:
2018-11-09 08:48:23 # /usr/bin/ssh -e none -o 'BatchMode=yes' -o 'HostKeyAlias=PMX01' This email address is being protected from spambots. You need JavaScript enabled to view it. /bin/true
2018-11-09 08:48:23 @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
2018-11-09 08:48:23 @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
2018-11-09 08:48:23 @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
2018-11-09 08:48:23 IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
2018-11-09 08:48:23 Someone could be eavesdropping on you right now (man-in-the-middle attack)!
2018-11-09 08:48:23 It is also possible that a host key has just been changed.
2018-11-09 08:48:23 The fingerprint for the RSA key sent by the remote host is
2018-11-09 08:48:23 SHA256:AwjDV7HjOjWaRruzdf4453452223JIkugHk1I7HFcVLfG+lx+wOAg.
2018-11-09 08:48:23 Please contact your system administrator.
2018-11-09 08:48:23 Add correct host key in /root/.ssh/known_hosts to get rid of this message.
2018-11-09 08:48:23 Offending RSA key in /etc/ssh/ssh_known_hosts:11
2018-11-09 08:48:23 remove with:
2018-11-09 08:48:23 ssh-keygen -f "/etc/ssh/ssh_known_hosts" -R pmx01
2018-11-09 08:48:23 RSA host key for pmx01 has changed and you have requested strict checking.
2018-11-09 08:48:23 Host key verification failed.
2018-11-09 08:48:23 ERROR: migration aborted (duration 00:00:00): Can't connect to destination address using public key
TASK ERROR: migration aborted
The reason for this error is Scripts uses the hostname rather than IP address to access other Proxmox nodes. So there need to be SSH keys attached to the hostname. If Proxmox nodes are set up with DNS entries when they are joined to the cluster, the joining process creates the SSH keys and attaches the hostname with the keys.
1. First, ensure that passwordless SSH works as expected by logging into one of the Proxmox nodes then accessing the node causing the host key verification issue using the following command:
# ssh <destination_IP>
2. Add static DNS entries as following in /etc/hosts file or in the DNS servers the Proxmox nodes are pointed to:
X.X.X.X <hostname>
3. Run the following command from the source Proxmox node to copy ssh key for the destination host:
# ssh-copy-id <destination_hostname>
Note here that do not use the IP address of the destination node. Use hostname only.
4. Test that issue is now fixed by accessing the destination node through SSH using hostname as follows:
# ssh <destination_hostname>
Depending on how many nodes are having this issue, you may have to follow this instruction multiple times for the nodes. This solution can also be applied to any Linux distribution having SSH host key verification issue.
Follow Us