Configuring Device Credentials

Download this manual as a PDF file

This section describes how to configure the credentials required by the automation actions in the Linux SSH Automation PowerPack.

If you already have the Linux Base Pack PowerPack installed and monitoring your Linux devices, you do not need to configure an additional credential.

Authentication for Linux Devices with the Linux SSH Automations PowerPack

The "Execute Shell Commands" custom action type supports hard-coded credentials (wherein you specify the ID of a credential in the automation action), or the custom action type can dynamically determine the credential to use. By default, the automation actions use the dynamic method (by specifying credential ID 0 in the input parameters). The dynamic method uses the first credential that matches the following rules:

  • If the "Linux: Configuration Cache" Dynamic Application (from the Linux Base Pack PowerPack) is aligned to the device associated with the triggering event, the credential aligned to that Dynamic Application is used.
  • If the "Linux: Performance Cache" Dynamic Application (from the Linux Base Pack PowerPack) is aligned to the device associated with the triggering event, the credential aligned to that Dynamic Application is used.
  • If neither of the listed Dynamic Applications is aligned to the device associated with the triggering event, the first available SSH/Key credential aligned to the device as a secondary credential is used.

Creating a Credential

If you already have the Linux Base Pack PowerPack installed and monitoring your Linux devices, you do not need to configure an additional credential.

If you do not have the Linux Base Pack PowerPack installed, you must create an SSH credential that includes the username and password, or username and private key, combination to communicate with your Linux devices.

To create a credential:

  1. Go to the Credential Management page (System > Manage > Credentials).
  2. Click Actions and select Create SSH/Key credential. The Create New SSH/Key Credential page appears.
  3. Supply values in the following fields:
    • Credential Name. Enter a name for the credential.
    • Hostname/IP. Hostname or IP address of the device from which you want to retrieve data.
      • You can include the variable %D in this field. SL1 will replace the variable with the IP address of the current device (device that is currently using the credential).
      • You can include the variable %N in this field. SL1 will replace the variable with hostname of the current device (device that is currently using the credential). If SL1 cannot determine the hostname, SL1 will replace the variable with the primary, management IP address for the current device.
    • Port. To use SSH to connect to the device, enter "22" in this field.
    • Timeout(ms). Enter a timeout, in milliseconds, for the connection.
    • Username. Enter the username for an SSH user or user account on the device to be monitored.
    • Password. Enter the password for the user you entered in the Username field.
    • Private Key (PEM Format). Enter the SSH private key that you want SL1 to use, in PEM format.

  4. Click Save.

For more information about configuring credentials in SL1, see  Credentials.