Your company's network policies seem to be a good thing. I've worked at places with this same policy, for good reason. But it does tend to complicate operations sometimes. Some options you might pursue:

* Set up ssh-agent on the clients and use passphrase-protected keys. Downside to this, someone on your ops team will be inevitably awoken at 4am to type in the password. * Try to get an exception to the policy by running Solr under a new user account inside a jail. Use a restricted login shell to make sure it can do only what you intend. So when the key is compromised, damage is contained.

Or, write a custom server/client running on a different port. In this case you lose over-the-wire encryption, and if your server is buggy, you get pwn3d anyway.

--Matt

On Nov 29, 2007, at 7:48 PM, Justin Knoll wrote:

Hello,
I recently set up Solr with distribution on a couple of servers. I just learned that our network policies do not permit us to use SSH with passphraseless keys, and the snappuller script uses SSH to examine the master Solr instance's state before it pulls the newest index via rsync.

We plan to attempt to rewrite the snappuller (and possibly other distribution scripts, as required) to eliminate this dependency on SSH. I thought I ask the list in case anyone has experience with this same situation or any insights into the reasoning behind requiring SSH access to the master instance.

Thanks,
Justin Knoll

--
Matt Kangas / [EMAIL PROTECTED]


Reply via email to