Alexey7
Mega Sage

Hi, 

I'd like to share some details on how to configure credentials to discover Linux servers running on AWS environment.

What you need:

- MID server running on AWS environment you trying to discover (plenty of docs out there, i'm not going to details here);

- .pem file with a private key;

- security groups configured for inbound/outbound traffic appropriately (ec2 instance you trying to discover must allow inbound traffic on port 22 for TCP protocol, and all outbound traffic. These are default settings. ec2 instance the mid-server is running on must allow outbound traffic.

Create new credentials:

- Navigate to Discovery > Credentials > New > SSH Private Key Credentials.

- In Name field provide whatever you want

- In User Name field specify the appropriate user name:

  • For Amazon Linux 2 or the Amazon Linux AMI, the user name is ec2-user;

  • For a CentOS AMI, the user name is centos;

  • For a Debian AMI, the user name is admin or root;

  • For a Fedora AMI, the user name is ec2-user or fedora;

  • For a RHEL AMI, the user name is ec2-user or root;

  • For a SUSE AMI, the user name is ec2-user or root;

  • For an Ubuntu AMI, the user name is ubuntu;

  • Otherwise, if ec2-user and root don't work, check with the AMI provider.

- In SSH private key field paste .pem file in the following format (you can open and review it with a text editor for code):

find_real_file.png

- Make sure Active field is ticked; you can also specify MID Server in Applies to field choose "Specific MID servers" and add the MID server under MID servers list field;

Test credential:

- using Test credential related link using Linux server IP address (private IP in my case)

find_real_file.png

find_real_file.png

- Running Quick Discovery against the same IP address.

 

Hope this information will be useful!

Regards,

Alexey

 

Version history
Last update:
‎07-25-2019 06:21 AM
Updated by: