Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

Managing a Distribution Server hierarchy

The server hierarchy management primarily happens in the server hierarchy view, which can be accessed via Hosts → Manage Server Hierarchy. In this view, the left side shows the current distribution group hierarchy. The right side shows the details about the currently selected group.

By default, the hierarchy contains only the top-level group called Management Server. All newly registered hosts are placed into it, and hosts in it will contact the Management Server directly.

Using the button Create new group, you can create a new group under the currently selected one. The new group will immediately appear in the tree view.

Using the button Rename this group, you can rename the currently selected group. The rename is always allowed and does not require redeployment.

Using the button Delete this group, you can delete the currently selected group. The group must not have any hosts in it (either in the current group view, or hosts that have been moved from the group but not deployed into their new group yet). The group also must not have any subgroups or the deleting will fail.

Managing server hierarchy

Figure 5.2. Managing server hierarchy

For groups under the top-level group, the currently set Distribution Servers for each group are shown. Along with the current selection, there is a dropdown menu for setting the Distribution Server. Hosts which have previously been converted into Distribution Servers and are not in use by any other group are available for selection here. (To convert a host, press Convert to Distribution Server after selecting the host in Hosts → View hosts.)

To organize the hosts into distribution groups, you can select the hosts to be moved from their current group's host list, select the destination group from the dropdown list, and press Move now.

Changes made to the hierarchy are shown immediately in the hierarchy view, but they do not take effect until a separate deployment step.


Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more