Your browser does not allow storing cookies. We recommend enabling them.

SSH Tectia

Distribution Server settings

Each Distribution Server has a couple of tuneable parameters. These can be accessed by selecting the Distribution Server from Hosts → View hosts and then selecting the tab Distribution Server Settings. The settings are described below.

Cache size

The maximum cache size of the Distribution Server. Each Distribution Server caches the transferred files (installation packages) in /var/opt/ssh-mgmt/dist-cache. When the total amount of cached files rises over this limit, the least recently accessed files are deleted to reduce the cache size under the limit. This is not a hard limit: if all files are in use (accessed during the last minute), they are not deleted. If files accessed during the last hour are deleted, the Distribution Server logs a message recommending increasing the cache size.

Minimum setting for this parameter is 0, which effectively disables the caching. To avoid filling the disk in the Distribution Server, it should not be set higher than the available disk space on the Distribution Server.

Downlink bandwidth limit

To avoid saturating the network, each Distribution Server has a setting to limit the total bandwidth of downstream file transfers. The setting is in bytes per second.

The limit should be set above zero. The default of 100 million bytes per second is the recommended maximum value.

The settings can be changed using the Edit button. The settings are not taken into use before the Distribution Server is deployed by pressing Hosts → Host Connectivity → Deploy Hierarchy → Deploy now.


Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more