Your browser does not allow storing cookies. We recommend enabling them.


Managing Distribution Server Hierarchy

The distribution hierarchy is managed using distribution groups. By default, every host resides in the top-level group and is served directly by the Management Server. From here, the administator may create a number of distribution groups, assign one or two Distribution Servers to each group, and assign the managed hosts to the groups. The hosts in each distribution group will, after deploying the hierarchy, disconnect from the Management Server and then connect to the Distribution Servers of the group. Lower level Distribution Servers will contact a Distribution Server one level up, and the first level Distribution Servers will connect to the Management Server.

Example scenario of a distributed environment

Figure 7.2. Example scenario of a distributed environment

To manage the distribution server hierarchy, select Hosts → Manage Server Hierarchy. In the server hierarchy view, the left side shows the current distribution group hierarchy. The right side shows the details about the currently selected group.

Managing server hierarchy

Figure 7.3. Managing server hierarchy

By default, the hierarchy contains only the top-level group called Management Server. All newly registered hosts are placed into it, and hosts in it will contact the Management Server directly.

Changes done in the Manage Server Hierarchy view do not affect the managed hosts in real time. Instead, it is intended that all changes are done first and then deployed in one go.


Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more