Enabling or Disabling Root Access on HyperScale Flex

On new installations of a HyperScale Flex cluster, password-based root access is disabled by default to enhance security. When root access is disabled, only the cvbackupadmin user can log in and access the nodes.

Some administrative or troubleshooting operations may require root access. In such cases, you can temporarily enable root access for all nodes in a storage pool, perform the required operation, and then disable root access once the task is complete.

When root access is enabled, it is automatically disabled after 24 hours, reducing the risk of prolonged privileged access. Root access can also be disabled manually at any time.

Use the HyperScale OS Node Root Access workflow in the Command Center to enable or disable root access in a controlled and auditable manner.

Note

When root access is disabled, SSH and console login using the root user are prohibited.

Before You Begin

Ensure that the HyperScale OS Node Root Access workflow is available in the Command Center. If the workflow is not already available, download and deploy it from the Commvault Store

For instructions on managing workflows, see Managing Workflows.

Procedure

  1. In the Command Center navigation pane, go to Workflows.

  2. Click HyperScale OS Node Root Access.

  3. In the workflow dialog, select the required operation:

  4. Enable – Enables password-based root access.

  5. Disable – Disables password-based root access.

  6. Click OK.

  7. When prompted, select the HyperScale Flex server for which you want to enable or disable root access.

  8. Click DONE to submit the request.

Approval Workflow

After you submit the request, the system sends a root access request for approval.

  • For non-company users, a master user group member must approve the request.
  • For company users, a tenant admin group member must approve the request.

Root access is enabled or disabled only after the approval is granted.

What to Do Next

After completing the required troubleshooting or maintenance activity, it is recommended to disable root access using the same workflow to maintain system security.

×

Loading...