SUSE Support

Here When You Need Us

'crm cluster start' fails when permitrootlogin is set to 'no'

This document (000021287) is provided subject to the disclaimer at the end of this document.

Environment

SUSE Linux Enterprise Server 15 SP5

Situation

If permitrootlogin is set to 'no' in the sshd_config as a security hardening configuration, 'crm cluster start' doesn't start the cluster and the following error can be seen:

# sudo crm cluster start
ERROR: cluster.start: Can not create ssh session from <node_a> to <node_a>


The same happens with 'sudo su - crm cluster start'.
When permitrootlogin is set to 'yes' the cluster will start.

Resolution

As a workaround pacemaker can be started via systemd and then the crm command works.

The crmsh update released December/2023 (crmsh-4.5.0+20231128.4c7bd70-150500.3.16.1) contains the patch to resolve the problem.

Cause

'crm cluster start' runs commands with ssh even on localhost and when ssh login is disabled for root, the cluster won't start.

Disclaimer

This Support Knowledgebase provides a valuable tool for SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.

  • Document ID:000021287
  • Creation Date: 30-Nov-2023
  • Modified Date:17-Jan-2024
    • SUSE Linux Enterprise Server

< Back to Support Search

For questions or concerns with the SUSE Knowledgebase please contact: tidfeedback[at]suse.com

tick icon

SUSE Support Forums

Get your questions answered by experienced Sys Ops or interact with other SUSE community experts.

tick icon

Support Resources

Learn how to get the most from the technical support you receive with your SUSE Subscription, Premium Support, Academic Program, or Partner Program.

tick icon

Open an Incident

Open an incident with SUSE Technical Support, manage your subscriptions, download patches, or manage user access.