Agentless Hosts

Agentless Hosts are Linux-, Solaris-, or AIX-64-bit-based, OS-vendor-supported hosts that can runClosed A Control-M process that adds your job to the Run Queue of the day, according to automatic or manual scheduling, and which enables the job to execute after it fulfills its prerequisites. and execute jobs even though Control-M/Agent is not installed. This eliminates the need to install, update, and manage Control-M/Agent software on Agentless Hosts.

A Control-M/Server communicates with an Agentless Host via one or more associated Linux- or AIX-based Agents over an SSHClosed Secure Shell (SSH) is a networking protocol that enables you to securely connect and transfer information between hosts over secure and insecure networks File Transfer protocol (SFTP). For more information, see Creating an SSH Key.

Agentless Hosts can concurrently execute up to 100 jobs per associated Agent, but you can associate more Agents to increase this number.

  • Agent_A is associated with Agentless_Host_1, which executes up to 100 concurrent jobs at any time.

  • Agent_B and Agent_C are associated with Agentless_Host_2, which executes up to 200 concurrent jobs at any time. Associated Agents Agent_B and Agent_C each run 100 jobs.

  • Agent_D is associated with the following Agentless Hosts:

    • Agentless_Host_3: Executes 20 concurrent jobs while Agentless_Host_4 executes 80 jobs.

    • Agentless_Host_4: Executes 80 concurrent jobs while Agentless_Host_3 executes 20 jobs.

You can also automatically discover and add an Agentless Host, as described in Automatic Agent and Agentless Host Discovery.

Creating an Agentless Host

This procedure describes how to create an Agentless Host and connect it to one or more Agents via an SSH File Transfer protocol (SFTP). This enables you to run and execute jobs on a host where an Agent is not installed.

Before You Begin

  • Verify that Python 2.79–2.x or 3.5–3.x is installed on the Agentless Host computer.

Begin

  1. From the icon, select Configuration.

    The Configuration domain opens.

  2. From the drop-down list, select Agents.

    The Agents pane appears.

  3. From the Add Agent drop-down list, select Agentless Host.

    The Add Agentless Host pane appears.

  4. Define the Agentless Host, as described in Agentless Host Attributes.

  5. (Optional) Click Test.

  6. In the confirmation dialog, click Add Run as User.

  7. Define a Run as User for the Agentless Host, as described in Adding a Run as User.

Defining Default Agentless Host Settings

This procedure describes how to define the default Agentless Host settings. This enables you to automatically create an Agentless Host that is defined with default Agentless Host settings, as described in Automatic Agent and Agentless Host Discovery.

Begin

  1. From the icon, select Configuration.

    The Configuration domain opens.

  2. From the drop-down list, select Agents.

    The Agents pane appears.

  3. Click the Manage drop-down list on the Agents toolbar and select Default Agentless Host Settings.

    The Default Agentless Host Settings pane appears.

  4. From the Default Agentless Host Settings define the default Agentless Host settings, as described in Agentless Host Attributes.

Agentless Host Attributes

The following table describes the Agentless Host attributes for Creating an Agentless Host and Defining Default Agentless Host Settings.

Attribute

Description

Control-M/Server

Determines the Control-M/Server where the Agentless Host is connected.

Agentless Host

Defines the hostname of the Agentless Host.

Tag

(Optional) Determines the tagClosed A logical name that is used to label specific Agents in a group that has a specific authorization level. that is applied to the Agentless Host.

Associated Agents

Determines the Agents that share Agent utilities with the Agentless Host and connect the Agentless Host to the Control-M/Server.

SSH Server Port

Determines the SSH server port where the Agentless Host connects.

Compression

Determines whether to compress the encrypted communication, which increases data transfer rates over slower networks.

Sysout Directory

Defines the directory pathname where the job outputClosed A tab in the job properties pane of the Monitoring domain where the job output appears that indicates whether a job ended OK, and is used, for example, with jobs that check file location. is saved.

Creating an SSH Key

This procedure describes how to create an SSH key for one or more Agentless Hosts, which enables secure communication with an Agent.

Secure Shell (SSH) keys are authentication credentials, such as usernames and passwords, that enable Agentless Hosts and their associated Agents to communicate over a secure network communication protocol. You can determine which SSH key the Agentless Host uses in the last stage of Creating an Agentless Host when you create a Run as User, as described in Adding a Run as User. SSH supports UNIX.

Before You Begin

  • Ensure that the number of simultaneous connections between your Agentless Host and associated Agent is supported by your SSH server settings.

  • Verify that SFTP is enabled on the SSH server.

  • (Linux RedHat 9 only) Perform the security changes described in KA 000421127.

Begin

  1. From the icon, select Configuration.

    The Configuration domain opens.

  2. From the drop-down list, select Agents.

    The Agents pane appears.

  3. From the Manage drop-down list, select SSH Keys.

    The SSH Keys Management pane appears.

  4. Click .

    The Add SSH Key pane appears.

  5. Do the following: 

    1. From the Control-M/Server Name drop-down list, select a Control-M/Server.

    2. In the Key Name field, type a logical key name.

    3. In the Passphrase field, type a password.

    4. In the Confirm Passphrase field, re-type the password to confirm.

    5. In the Format of Key to Generate area, select one of the following format options:

      • OpenSSH: An open-source version of the SSH protocol.

      • SSH2: The standard, supported version of the SSH protocol.

    6. In the Type of Key to Generate area, select one of the following SSH key types:

      • RSA

      • DSA

    7. From the Number of Bits in Generated Key drop-down list, select one of the following key-lengths (in bits):

      • 256

      • 521

      • 768

      • 1,024

      • 2,048

      • 3,072

  6. Click Save.

    A message appears asking you to download a file that contains the SSH key, and then copy it to the Agentless Host.

  7. Click Download.

    The file downloads to your default download folder.

  8. Do one of the following:

    • OpenSSH Server on UNIX: Copy the content of the SSH key file from the default download folder to the following SSH public key folder on the Agentless Host:

      <Job_Owner_Home_Directory>/.ssh/authorized_keys

    • SSH2 Tectia Server: Do the following:

      • UNIX

        1. Copy the SSH key file from the default download folder to the following SSH public key folder on the Agentless Host:

          <Job_Owner_Home_Directory>/.ssh2/

        2. Open the authorization file and type the following:

          Key <SSH_Key_Filename>

    The SSH key is created and copied to your SSH server.

Authorizing an SSH Known Host

This procedure describes how to reauthorize an SSH known host, which is an Agentless Host that Control-M has automatically authorized and connected to via SSH in the past. Authorization fails when the name of the Agentless Host changes or an additional Agentless Host with the same name is added.

Begin

  1. From the icon, select Configuration.

    The Configuration domain opens.

  2. From the drop-down list, select Agents.

    The Agents pane appears.

  3. From the main details pane, select the Agentless Host to reauthorize.

  4. From the drop-down list, select Authorize SSH Known Host.

    The Authorize SSH Known Host dialog box appears.

  5. Do one of the following:

    • Host: Select the Host checkbox if the name listed matches the Agentless Host name, and click Authorize.

    • Logical Host: Select the Logical Host checkbox, type the name of the Agentless Host to reauthorize, and click Authorize.

  6. Follow the prompt.

    Control-M reauthorizes the SSH known host.