Solved

Invalid RPC login - Webmin

Posted on 2006-11-10
2
2,673 Views
Last Modified: 2013-12-16
Hi,
I am setting up a Webmin cluster, but get "Invalid RPC Login for <server>" when adding servers to the Webmin Server Index. Could someone please tell me the purpose of RPC and how I can resolve this.
Thanks.
0
Comment
Question by:demonzzz
2 Comments
 
LVL 4

Accepted Solution

by:
wbstech earned 250 total points
ID: 17929426
I can't give you a resolution, but here's some info on Webmin and RPC that hopefully will (Full doc available at http://www.webmin.com/modules-printable.html):

---------------

Remote Procedure Calls
Webmin versions 0.82 and above has several common functions for executing code on remote Webmin servers. They are used by some of the standard modules (such as those in the Cluster category) to control multiple servers from a single interface, and may be useful in your own modules as well. These functions, all of which have names starting with remote_, let you call functions, evaluation Perl code, and transfer data to and from other system running Webmin.
Before a 'master' server can make RPC calls to a remote host, it must be registered in the Webmin Servers Index module on the master system. The Link type field must be set to Login via Webmin and a username and password entered. The user specified should be root or admin, as others are not by default allowed to accept RPC calls.

RPC is usually used to call functions in other modules on a remote system, or common functions. This is done with the remote_foreign_call function, but before it can be used remote_foreign_require must be called to load the library for the module that you want to call. This is very similar to calling functions in other local modules with the foreign_ functions, explained in the "Functions in Other Modules" section.
0
 

Author Comment

by:demonzzz
ID: 18044021
Thanks wbstech, not quite a solution but has given me a much better idea of what it does, which i'm sure will help.
Thanks.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

In this tutorial I will explain how to make squid prevent malwares in five easy steps: Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. It reduces bandwidth and improves response times by caching and reusing frequently-…
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now