Trusted hosts
Configure trusted hosts to enable sharding for JSON data.
Use this page to add or delete hosts for the trusted host relationships for the database server. The values are updated in the file that is referenced by the database server's REMOTE_SERVER_CFG configuration parameter. Database servers in a shard cluster must have trusted-host relationships.
Prerequisites:
- You must be a database server administrator (DBSA).
- You must be using database servers in a shard cluster.
Click Add or Delete to update the list of trusted hosts.
- Host name
- The host name of the other database server. Add an entry for the
local host names and the fully qualified domain names for the other
database servers in a shard cluster. For example, perseus and perseus.example.com.
If the host name is an alias (the host name that a remote
host uses to connect to a particular computer differs from the host
name that the computer uses to refer to itself), add the alias as
well.
If you are configuring trusted hosts for secondary servers, configure the trusted hosts on the primary server.
- User name
- Optional. The user account with authority over the database-server instance at the specified host. Without a user name, all users are trusted. If a user name is specified, then that same user name must be used for all hosts that are used in the sharding scheme. If you add a user name, add it for the local host name, for the fully qualified host name, and for any aliases.