Platform as a Service
10
 min read

ZC2® Jelastic SSH Access

ZC2® Jelastic SSH Access

Learn the multiple ways to access ZC2® PaaS / Jelastic platform.

View Whitepaper

SSH Access

The ZC2® PaaS Jelastic platform supports access via SSH in one of the following ways:

  • Web SSH An access to a separate node within your environment, which is based on the user’s session; connection is initiated upon clicking the Web SSH button next to the desired environment in dashboard (which allows to connect from anywhere over Internet, using just a browser).
  • SSH Gate Such connection type is based on the SSH key pair usage and allows access to either whole PaaS account or just a particular container; it provides the substantial level of security, connecting only instances with private SSH key that matches the appropriate public key, stored within your Platform account settings.

After accessing node via SSH using any of the above-described methods, you can start managing your container.

SSH Access via Web Browser

The platform allows you connect to any container directly through the browser by means of the Web SSH client, without the necessity to generate dedicated SSH key pair or apply any other additional configurations.

Just click the Web SSH button next to the required layer or a particular node for the tab with terminal emulator to be opened:

Using the options in the tools panel above the editor window, you are able to:

  • switch between nodes of the horizontally-scaled layer, choosing a particular one within the Node ID drop-down list
  • open one more tab with connection to the current container by clicking on the Duplicate Session option (this allows to perform several simultaneous operations on a single node, e.g. to tail logs in one terminal window and to manage an application itself in another one)

Also, web SSH client is provided with the embedded shortcuts for convenient management (their list can be also viewed by hovering over the keyboard icon in the top-right corner of the tab):

  • Copy (Ctrl + Shift + C)
  • Paste (Ctrl + V)
  • Settings (Ctrl + Shift + Alt) - allows to configure emulator, e.g to switch the input method, manually change the clipboard text, etc

Now, you can start managing your container via SSH (for example, set custom variables, change firewall settings, etc.).

Access via SSH Gate

In order to establish connection via SSH Gate, you need to generate SSH key pair and to add public key to your account at the dashboard (if needed, read the linked step-by-step guides for assistance).

Next, get an SSH connection string for your account by clicking the Settings button at the top panel of the dashboard.

In the opened Account settings window, the SSH Keys > SSH Connect tab will be opened by default. Here, you can see information required for accessing an account, including an SSH connection string (circled in the image below).

Tip: Within the right part of the section you can establish Web SSH connection to any node directly in browser.

Now, you can access either whole PaaS account or just a particular container with your local SSH client.

SSH Access to Platform Account

Depending on your OS, you need to perform the following steps:

  • Linux/MacOS/FreeBSD

Open your terminal and execute the SSH connection string.

  • Windows

Download and run your SSH client (PuTTY as an example).

Navigate to the Session tab in the left-hand list and fill in the Host Name (or IP address) and Port fields in accordance with your SSH connection string.

Note: In order to add your private SSH key with PuTTY, download and run Pageant tool, click the Add Key button and choose the appropriate SSH key file.

1. Once connected, you will see a list of environment groups (with a number of containers within provided in brackets) and ungrouped environments available for your account. Select the required point by entering the appropriate number.

Note: Only running environments can be accessed.

2. After selecting an environment, you’ll see a full list of its containers, which are grouped by layers. Herewith, the master node (required for clustering, scaling, cloning, etc.) is designated with the [M] mark.

Also, each container is provided with nodeid, LAN IP, WAN IP and Alias data. In order to access the required node just enter its number.

Direct Access to Container

You can “jump” directly to the necessary container, skipping the steps of choosing the appropriate environment and node. Just state the appropriate container ID (can be seen at the dashboard next to the corresponding node) at the beginning of the connection string.

For example, in order to access the Tomcat container, which is shown in the image above, you should add the 36864- prefix to the default account connection string in the following way:

ssh 36864-4701@gate.jelastic.com -p 3022

Such a possibility can be useful for automatization scripts or for setting up application configurations (for example, Capistrano).

Author
Mark Grindey
Group CEO / MD

Mark Grindey is a dedicated professional with a strong passion for cloud computing and a mission to make it accessible to all. With a over a decades experience and a deep understanding of existing cloud technologies, Mark Grindey is constantly striving to improve and enhance these tools, ensuring that their benefits can be leveraged by businesses of all sizes.

Latest Articles
Cybercrime Crackdown: How Two Major Networks Were Dismantled
Cybercrime Crackdown: How Two Major Networks Were Dismantled

In an era where digital transactions are commonplace, cybercrime has emerged as a significant threat. Recently, two major operations led to the dismantling of cybercrime networks, demonstrating the relentless efforts of law enforcement agencies worldwide.

News
2
 min read
Tackling Cybersecurity Challenges in the Public Sector: Strategies for Protection
Tackling Cybersecurity Challenges in the Public Sector: Strategies for Protection

In today's digital age, cybersecurity has become a paramount concern for governments worldwide. The public sector faces unique challenges in safeguarding sensitive data and critical infrastructure from cyber threats. As government agencies increasingly rely on digital systems to deliver essential services and manage vast amounts of information, the need for robust cybersecurity measures has never been more critical.

Public Sector
4
 min read
Navigating the Digital Revolution: The Impact of Digital Transformation on Public Services
Navigating the Digital Revolution: The Impact of Digital Transformation on Public Services

In an era characterised by rapid technological advancements, the digital transformation wave has permeated nearly every aspect of society. From businesses to personal lives, the integration of digital technologies has reshaped the way we interact, communicate, and access information. One significant area where this transformation is profoundly felt is in public services.

Public Sector
3
 min read
Exploring the Role of AI and Machine Learning in Enhancing Public Sector Efficiency
Exploring the Role of AI and Machine Learning in Enhancing Public Sector Efficiency

The integration of artificial intelligence (AI) and machine learning (ML) into the public sector is revolutionising how governments operate and serve their citizens. These technologies have the potential to greatly benefit the public sector by optimising resource allocation, improving service delivery and enhancing public sector efficiency.

Public Sector
3
 min read
View All Articles