Before you begin, you must create a Port Forwarding session (also known as an SSH tunnel) to the SSH server on the instance , which by default is port 22.
You must have the private key file of the SSH key pair that you used to create the session.
The IP address of the machine must be in the CIDR block allowlist of the bastion that hosts the session.
You can use a port forwarding session to connect to instances that don't meet all requirements for a Managed SSH session.
On the Bastions list page, select the bastion that contains the port forwarding session that you want to work with.
On the details page, select Sessions, and locate the session that you want to use to connect to the intended target resource.
In the Actions menu () for the session, select View SSH command.
To copy the command, next to SSH command, select Copy, and then select Close.
Use a text editor to replace <privateKey> with the path to the private key and <localPort> with the local port on the machine from which you want to connect to the bastion.
You can use any available local port. The default SSH server port is 22.
(Optional)
Add the verbose (-v) option to the SSH command for detailed information about the connection.
Note
Don't use the -vv or -vvv options.
Use a command line to issue the customized SSH command and connect to the bastion session.
If your private key was created with a passphrase, you are prompted to enter it twice for a Dynamic Port Forwarding (SOCKS5) session.
After creating a connection to a Dynamic Port Forwarding (SOCKS5) session, the process will not exit. Do not close the terminal.
If you enabled verbose output (-v), the final message after a successful connection is:
debug1: pledge: network
Use an SSH client to connect to localhost (or 127.0.0.1) and the local port you specified, <localPort>.
Provide the name of a valid user on the instance's operating system.
Connect to Windows Using the Remote Desktop Protocol (RDP) 🔗
Before you begin, you must create a Port Forwarding session (also known as an SSH tunnel) to the RDP port on the Windows instance , which by default is port 3389.
You must have the private key file of the SSH key pair that you used to create the session.
The IP address of the machine must be in the CIDR block allowlist of the bastion that hosts the session.
To connect to a Windows instance using an RDP client and a Port Forwarding session:
On the Bastions list page, select the bastion that contains the port forwarding session that you want to work with.
On the details page, select Sessions, and locate the session that you want to use to connect to the intended target resource.
In the Actions menu () for the session, select View SSH command.
To copy the command, next to SSH command, select Copy, and then select Close.
Use a text editor to replace <privateKey> with the path to the private key and <localPort> with the local port on the machine from which you want to connect to the bastion.
You can use any available local port. The default RDP server port is 3389.
(Optional)
Add the verbose (-v) option to the SSH command for detailed information about the connection.
Note
Don't use the -vv or -vvv options.
Use a command line to issue the customized SSH command and connect to the bastion session.
If you created a private key with a passphrase, you are prompted to enter it twice for a Port Forwarding session.
After you create a connection to a Port Forwarding session, the process will not exit. Do not close the terminal.
If you enabled verbose output (-v), the final message after a successful connection is:
debug1: pledge: network
Open an RDP client and connect to localhost (or 127.0.0.1) and the local port you specified, <localPort>.
Provide the name of an existing user on the Windows instance.
Before you begin, you must create a Port Forwarding session (also known as an SSH tunnel) to the RDP port on the Windows instance , which by default is port 3389.
You must have the private key file of the SSH key pair that you used to create the session.
The IP address of the machine must be in the CIDR block allowlist of the bastion that hosts the session.
PuTTY is an open source SSH client for Windows. You must specify a private key file that is in PuTTY's proprietary format (.ppk). You can use the PuTTYgen tool to import and convert a key from OpenSSH format.
To connect to a Windows instance using PuTTY, an RDP client, and a Port Forwarding session:
On the Bastions list page, select the bastion that contains the port forwarding session that you want to work with.
On the details page, select Sessions, and locate the session that you want to use to connect to the intended target resource.
In the Actions menu () for the session, select View SSH command.
From the SSH command, copy the following information.
Bastion host name
Instance IP address (or DNS name) and port number
You can only use the DNS name if DNS is enabled on the bastion.
Select the option Don't start a shell or command at all.
From the Category panel, expand SSH, and then select Tunnels.
Enter the following information.
Source port - You can use any available local port. The default RDP server port is 3389.
Destination - Enter the instance IP address (or DNS name) and port number, separated by a colon, <instanceIP>:<instancePort>. The default RDP server port is 3389.
You can only use the DNS name if DNS is enabled on the bastion.
Select Add.
From the Category panel, expand SSH, and then select Auth.
For Private key file for authentication, select Browse and select the private key file that you used to create the bastion.
The .ppk file extension indicates that the private key is in PuTTY's proprietary format. Specify a key of this format when using PuTTY. You can use the PuTTYgen tool to import and convert a key from OpenSSH format.
Select Open.
A terminal opens with the message "Authenticating with public key." The process does not exit. Do not close the terminal.
If your private key was created with a passphrase, you are prompted to enter the passphrase.
Open an RDP client and connect to localhost (or 127.0.0.1) and the local port you specified, Source port.
Provide the name of an existing user on the Windows instance.
To connect to an Oracle Database using a Port Forwarding session:
On the Bastions list page, select the bastion that contains the port forwarding session that you want to work with.
On the details page, select Sessions, and locate the session that you want to use to connect to the intended target resource.
In the Actions menu () for the session, select View SSH command.
To copy the command, next to SSH command, select Copy, and then select Close.
Using a text editor, replace <privateKey> with the path to the private key and <localPort> with the local port on the machine from which you want to connect to the bastion.
You can use any available local port. The default Oracle Database port is 1521.
(Optional)
Add the verbose (-v) option to the SSH command for detailed information about the connection.
Note
Don't use the -vv or -vvv options.
Use a command line to issue the customized SSH command and connect to the bastion session.
If you created a private key with a passphrase, you are prompted to enter it twice for a Port Forwarding session.
After you create a connection to a Port Forwarding session, the process will not exit. Do not close the terminal.
If you enabled verbose output (-v), the final message after a successful connection is:
debug1: pledge: network
Open a database client such as Oracle SQL*Plus or Oracle SQL Developer, and then connect to localhost (or 127.0.0.1) and the local port you specified, <localPort>.
Provide the name and password of an existing user on the database.
To connect to a MySQL DB System using a Port Forwarding session:
On the Bastions list page, select the bastion that contains the port forwarding session that you want to work with.
On the details page, select Sessions, and locate the session that you want to use to connect to the intended target resource.
In the Actions menu () for the session, select View SSH command.
To copy the command, next to SSH command, select Copy, and then select Close.
Using a text editor, replace <privateKey> with the path to the private key and <localPort> with the local port on the machine from which you want to connect to the bastion.
You can use any available local port. The default HeatWave port is 3306.
(Optional)
Add the verbose (-v) option to the SSH command for detailed information about the connection.
Note
Don't use the -vv or -vvv options.
Use a command line to issue the customized SSH command and connect to the bastion session.
If you created a private key with a passphrase, you are prompted to enter it twice for a Port Forwarding session.
After you create a connection to a Port Forwarding session, the process will not exit. Do not close the terminal.
If you enabled verbose output (-v), the final message after a successful connection is:
debug1: pledge: network
Open a database client such as MySQL Workbench and connect to localhost (or 127.0.0.1) and the local port you specified, <localPort>.
Provide the name and password of an existing user on the database.