Creating an Instance from an Instance Configuration
You can create an instance by using an instance configuration as a template.
Many of the settings that are defined in the instance configuration cannot be changed when you create an instance from the instance configuration. For example, the availability domain, compartment, image, shape, and subnet cannot be changed.
Before You Begin
Before you create an instance from an instance configuration, you need an instance configuration to use as a template for the instance. In addition, there are specific requirements for Linux and Windows.
Linux Instance Requirements
To connect to your Linux instance, consider the following.
If the instance configuration does not include a public key, and you want to use your own Secure Shell (SSH) key to connect to the instance using SSH, you need the public key from the SSH key pair that you plan to use. The key must be in OpenSSH format. For more information, see Managing Key Pairs on Linux Instances.
If the instance configuration does include an SSH key, that SSH key must be used to connect to all instances created from the instance configuration.
Windows Instance Requirements
For Windows, you need a VCN security rule that enables Remote Desktop Protocol (RDP) access so that you can connect to your instance. Specifically, you need a stateful ingress rule for TCP traffic on destination port 3389 from source 0.0.0.0/0 and any source port. For more information, see Security Rules. You can implement this security rule in a network security group that you add this Windows instance to. Or, you can implement this security rule in a security list that is used by the instance's subnet.
Open the navigation menu , select Networking, and then select Virtual cloud networks.
Under List Scope, select a compartment that you have permission to work in.The page updates to display only the resources in that compartment. If you're not sure which compartment to use, contact an administrator.
Click the VCN you want to create the security rule in.
Do one of the following:
Add the rule to a network security group that the instance belongs to:
Under Resources, click Network Security Groups.
Click the network security group to add the rule to.
Click Add Rules.
Enter the following values for the rule:
Stateless: Leave the check box cleared.
Direction: Ingress
Source Type: CIDR
Source CIDR: 0.0.0.0/0
IP Protocol: RDP (TCP/3389)
Source Port Range: All
Destination Port Range: 3389
Description: An optional description of the rule.
Click Add.
To add the rule to a security list that is used by the instance's subnet:
Under Resources, click Security Lists.
Click the security list that you're interested in.
Click Add Ingress Rules.
Enter the following values for the rule:
Stateless: Leave the check box cleared.
Source Type: CIDR
Source CIDR: 0.0.0.0/0
IP Protocol: RDP (TCP/3389)
Source Port Range: All
Destination Port Range: 3389
Description: An optional description of the rule.
Click Add Ingress Rules.
Using the Console 🔗
Open the navigation menu and click Compute. Under Compute, click Instance Configurations.
Click the instance configuration that you want to use as a template to create the instance.
Click Launch instance.
Enter a name for the instance. You can add or change the name later. The name doesn't need to be unique, because an Oracle Cloud Identifier (OCID) uniquely identifies the instance. Avoid entering confidential information.
Linux instances: If the instance configuration does not include an SSH public key for the instance, you can provide one now. If the instance configuration does include an SSH public key for the instance, that SSH key must be used to connect to all instances created from the instance configuration.
In the Add SSH keys section, generate an SSH key pair or upload your own public key. Select one of the following options:
Generate a key pair for me: Oracle Cloud Infrastructure generates an RSA key pair for the instance. Select Save Private Key, and then save the private key on your computer. Optionally, select Save Public Key and then save the public key.
Caution
Anyone who has access to the private key can connect to the instance. Store the private key in a secure location.
Important
To use a key pair that is generated by OCI, access the instance from a system with OpenSSH installed. OpenSSH is included by default on all current versions of Linux, MacOS, Windows, and Windows Server. For more information, see Managing Key Pairs on Linux Instances.
Upload public key files (.pub): Upload the public key portion of your key pair. Either browse to the key file that you want to upload, or drag and drop the file into the box. To provide multiple keys, press and hold down the Command key (on Mac) or the Ctrl key (on Windows) while selecting files.
Paste public keys: Paste the public key portion of your key pair in the box.
No SSH keys:
Select this option only if you do not want to connect to the instance using SSH. You can't provide a public key or save the key pair that is generated by Oracle Cloud Infrastructure after the instance is created.
Specify the Boot volume details for the instance. For more information about the settings in this section, see Creating an Instance.
To configure live migration, click Show advanced options, and on the Availability configuration tab, make your selections. For more information about the settings in this section, see Creating an Instance.
Click Create.
To track the progress of the operation and troubleshoot errors that occur during instance creation, use the associated work request.
What's Next 🔗
After the instance is provisioned, details about it appear in the instance list. To view more details, including IP addresses and the initial password (for Windows instances), click the instance name.
When the instance is fully provisioned and running, you can connect to the instance. You connect to a Linux instance by using a Secure Shell (SSH) connection, and you connect to a Windows instance by using a Remote Desktop connection.
You can attach a block volume to the instance, provided the volume is in the same availability domain.