Creating an Instance Console Connection

On Compute Cloud@Customer, before you can connect to an instance VNC console or serial console, you need to create an instance console connection.

Note

Instance console connections are limited to one client at a time. If the client attempts to connect but fails to connect within five minutes, the connection is closed and a different client can connect. During the five-minute timeout, any attempt to connect a different client fails.

The instance console connection resource provides the command that you need to create the secure tunnel. The command is a little different depending on whether your local system is UNIX or Windows and whether you want to connect to the VNC console or the serial console on the instance.

Console Connection Prerequisites

Ensure that you have the following resources on the system that you plan to use to connect to the instance console.

  • The console connection needs access to port 1443. Previously, port 443 was used for VM console access. For more information, see Network Port and Protocol Matrix.

  • SSH key pair

    If you don't already have an SSH key pair, you can use the ssh-keygen utility on UNIX systems or PuTTY puttygen.exe on Windows systems. Specify a key size of 2048 bits (this value should be the default). Give the key a name. You don't need to provide a passphrase; using a passphrase makes it more difficult to automate connecting.

  • Command-line shell and SSH client

    On Windows systems, use one of the following:

    • Windows PowerShell

      If you use PowerShell to connect to the VNC server on the instance, plink.exe is required. plink.exe is the command link connection tool included with PuTTY. You can install PuTTY or install plink.exe separately.

    • Git for Windows

      Git for Windows includes OpenSSH.

    • Windows Subsystem for Linux (WSL)

      WSL includes OpenSSH.

  • VNC viewer to connect to the VNC console

  • Ensure that you belong to a group that has the following permissions. Note – groups and policies are managed in your OCI tenancy, and not managed directly on Compute Cloud@Customer. See IAM Overview.

    Allow group group_name to manage instance-console-connection in tenancy
    Allow group group_name to read instance in tenancy

Was this article helpful?