MNX.io Docs
  • MNX.io Documentation
  • Getting started
    • SSH to an instance from Windows
    • Account password requirements
    • Improving security using two-factor authentication (2FA)
    • Generating an SSH key
      • Manually generating your SSH key in macOS
      • Manually generating your SSH key in Windows
    • API integrations and CLI usage
    • Provisioning limits
    • Cancelling your account
  • Data centers
  • Instances
    • Infrastructure containers
    • Virtual machines
    • Snapshots
      • Automating Snapshots
    • Tags and metadata
    • Connecting to containers and VMs
    • Instance Types
  • Triton CLI & Tools
    • Using the VNC console
    • Triton CLI tool
    • Hashicorp Packer and Terraform
      • Create and manage images with Packer
      • Manage infrastructure with Terraform
    • Container Monitor with Prometheus
  • Network
    • Networking and fabric user guide
    • Firewall
    • Firewall rules reference
    • Frequently Asked Questions
  • CloudAPI Documentation
    • Getting Started
    • RBAC: Users, Roles & Policies
    • API Introduction
    • API Details
      • Account
      • Keys
      • Users
      • Images
      • Instances
      • Packages
  • Contacting Support
  • Images
    • Linux
      • CentOS
      • Ubuntu
        • 20.04
      • Debian
    • FreeBSD
      • 12
Powered by GitBook
On this page
  • Connecting to containers and VMs=
  • Detailed instructions
  • SSH key management

Was this helpful?

  1. Instances

Connecting to containers and VMs

PreviousTags and metadataNextInstance Types

Last updated 5 years ago

Was this helpful?

Connecting to containers and VMs=

SSH, triton-docker exec, and Microsoft Remote Desktop are all supported connection methods to "log in" to instances in Triton.

SSH is the primary means of connecting and authenticating for command line access to all container types with the exception of Docker and Windows instances.

  • Connecting to Docker containers using triton-docker exec

The propagation of SSH keys is handled differently depending on container type. The following table provides an overview of the differences.

Container Type

Authentication Type

Notes

SmartOS

Uses SmartLogin

Authenticates against current list of keys in the account of the container owner.

Container Native Linux

Uses authorized_keys file

Keys in the account of the container owner are copied at provision time. Changes to the keys in the account are not reflected. Can force an update to the authorized_keys file via a metadata item.

Hardware Virtualized Linux

Uses authorized_keys file

Keys in the account of the container owner are copied at provision time. Changes to the keys in the account are not reflected. Can force an update to the authorized_keys file via a metadata item.

Hardware Virtualized Windows

Uses generated administrator password

Uses password generated for a given account via the *generate_passwords" option in the image configuration json.

Docker Containers

Communication is via TLS secured HTTP; no sshd by default

Uses client certificate.

Notes:

  • All access should be done as the root user unless otherwise noted.

  • Newer Ubuntu distributions use the ubuntu user for remote access.

  • Windows based distributions use the administrator account and the normal windows login process; Windows containers do not use SSH keys.

SSH to an instance from Mac OS X or Windows
Detailed instructions
SSH key management