Connecting to containers and VMs
Last updated
Last updated
SSH, triton-docker exec
, and Microsoft Remote Desktop are all supported connection methods to "log in" to instances in Triton.
SSH is the primary means of connecting and authenticating for command line access to all container types with the exception of Docker and Windows instances.
Connecting to Docker containers using triton-docker exec
The propagation of SSH keys is handled differently depending on container type. The following table provides an overview of the differences.
Notes:
All access should be done as the root
user unless otherwise noted.
Newer Ubuntu distributions use the ubuntu
user for remote access.
Windows based distributions use the administrator
account and the normal windows login process; Windows containers do not use SSH keys.
Container Type
Authentication Type
Notes
SmartOS
Uses SmartLogin
Authenticates against current list of keys in the account of the container owner.
Container Native Linux
Uses authorized_keys
file
Keys in the account of the container owner are copied at provision time. Changes to the keys in the account are not reflected. Can force an update to the authorized_keys file via a metadata item.
Hardware Virtualized Linux
Uses authorized_keys
file
Keys in the account of the container owner are copied at provision time. Changes to the keys in the account are not reflected. Can force an update to the authorized_keys file via a metadata item.
Hardware Virtualized Windows
Uses generated administrator password
Uses password generated for a given account via the *generate_passwords" option in the image configuration json.
Docker Containers
Communication is via TLS secured HTTP; no sshd
by default
Uses client certificate.