This section explains how to log in to a virtual server (CentOS).
Before logging in, check the following:
- The status of the global IP address assigned to the virtual server targeted for login must be "ACTIVE"
- The security group rules must be set correctly for the operating environment
- The firewall rules and policies must be set correctly for the operating environment
- A key file (.pem) must exist in the working directory
-
Execute the following command:
$ ssh -i <k5user>@<globalIpAddrAssignedToTargetVirtualServer>
The authenticity of host '<globalIpAddrAssignedToTargetVirtualServer>' can't be established.
RSA key fingerprint is: <fingerprint>.
Are you sure you want to continue connecting (yes/no)? <>
Warning: Permanently added '<globalIpAddrAssignedToTargetVirtualServer>' (RSA) to the list of known hosts.
-
Retrieve the root privileges.
In the CentOS provided by K5, a special command is required for retrieving the root privileges after login.
$ sudo su -