Before You Begin

This 15-minute tutorial shows you how to access the Cloud Manager instance from a local Linux or Microsoft Windows computer.

Background

The Cloud Manager stack includes a instance configuration ("bootstrap") script that runs in the VM for the Cloud Manager instance after the Resource Manager Apply job completes successfully. The instance can be accessed from a Microsoft Windows machine using an SSH client such as PuTTY, or directly from a Linux machine.The method that you use depends upon the way you set up the virtual cloud network.

This is the eleventh tutorial in the Install PeopleSoft Cloud Manager series. Read the tutorials in the order listed. The optional tutorials offer alternate methods for setup.

Log In To the Cloud Manager Instance VM from a Linux or UNIX System

Use these instructions if the Cloud Manager instance resides in a public subnet. To access the instance from a Linux or UNIX computer:

  1. Get the IP address for the Cloud Manager instance from the instance details page using one of these methods:
    • From the Resource Manager Apply job (Resource Manager > Stack > Stack Details > Job Details), select Outputs, and then copy cm_http_url.
    • From the Oracle Cloud Infrastructure home page, click the menu icon at the top left, and select Compute > Instances. Select your compartment, and view the instance details page. The Instance information page includes the Public IP Address.
  2. Enter the following command:
    ssh -i <path_to_private_key_file>/<private_key_name> -o ServerAliveInterval=5 -o ServerAliveCountMax=1 opc@<public_ip_address_of_instance>
  3. If you entered a passphrase when creating your SSH key pair, enter the passphrase when prompted.
  4. The first time you connect to your instance, the SSH utility prompts you to confirm the public key. In response to the prompt, enter yes.

Log In To the Cloud Manager Instance VM from a Microsoft Windows System

Use these instructions if the Cloud Manager instance resides in a public subnet. To access the instance from a Microsoft Windows computer:

  1. Get the IP address for the Cloud Manager instance from the instance details page using one of these methods:
    • From the Resource Manager Apply job (Resource Manager > Stack > Stack Details > Job Details), select Outputs, and then copy cm_http_url.
    • From the Oracle Cloud Infrastructure home page, click the menu icon at the top left, and select Compute > Instances. Select your compartment, and view the instance details page. The Instance information page includes the Public IP Address.
  2. Start PuTTY. The PuTTY Configuration window is displayed, showing the Session panel.
  3. In the Host Name (or IP address) field, enter the public IP address of your instance.
  4. In the Connection type field, select SSH if it is not already selected.
    PuTTY Configuration dialog box, Basic options for your PuTTY session
    Description of this illustration (putty_login3.png)
  5. In the Category pane, click Connection. Enter 5 in the Seconds between keepalives (0 to turn off) text box.

    PuTTY Configuation dialog box, Options controlling the connection
    Description of this illustration (putty_login4.png)
  6. In the Category pane, expand SSH, and then click Auth. The Auth panel is displayed.
  7. In the Private key file for authentication field, click Browse and select the private key file that you saved earlier, mykey.ppk in this example.
    PuTTY Configuration dialog box, Options controlling SSH authentication
    Description of this illustration (putty_login6.png)
  8. In the Category tree, click Session.

    The Session panel is displayed.

  9. In the Saved Sessions field, enter a name for this connection configuration, and then click Save.
  10. Click Open to open the connection.

    The PuTTY Configuration window is closed and the PuTTY window is displayed.

  11. When prompted for a user name, enter opc.
  12. Enter the passphrase you had provided for your SSH key pair.
  13. The first time you connect to your instance, the PuTTY Security Alert window is displayed, prompting you to confirm the public key. Click Yes to continue.

Set Up SSH Access to a Private Cloud Manager Instance Through a Bastion

If you created Network resources, private or public subnets, and an OCI bastion as part of the Cloud Manager installation, use these instructions to set up a managed SSH session (SSH tunnel) to a Cloud Manager private subnet through a bastion. The SSH access lasts until you close the Bash shell or git bash shell, as long as the bastion session is active.

For more information on creating and using bastions, see the Oracle Cloud Infrastructure documentation for the Bastion service.

You must supply an SSH private key in the OpenSSH format for these commands. If you created an SSH private key in PuTTY in the RSA format, convert it to the OpenSSH format, as follows:

  1. Open the PuTTY generator and load the current private key.
  2. Select Conversions > Export OpenSSH key.
  3. Save the file, and make a note of the full path and key name.

    Note:

    If you want to distinguish this private key from the private key that you use with PuTTY, you can save the file to a different name. You cannot use this version of the key with PuTTY.
  4. Use the newly exported key in the command to create the SSH tunnel.

To set up SSH access with the bastion:

  1. In the Compute console, click the menu icon at the top left, and select Compute, then Instances.
  2. If necessary, select your compartment, and locate the Cloud Manager instance.
  3. Select the Oracle Cloud Agent tab, and verify that the Bastion plugin has been enabled. If it is not enabled, turn it on.

    The Resource Manager Apply job for the Cloud Manager instance enables the Bastion plugin by default. If you are using these instructions to access a PeopleSoft provisioned environment, you may need to enable the Bastion plugin. It will take a little time to become active.

    Instance details page, Oracle Cloud Agent tab
    Description of this illustration (ssh_access_instance_details_bastion_enabled.png)
  4. Select Resource Manager, then Stacks, and locate the Cloud Manager stack.
  5. On the Stack Details page for the Cloud Manager instance, select the Apply job.
  6. On the Job Details page, select Outputs from the Resources list on the left, and make a note of the bastion name.
  7. Select Identity & Security, then Bastion, and locate the bastion.
  8. If there is no active session, click Create Session.
  9. Select Managed SSH session from the Session type drop-down list.
  10. Enter a name for the session, or accept the default.
  11. Enter opc for the Username.
  12. If necessary, change the compartment, and select the Cloud Manager instance from the Compute instance drop-down list.
  13. Supply the public SSH key by browsing to the key file, pasting the text for the key file, or generating a new key pair.
    Create session page for a managed SSH session    
    Description of this illustration (ssh_access_create_managed_session.png)
  14. Click Create session.
  15. Wait until the session state is Active. Click the Actions icon and select Copy SSH command.
    Copy SSH command for managed SSH session
    Description of this illustration (ssh_access_copy_ssh_command.png)
  16. Paste the command in a text editor, and replace <privateKey> with the full path and key name to the OpenSSH-formatted key.

    Be sure to replace both instances of <privateKey> in the command.

  17. In a Bash shell (Linux) or a git bash shell (Microsoft Windows), enter the edited command to create the ssh connection to the Cloud Manager instance.

    If you created a passphrase when generating the private key, you will be prompted to enter it.

    Note:

    If you are unable to connect, it may be due to the version of git bash you are using. See the workaround at the end of this section.
  18. To verify the current path after you access the Cloud Manager instance, enter pwd.
    $ pwd
    /home/opc
  19. To leave the Cloud Manager instance and return to the Bash shell or git bash shell prompt, type exit.

Tip:

In the Bash or git bash shell, in case of error, use CTRL+c to terminate a command.

Note:

One way to verify the SSH tunnel connection is to use the following command and look for "tunnel" in the output:

ps -ef | grep ssh

With some versions of git bash, you may see an error message such as "Unable to negotiate with <port number>" when you enter the command to create the SSH connection. Use these steps to avoid the error.

  1. Make a note of the bastion host from the SSH command that you copied after creating the session (step 15). In this sample command, it would be the text in bold beginning host.bastion.
    ssh -i <privateKey> -o ProxyCommand="ssh -i <privateKey> -W %h:%p -p 22 ocid1.bastionsession.oc1.us-ashburn-1.xxxxxxxxxx@host.bastion.us-ashburn-1.oci.oraclecloud.com" -p 22 opc@xx.x.x.xx
  2. In the git-bash shell, change to the user's home directory:
    $ cd ~
  3. Make a new directory called ".ssh" under the home directory:
    $ mkdir .ssh
  4. Change to the .ssh directory.
    $ cd .ssh
  5. Create a file called config; for example using vi or another editor:
    $ vi config

    Tip:

    Review the usage with vi --help.
  6. Add these contents to the file and save.
    Host <bastion host>
    User opc
    PubkeyAcceptedAlgorithms +ssh-rsa
    HostkeyAlgorithms +ssh-rsa

    For <bastion host> enter the information from the SSH command; for example:

    Host host.bastion.us-ashburn-1.oci.oraclecloud.com
    User opc
    PubkeyAcceptedAlgorithms +ssh-rsa
    HostkeyAlgorithms +ssh-rsa
  7. Enter the SSH command to access the Cloud Manager instance.

Alternatively, you can create the .ssh directory and config file in Windows File Explorer before using them in the git-bash shell.

  1. Make a note of the bastion host from the SSH command that you copied after creating the session (step 15). In this sample command, it would be the text in bold.
    ssh -i <privateKey> -o ProxyCommand="ssh -i <privateKey> -W %h:%p -p 22 ocid1.bastionsession.oc1.us-ashburn-1.xxxxxxxxxx@host.bastion.us-ashburn-1.oci.oraclecloud.com" -p 22 opc@xx.x.x.xx
  2. In the git-bash shell, change to the user's home directory.
    $ cd ~
  3. Determine the user's home directory.
    $ pwd
    /c/Users/username

    The path /c/Users/username in the git-bash shell corresponds to C:\Users\username in Windows File Explorer.

  4. In Windows File Explorer, go to C:\Users\username and create the .ssh directory.
  5. Go to the C:\Users\username\.ssh directory.
  6. Using Notepad or another text editor, create the config file with these contents, and save.
    Host <bastion host>
    User opc
    PubkeyAcceptedAlgorithms +ssh-rsa
    HostkeyAlgorithms +ssh-rsa
    For <bastion host> enter the information from the SSH command; for example:
    Host host.bastion.us-ashburn-1.oci.oraclecloud.com
    User opc
    PubkeyAcceptedAlgorithms +ssh-rsa
    HostkeyAlgorithms +ssh-rsa
  7. Go to the git-bash shell and run the SSH command to access the Cloud Manager instance.

Monitor the Cloud Manger Configuration Process and Review the Log Files

Monitor the configuration process status by reviewing the log file /home/opc/bootstrap/CloudManagerStatus.log.

  1. Access the Cloud Manager instance in a Linux terminal window or with PuTTY.
  2. To view the end of the log file, enter this command:
    $ tail /home/opc/bootstrap/CloudManagerStatus.log
  3. In case you want to review other log files, use these commands to navigate.

    Enter pwd to verify the current directory.

    $ pwd
    /home/opc
  4. Change to the /home/opc/bootstrap directory.
    $ cd bootstrap
  5. To view the files and directories in /home/opc/bootstrap, enter ls.
    $ ls

The configuration process takes several minutes. When the process completes successfully, the same log file includes the Cloud Manager URL to sign in to the PeopleSoft Pure Internet Architecture (PIA) in a browser.

Other log files include the following:

  • /home/opc/bootstrap/CloudManagerStatus.log — Input logs for the Cloud Manager Instance Configuration wizard
  • /home/opc/bootstrap/psft_oci_setup.log — Cloud Manager provisioning log
  • /home/opc/bootstrap/cmpatch/logs/cmpatch_apply.log — Contains details on the steps for the download process for Cloud Manager update patch files
  • /home/psadm2/psft/data/cloud/cmlogs/BOOTSTRAP_LOGS/* — PeopleSoft Cloud Administrator logs related to processes such as file server creation
  • /opt/oracle/psft/dpks/setup/psft_dpk_setup.log — Detailed Puppet log for the Cloud Manager installation.

For more information, see PeopleSoft Cloud Manager for Oracle Cloud Infrastructure, "Cloud Manager Logs." Select Online Help (HTML) or PeopleBooks (PDF) on the PeopleSoft Cloud Manager page on the Oracle Help Center.

Copy the Log Files from the VM to a Windows Computer (Optional)

If you want to copy the log files to a Microsoft Windows computer, use a secure copy or secure FTP utility such as those associated with Putty.

For example, to transfer the files using the PSCP utility in PuTTY:

  1. Create a saved session in PuTTY to connect to the Cloud Manager Linux instance.
  2. Make a note of the path to your Putty installation on your laptop (for example, C:\Program Files (x86)\PuTTY).
  3. Make a note of the path on the Linux VM with the files you want to copy, and the path on your laptop where you want to save them.
  4. Open a command prompt and make a note of your PATH environment variable.

    To list the environment variables, enter the command set. Copy the contents of PATH to Notepad or elsewhere as a backup.

  5. In the command prompt, append the path to the PuTTY installation to the beginning of your PATH. For example:
    set PATH=C:\Program Files (x86)\PuTTY;%PATH%

    Note:

    This environment variable setting only lasts until the command window closes.
  6. Use this command to connect to the session with user opc, and copy files from the source Linux VM to the target Microsoft Windows computer:

    pscp –l <user> <session name>:<source> <target>
  7. Enter the passphrase for the SSH key at the prompt.

    >pscp -l opc cm-oci-infodev:/home/opc/bootstrap/psft_oci_setup.log C:\user\CloudManager\target
    Passphrase for key "rsa-key-psft":
    psft_oci_setup.log        | 1142 kB | 1142.5 kB/s | ETA: 00:00:00 | 100%

Next Steps

Specify Cloud Manager Settings

Learn More