Running CFDDFC with the AWS Console
- Configure a Security Group
- Create an SSH Key Pair
- Launch an Instance
- Connect to an Instance
- Using OpenFOAM on an Instance
- Data Transfer to an Instance
- Connect with the Remote Desktop (“Classic” CFDDFC)  or
Connect with the Web Browser Remote Desktop (Web CFDDFC)
- Data Storage
- Creating a Cluster of Instances
Problem with these instructions? Please send a CFDDFC Support Query.
Once an instance is launched, the user can access it securely using SSH (Secure Shell) using the key pair created previously. The standard access is remote login from a command line using the OpenSSH client, known as “
ssh”. On Linux and macOS systems,
ssh is available in the command line “shell” or “terminal”.
MS Windows 10 provides
ssh in the following environments. On the native cmd and powershell,
ssh may need to be activated.
- A Linux terminal within the Windows Subsystem for Linux (recommended).
cmdcommand line, which is opened by typing Windows key+R to open the “Run” box, entering “cmd” and then clicking “OK” (or using one of 9 other different ways).
- Powershell, opened by typing Windows key+R to open the “Run” box, entering “powershell” and then clicking “OK” (or using one of 8 other different ways).
Older versions of MS Windows rely on a separate application PuTTy to provide SSH access, but since older versions are unsupported, we will not document PuTTy here.
Terminal login with SSH
To login using
ssh you will need:
- IP address or hostname of the instance, e.g.
- path and file name of the key file, e.g.
~/.ssh/awskey.pemon Linux/macOS, or
C:\Users\john\awskey.pemon Windows 10.
The login command has the general form:
ssh -i <path_and_key_file> <user>@<ip_host>
For example, on Linux and macOS, or in Windows using the subsystem for Linux using example IP address and key file above, the command is:
ssh -i ~/.ssh/awskey.pem email@example.com
The user should see the login screen for CFD Direct From the Cloud, followed by the command prompt. To logout, type “
In a Linux/UNIX shell, one option to simplify the command is to define shell variables for the key file and IP as shell variables, e.g.
ip, respectively by the following:
The login command can then be:
ssh -i "$key" ubuntu@$ip
Using SSH agent
The user can avoid supplying the key file in the login command by using the
ssh-agent — OpenSSH’s authentication agent. The agent holds private keys which can be automatically used for authentication. It is available for all platforms but documented here only for Linux/UNIX shell. Alternatively there are instructions for SSH agent from Windows 10 command line.
The user can add their key to the agent by the command:
If this command returns a message “
unable to start ssh-agent service”, Linux/UNIX shell users should activate the
ssh-agent server by typing:
Once the key is added, users can login without providing the key in the command by:
The stored keys can be listed by the command:
Authentications can fail if the number of keys exceeds the limit on authentication attempts set by the SSH server on the instance (typically 6). When this occurs, it is advisable to empty the agent of stored keys by typing:
Further Information: connect using Windows Subsystem for Linux.