Pesquisar

Este conteúdo não está disponível no idioma selecionado.

11.9.2. Accessing an Application

download PDF
When an application is accessed in a secure shell environment, the connection is made to the primary gear of the application by default. The primary gear is the gear where the Git repository and the web cartridge are located.
Access an application in a secure shell environment with the following command:
$ rhc ssh App_Name [Options]

Example 11.10. Accessing an Application in Secure Shell Environment

$ rhc ssh racer
Connecting to 517623ecdbd93cdffa000001@racer-automobile.example.com ...

    *********************************************************************

    You are accessing a service that is for use only by authorized users.
    If you do not have authorization, discontinue use at once.
    Any use of the services is subject to the applicable terms of the
    agreement which can be found at:
    https://www.openshift.com/legal

    *********************************************************************

    Welcome to OpenShift shell

    This shell will assist you in managing OpenShift applications.

    !!! IMPORTANT !!! IMPORTANT !!! IMPORTANT !!!
    Shell access is quite powerful and it is possible for you to
    accidentally damage your application.  Proceed with care!
    If worse comes to worst, destroy your application with 'rhc app delete'
    and recreate it
    !!! IMPORTANT !!! IMPORTANT !!! IMPORTANT !!!

    Type "help" for more info.

[racer-automobile.example.com 517623ecdbd93cdffa000001]\>
From the shell environment, run the help command to see the available shell commands. General Linux commands are available for routine operations in the shell environment.
Specific SSH commands can be run by passing one or more arguments. A different SSH executable can be used, or further options can be passed to SSH with the --ssh option.
Red Hat logoGithubRedditYoutubeTwitter

Aprender

Experimente, compre e venda

Comunidades

Sobre a documentação da Red Hat

Ajudamos os usuários da Red Hat a inovar e atingir seus objetivos com nossos produtos e serviços com conteúdo em que podem confiar.

Tornando o open source mais inclusivo

A Red Hat está comprometida em substituir a linguagem problemática em nosso código, documentação e propriedades da web. Para mais detalhes veja oBlog da Red Hat.

Sobre a Red Hat

Fornecemos soluções robustas que facilitam o trabalho das empresas em plataformas e ambientes, desde o data center principal até a borda da rede.

© 2024 Red Hat, Inc.