Improve company productivity with a Business Account.Sign Up

x
?
Solved

How do I redownload or regenerate a private PEM key for an existing AWS instance?

Posted on 2013-06-03
1
Medium Priority
?
1,417 Views
Last Modified: 2014-11-12
Hi:

I'm a relative newbie to the world of AWS and EC2 instances.

I have an instance created on AWS. I'm having issues logging into the instance through WinSCP. I get the following error message:

"No supported authentication methods available (server sent: publickey)."

I used the PEM file associated with the instance to create a PPK (private key) through Putty-Gen. I was able to log into the instance using Putty & winSCP on machine A.

I'm on a different machine now and attempting to use the same PEM to generate a private key with which to log into the instance with. This is where I run into the errors. It leads me to believe that there are issues with my PEM file. So, I'm trying to figure out how to get  to redownload or regenerate the key for that instance through AWS (I am remote right now).

I see that I can create a key pair, but I don't see how that gets associated with a specific AWS instance.

I looked at the log file and I don't see any glaring errors jumping out at me.

I was able to spin off a new instance using the AMI and log into that correctly. I need to get into my original instance because there are important files living off the home directory that I need to replicate.

How do I go about doing this?

Thanks,
JohnB
0
Comment
Question by:jxbma
1 Comment
 
LVL 34

Accepted Solution

by:
shalomc earned 2000 total points
ID: 39218902
If you only need the data, then try the following procedure, which works unless you use encrypted files systems.

Create a snapshot of your instance.
Create a new temporary volume out of the snapshot
Start a new temporary instance.
Attach the new volume to the new instance.
Retrieve your files.
At this point you can tear everything down:  disconnect the volume, delete it, delete the snapshot and drop the temporary instance.
0

Featured Post

The Firewall Audit Checklist

Preparing for a firewall audit today is almost impossible.
AlgoSec, together with some of the largest global organizations and auditors, has created a checklist to follow when preparing for your firewall audit. Simplify risk mitigation while staying compliant all of the time!

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Data security in the cloud is very much like a security in an on-premises data center - only without costs for maintaining facilities and computer hardware.
Although a new technology, ReactJs offers multiple benefits to the website owners when it comes to creating interactive websites. Know what aspects make React Js one of the most popular frameworks for building websites.
This tutorial will teach you the core code needed to finalize the addition of a watermark to your image. The viewer will use a small PHP class to learn and create a watermark.
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

606 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question