Run a ssh command on a remote server.

Parameters:
- Developer mode: activate/deactivate code tab.
- Login/user
- Password
- Server address/url
- ssh command
See dedicated page for more information.
See dedicated page for more information.
Runs a remote SSH command from your ETL server.
On Windows, this action uses PuTTY’s plink.exe under the hood. (See PuTTY’s documentation for general behavior and command-line semantics.)
To prevent interactive prompts during automated runs, accept the host’s key once manually (with PuTTY or plink) so it’s stored in the Registry; subsequent runs won’t pause unless the host key changes.
Use sshRun to orchestrate work on other machines directly from your pipeline—without extra agents:
- File housekeeping (rotate logs, purge temp/cache, move or chmod files).
- Trigger application jobs (run shell scripts, kick off ingestion, reload services).
- Operational checks (tail a log, check versions, read counters).
- Lightweight deployments (pull latest code, restart a container/service*****).
* Keep restarts idempotent and guarded; use && to stop on first failure.
- The action builds a non-interactive SSH call (via
plink.exe on Windows).
- It passes your user, password, server, and command.
- It returns success if the remote process exit code is
0; any non-zero exit code is treated as an error and appears in the action log.
rm <kibella_install_dir>/tempdata/cache/query_<dataset_name>-*.json
sudo systemctl restart etl-worker.service && systemctl is-active etl-worker.service
Ensure the remote user has passwordless sudo for that command, or the run will block.
/opt/projects/acme/bin/nightly.sh --date=$(date +%F)
¶ 4) Chain commands and stop on first failure
cd /data/inbox && ./ingest.sh && ./verify.sh
- Make commands idempotent (safe to run twice).
- Prefer absolute paths on the remote host.
- For multiple steps, call a remote script maintained under version control.
- Handle errors with
set -e in scripts or use cmd1 && cmd2 in idCommand.
- Least privilege: use a dedicated service account restricted to the needed folders/commands.
- Avoid dangerous wildcards in
rm; when needed, add safety checks (e.g., test -n "$TARGET" && rm -f "$TARGET").
- idPass is handled as a secret; restrict who can view or edit it.
- Rotate credentials regularly; consider moving to key-based auth with Pageant/agent if your environment allows (even though this action exposes user/password fields,
plink itself supports keys).
- Log output may include parts of your command; avoid embedding secrets in
idCommand.
- Fill idUser, idPass, idServer.
- Enter your idCommand (test it manually first on the remote host).
- Run the action; check the Log pane for the remote exit code and output.
