If you have been a CoreOS user for long you will undoubtedly have noticed that there is no real package management system. If you’re not familiar, the philosophy of CoreOS is to avoid using a package manager and instead rely heavily on leveraging the power of Docker containers along with a few system level tools to manage servers. The problem that I just recently stumbled across is that the AWS SSM agent is packaged into debian and RPM formats and is assumed to be installed with a package manager, which obviously won’t work on CoreOS. In the remainder of this post I will describe the steps that I took to get the SSM agent working on a CoreOS/Dockerized server. Overall I am very happy with how well this solution turned out.
To get started, there is a nice tutorial here for using the AWS Session Manager through the the console. The most important thing that needs to be done before “installing” the SSM agent on the CoreOS host is to set up the AWS instance with the correct permissions for the agent to be able to communicate with AWS. For accomplishing this, I created a new IAM role and attached the AmazonEC2RoleForSSM policy to it through the AWS console.
After this step is done, you can bring up the ssm-agent.
Install the ssm-agent
After ensuring the correct permissions have been applied to the server that is to be manager, the next step is to bring up the agent. To do this using Docker, there are some tricks that need to be used to get things working correctly, notably, fixing the PID 1 zombie reaping problem that Docker has.
I basically lifted the Dockerfile from here originally and adapted it into my own public Docker image at jmreicha/ssm-agent:latest. In case readers want to go try this, my image is a little bit newer than the original source and has a few tweaks. The Dockerfile itself is mostly straight forward, the main difference is that the ssm-agent process won’t reap child processes in the default Debian image.
In order to work around the child reaping problem I substituted the slick Phusion Docker baseimage, which has a very simple process manager that allows shells spawned by the ssm-agent to be reaped when they get terminated. I have my Dockerfile hosted here if you want to check out how the phusion baseimage version works.
Once the child reaping problem was solved, here is the command I initially used to spin up the container, which of course still didn’t work out of the box.
docker run \ -v /var/run/dbus:/var/run/dbus \ -v /run/systemd:/run/systemd \ jmreicha/ssm-agent:latest
I received the following errors.
2018-11-05 17:42:27 INFO [OfflineService] Starting document processing engine... 2018-11-05 17:42:27 INFO [OfflineService] [EngineProcessor] Starting 2018-11-05 17:42:27 INFO [OfflineService] [EngineProcessor] Initial processing 2018-11-05 17:42:27 INFO [OfflineService] Starting message polling 2018-11-05 17:42:27 INFO [OfflineService] Starting send replies to MDS 2018-11-05 17:42:27 INFO [LongRunningPluginsManager] starting long running plugin manager 2018-11-05 17:42:27 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute 2018-11-05 17:42:27 INFO [HealthCheck] HealthCheck reporting agent health. 2018-11-05 17:42:27 INFO [MessageGatewayService] Starting session document processing engine... 2018-11-05 17:42:27 INFO [MessageGatewayService] [EngineProcessor] Starting 2018-11-05 17:42:27 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck 2018-11-05 17:42:27 INFO [StartupProcessor] Executing startup processor tasks 2018-11-05 17:42:27 INFO [StartupProcessor] Unable to open serial port /dev/ttyS0: open /dev/ttyS0: no such file or directory 2018-11-05 17:42:27 INFO [StartupProcessor] Attempting to use different port (PV): /dev/hvc0 2018-11-05 17:42:27 INFO [StartupProcessor] Unable to open serial port /dev/hvc0: open /dev/hvc0: no such file or directory 2018-11-05 17:42:27 ERROR [StartupProcessor] Error opening serial port: open /dev/hvc0: no such file or directory 2018-11-05 17:42:27 ERROR [StartupProcessor] Error opening serial port: open /dev/hvc0: no such file or directory. Retrying in 5 seconds... 2018-11-05 17:42:27 INFO [MessageGatewayService] Successfully created ssm-user 2018-11-05 17:42:27 ERROR [MessageGatewayService] Failed to add ssm-user to sudoers file: open /etc/sudoers.d/ssm-agent-users: no such file or directory 2018-11-05 17:42:27 INFO [MessageGatewayService] [EngineProcessor] Initial processing 2018-11-05 17:42:27 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-0d33006836710e7ef, requestId: 2975fe0d-846d-4256-9d50-57932be03925 2018-11-05 17:42:27 INFO [MessageGatewayService] listening reply. 2018-11-05 17:42:27 INFO [MessageGatewayService] Opening websocket connection to: %!(EXTRA string=wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0d33006836710e7ef?role=subscribe&stream=input) 2018-11-05 17:42:27 INFO [MessageGatewayService] Successfully opened websocket connection to: %!(EXTRA string=wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-0d33006836710e7ef?role=subscribe&stream=input) 2018-11-05 17:42:27 INFO [MessageGatewayService] Starting receiving message from control channel 2018-11-05 17:42:32 INFO [StartupProcessor] Unable to open serial port /dev/ttyS0: open /dev/ttyS0: no such file or directory 2018-11-05 17:42:32 INFO [StartupProcessor] Attempting to use different port (PV): /dev/hvc0 2018-11-05 17:42:32 INFO [StartupProcessor] Unable to open serial port /dev/hvc0: open /dev/hvc0: no such file or directory 2018-11-05 17:42:32 ERROR [StartupProcessor] Error opening serial port: open /dev/hvc0: no such file or directory 2018-11-05 17:42:32 ERROR [StartupProcessor] Error opening serial port: open /dev/hvc0: no such file or directory. Retrying in 5 seconds... 2018-11-05 17:42:35 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds.
The first error that jumped out in logs is the “Unable to open serial port”. There is also an error referring to not being able to add the ssm-user to the sudoers file.
The fix for these issues is to add a Docker flag to the CoreOS serial device, “–device=/dev/ttyS0” and a volume mount to the sudoers path, “-v /etc/sudoers.d:/etc/sudoers.d”. The full Docker run command is shown below.
docker run -d --restart unless-stopped --name ssm-agent \ --device=/dev/ttyS0 \ -v /var/run/dbus:/var/run/dbus \ -v /run/systemd:/run/systemd \ -v /etc/sudoers.d:/etc/sudoers.d \ jmreicha/ssm-agent:latest
After fixing the errors found in the logs, and bringing up the containerized SSM agent, go ahead and create a new session in the AWS console.
The session should come up pretty much immediately and you should be able to run commands like you normally would.
The last thing to (optionally) do is run the agent as a systemd service to take advantage of some capabilities to start it up automatically if it dies or start it if the server gets rebooted. You can probably just get away with using the docker restart policy too if you aren’t interested in configuring a systemd service, which is what I have chosen to do for now.
You could even adapt this Docker image into a Kubernetes manifest and run it as a daemonset on each node of the cluster if desired to simplify things and add another layer of security. I may return to the systemd unit and/or Kubernetes manifest in the future if readers are interested.
Conclusion
The AWS Session manager is a fantastic tool for troubleshooting/debugging as well as auditing and security.
With SSM you can make sure to never expose specific servers to the internet directly, and you can also keep track of what kinds of commands have been run on the server. As a bonus, the AWS console helps keeps track of all the previous sessions that were created and if you hook up to Cloudwatch and/or S3 you can see all the commands and times that they were run with nice simple links to the log files.
SSM allows you to do a lot of other cool stuff like run scripts against either a subset of servers which can be filtered by tags or against all servers that are recognized by SSM. I’m sure there are some other features as well, I just haven’t found them yet.