Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
Some article numbers may have changed. If this isn't what you're looking for, try searching all articles. Search articles

CloudLink: Disable AWS console access to CloudLink OS

Summary: AWS has pre-installed SSM agent on all supported Operating Systems, this SSM agent will also let access to CloudLink OS console directly.

This article applies to   This article does not apply to 

Symptoms

Dell recommends the removal of SSM agent from CloudLink instances as it will lead to security vulnerabilities.

Cause

In AWS, the SSM agent is pre-installed on all supported Operating Systems to allow access to the Operating System console directly.

Affected Products and Version/s: All versions of CloudLink till 7.1.3 when deployed in AWS.

Resolution

In order to disable login via Session Manager to CloudLink OS, Administrator must uninstall the SSM agent from the CloudLink instance.

There are two workarounds:
Remediation workflow 1:   When user has access to CloudLink console via Session Manager.
Remediation workflow 2:   When user has no access to CloudLink console via Session Manager.


Remediation workflow 1:

1.    Instance of CloudLink.
image.png

2.    On Session Manager tab -> Click on Connect button
image.png

3.    Once you are on CloudLink console using Session Manager, enter sudo su
image.png

4.    To check the Status of SSM Agent running on CloudLink console run the below command
“systemctl status snap.amazon-ssm-agent.amazon-ssm-agent.service”
image.png

5.    To list the running SSM agent on CloudLink console run the below command
“snap list amazon-ssm-agent”
image.png

6.    To remove the SSM agent from CloudLink console run the below command
“snap remove amazon-ssm-agent”
image.png
Validate SSM agent is removed from CloudLink instance.

7.    When SSM agent gets uninstalled CloudLink instance, the “connect” button gets disabled
image.png
8.    When user tries to SSH to CloudLink IP address it takes user to CloudLink login prompt
image.png

9.    Check for status of SSM agent .  Verify Agent is “Stopped”
image.png

10.    Check the list of SSM agents.  Status return “No matching snaps installed”.
image.png

Remediation workflow 2:
Session Manager is not enabled when an IAM Role is not selected. Thus with no presence of Session manager, the user will not be able to access CloudLink console.
To verify IAM Profile, login to AWS -> Launch EC2 instance -> Advanced details -> IAM Instance profile
image.png
Recommended not to select any profile under "IAM Instance profile", this will lead to Session Manager not being able to establish a connection to CloudLink console.
image.png

NOTE: At this point when Session Manager cannot establish connection to the CloudLink console, User has to contact Technical Support to assist in uninstalling SSM agent from CloudLink instances.

Affected Products

CloudLink SecureVM, CloudLink