This is the admin container for troubleshooting the Bottlerocket operating system.
It runs outside of Bottlerocket's container orchestrator in a separate instance of containerd
.
The container hosts an SSH server to allow public key SSH access, as well as agetty
services for serial console devices to allow console access.
You can also connect to the admin container via the control container by running enter-admin-container
.
Unless otherwise specified through user-data, the default user is ec2-user.
The admin container is disabled by default in Bottlerocket. For more information about how the admin container fits into the Bottlerocket operating system, please see the Bottlerocket documentation.
You'll need Docker 20.10 or later for multi-stage build, BuildKit, and chmod on COPY/ADD support.
Then run make
!
Starting from v0.6.0, users have the option to pass in their own ssh keys rather than the admin container relying on the AWS instance metadata service (IMDS).
Users can add their own keys by populating the admin container's user-data with a base64-encoded JSON block. If user-data is populated then Bottlerocket will not fetch from IMDS at all, but if user-data is not set then Bottlerocket will continue to use the keys from IMDS.
To use custom public keys for .ssh/authorized_keys
and/or custom CA keys for /etc/ssh/trusted_user_ca_keys.pub
you will want to generate a JSON-structure like this:
{
"ssh": {
"authorized-keys": [
"ssh-rsa EXAMPLEAUTHORIZEDPUBLICKEYHERE my-key-pair"
],
"trusted-user-ca-keys": [
"ssh-rsa EXAMPLETRUSTEDCAPUBLICKEYHERE authority@ssh-ca.example.com"
]
}
}
If you want to access to the admin container using EC2 instance connect, set authorized-keys-command
and authorized-keys-command-user
as follows:
{
"ssh": {
"authorized-keys-command": "/opt/aws/bin/eic_run_authorized_keys %u %f",
"authorized-keys-command-user": "ec2-instance-connect"
}
}
To change allowed SSH ciphers to a specific set, you can add a ciphers section:
{
"ssh": {
"authorized-keys...",
"ciphers": [
"chacha20-poly1305@openssh.com",
"aes128-ctr",
"aes192-ctr",
"aes256-ctr",
"aes128-gcm@openssh.com",
"aes256-gcm@openssh.com"
]
}
}
To change allowed key exchange algorithms to a specific set, you can add a
key-exchange-algorithms
section:
{
"ssh": {
"authorized-keys...",
"key-exchange-algorithms": [
"curve25519-sha256",
"curve25519-sha256@libssh.org",
"ecdh-sha2-nistp256",
"ecdh-sha2-nistp384",
"ecdh-sha2-nistp521",
"diffie-hellman-group-exchange-sha256"
]
}
}
To change allowed MACs to a specific set, you can add a macs
section:
{
"ssh": {
"authorized-keys...",
"macs": [
"hmac-sha2-256",
"hmac-sha2-512",
"umac-64@openssh.com",
"umac-128@openssh.com",
"hmac-sha2-256-etm@openssh.com",
"hmac-sha2-512-etm@openssh.com",
"hmac-md5-etm@openssh.com",
"hmac-md5-96-etm@openssh.com",
"umac-64-etm@openssh.com",
"umac-128-etm@openssh.com"
]
}
}
You can also tweak ciphers, key exchange algorithms and MACs following way (see https://man.openbsd.org/sshd_config for details):
By default, the admin container's local user will be ec2-user
. If you would like to change this, you can set the user value like so:
{
"user": "bottlerocket",
"ssh": {
"authorized-keys...",
}
}
For logging in via serial console, you can specify a password for the primary user like so:
{
"user": "bottlerocket",
"password-hash": "$y$jFT$NER...",
"ssh": {
"authorized-keys...",
}
}
Where the password-hash can be generated from:
mkpasswd -m yescrypt -R 11 <desired password>
Once you've created your JSON, you'll need to base64-encode it and set it as the value of the admin host container's user-data setting in your instance user data toml.
[settings.host-containers.admin]
# ex: echo '{"ssh":{"authorized-keys":[]}}' | base64
user-data = "eyJzc2giOnsiYXV0aG9yaXplZC1rZXlzIjpbXX19Cg=="