SSM Run CommandのターゲットのEC2インスタンス上でCommand IDを取得したい
こんにちは、のんピ(@non____97)です。
皆さんはSSM Run CommandのターゲットのEC2インスタンス上でCommand IDを取得したいなと思ったことはありますか? 私はあります。
例えば、SSM Run Command実行中に、そのRun Commandよりも後から実行されたRun Commandを検索したい時に使いたいところです。
自身のCommand IDが分からない場合は、Run Commandで渡すコマンド内で「現在時刻よりも新しいRun Commandの実行はどれか」という処理を行うことになります。
個人的にはRun Command内で実際にコマンドを受け付けられた時間から検索するのではなく、Run Command自体が実行された時間をベースに検索したいです。また、前者の場合は、同時実行された場合に自身のRun Commandなのか、別のRun Commandなのかの判断をすることが難しいように思えます。
そのためにはターゲットなったEC2インスタンスが、どのRun Commandで実行されたのかを正確に把握する必要があります。
SSM Run Commandを実行してもCommand IDの環境変数が埋め込まれるということはありません。
これの解決方法としては、「SSM AgentのログファイルからPPIDで検索して抽出する」という方法になります。
実際にやってみます。
いきなりまとめ
- SSM AgentのログファイルからPPIDで検索して抽出できる
sleep
などで数秒待機しなければ、Run Commandを受け付けたログが出力されないので注意
やってみた
実際にやってみます。
ターゲットとするEC2インスタンスの情報は以下です。
- AMI名 : RHEL-9.2.0_HVM-20230503-x86_64-41-Hourly2-GP2
- AMI ID : ami-026ebd4cfe2c043b2 (us-east-1)
まず、SSM Run Command実行時のSSM Agentのログを確認してみます。
echo test
と実行するRun Commandを実行しました。Command IDは24f814f5-80aa-429a-ac8b-206b5f249bc3
です。
SSM AgentのログファイルをこちらのCommand IDでgrepします。
$ sudo grep 24f814f5-80aa-429a-ac8b-206b5f249bc3 /var/log/amazon/ssm/amazon-ssm-agent.log
2023-11-03 01:17:46 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] Init the cloudwatchlogs publisher
2023-11-03 01:17:46 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] document: 24f814f5-80aa-429a-ac8b-206b5f249bc3 worker started
2023-11-03 01:17:46 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] channel: 24f814f5-80aa-429a-ac8b-206b5f249bc3 found
2023-11-03 01:17:46 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] Successfully loaded platform independent plugin aws:runPowerShellScript
2023-11-03 01:17:46 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] Successfully loaded platform independent plugin aws:updateSsmAgent
2023-11-03 01:17:46 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] Successfully loaded platform independent plugin aws:configurePackage
2023-11-03 01:17:46 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] Successfully loaded platform independent plugin aws:downloadContent
2023-11-03 01:17:46 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] Successfully loaded platform independent plugin aws:runDocument
2023-11-03 01:17:46 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] Successfully loaded platform independent plugin aws:softwareInventory
2023-11-03 01:17:46 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] Successfully loaded platform independent plugin aws:configureDocker
2023-11-03 01:17:46 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] Successfully loaded platform independent plugin aws:runDockerAction
2023-11-03 01:17:46 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] Successfully loaded platform independent plugin aws:refreshAssociation
2023-11-03 01:17:46 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] Successfully loaded platform dependent plugin aws:runShellScript
2023-11-03 01:17:46 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] Successfully loaded platform dependent plugin aws:domainJoin
2023-11-03 01:17:46 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] inter process communication started at /var/lib/amazon/ssm/i-0a2ce926164e897c6/channels/24f814f5-80aa-429a-ac8b-206b5f249bc3
2023-11-03 01:17:46 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] worker listener started on path: /var/lib/amazon/ssm/i-0a2ce926164e897c6/channels/24f814f5-80aa-429a-ac8b-206b5f249bc3
2023-11-03 01:17:46 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] [DataBackend] received plugin config message
2023-11-03 01:17:46 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] [DataBackend] {"DocumentInformation":{"DocumentID":"24f814f5-80aa-429a-ac8b-206b5f249bc3","CommandID":"24f814f5-80aa-429a-ac8b-206b5f249bc3","AssociationID":"","InstanceID":"i-0a2ce926164e897c6","MessageID":"aws.ssm.24f814f5-80aa-429a-ac8b-206b5f249bc3.i-0a2ce926164e897c6","RunID":"2023-11-03T01-17-46.186Z","CreatedDate":"55808-05-09 00:09:44 +0000 UTC","DocumentName":"AWS-RunShellScript","DocumentVersion":"","DocumentStatus":"InProgress","RunCount":0,"ProcInfo":{"Pid":1499,"StartTime":"2023-11-03T01:17:46.188405338Z"},"ClientId":"","RunAsUser":"","SessionOwner":""},"DocumentType":"SendCommand","SchemaVersion":"1.2","InstancePluginsInformation":[{"Configuration":{"Settings":null,"Properties":[{"id":"0.aws:runShellScript","runCommand":["echo test"],"timeoutSeconds":"3600","workingDirectory":""}],"OutputS3KeyPrefix":"24f814f5-80aa-429a-ac8b-206b5f249bc3/i-0a2ce926164e897c6/awsrunShellScript","OutputS3BucketName":"","S3EncryptionEnabled":false,"CloudWatchLogGroup":"","CloudWatchEncryptionEnabled":false,"CloudWatchStreamingEnabled":false,"OrchestrationDirectory":"/var/lib/amazon/ssm/i-0a2ce926164e897c6/document/orchestration/24f814f5-80aa-429a-ac8b-206b5f249bc3/awsrunShellScript","MessageId":"aws.ssm.24f814f5-80aa-429a-ac8b-206b5f249bc3.i-0a2ce926164e897c6","BookKeepingFileName":"24f814f5-80aa-429a-ac8b-206b5f249bc3","PluginName":"aws:runShellScript","PluginID":"aws:runShellScript","DefaultWorkingDirectory":"","Preconditions":null,"IsPreconditionEnabled":false,"CurrentAssociations":null,"SessionId":"","ClientId":"","KmsKeyId":"","RunAsEnabled":false,"RunAsUser":"","ShellProfile":{"windows":"","linux":""},"SessionOwner":"","UpstreamServiceName":""},"Name":"aws:runShellScript","Result":{"pluginID":"","pluginName":"","status":"","code":0,"output":null,"startDateTime":"0001-01-01T00:00:00Z","endDateTime":"0001-01-01T00:00:00Z","outputS3BucketName":"","outputS3KeyPrefix":"","stepName":"","error":"","standardOutput":"","standardError":""},"Id":"aws:runShellScript"}],"CancelInformation":{"CancelMessageID":"","CancelCommandID":"","Payload":"","DebugInfo":""},"IOConfig":{"OrchestrationDirectory":"/var/lib/amazon/ssm/i-0a2ce926164e897c6/document/orchestration/24f814f5-80aa-429a-ac8b-206b5f249bc3","OutputS3BucketName":"","OutputS3KeyPrefix":"24f814f5-80aa-429a-ac8b-206b5f249bc3/i-0a2ce926164e897c6","CloudWatchConfig":{"LogGroupName":"","LogStreamPrefix":"","LogGroupEncryptionEnabled":false}},"UpstreamServiceName":"MessageGatewayService"}
2023-11-03 01:17:46 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] [DataBackend] Running plugin aws:runShellScript aws:runShellScript
2023-11-03 01:17:46 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] [DataBackend] [pluginName=aws:runShellScript] aws:runShellScript started with configuration {<nil> map[id:0.aws:runShellScript runCommand:[echo test] timeoutSeconds:3600 workingDirectory:] 24f814f5-80aa-429a-ac8b-206b5f249bc3/i-0a2ce926164e897c6/awsrunShellScript false false false /var/lib/amazon/ssm/i-0a2ce926164e897c6/document/orchestration/24f814f5-80aa-429a-ac8b-206b5f249bc3/awsrunShellScript aws.ssm.24f814f5-80aa-429a-ac8b-206b5f249bc3.i-0a2ce926164e897c6 24f814f5-80aa-429a-ac8b-206b5f249bc3 aws:runShellScript aws:runShellScript map[] false [] false { } MessageGatewayService}
2023-11-03 01:17:46 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] [DataBackend] Sending plugin aws:runShellScript completion message
2023-11-03 01:17:46 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] [DataBackend] document execution complete
2023-11-03 01:17:46 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] [DataBackend] sending document complete response...
2023-11-03 01:17:46 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] [DataBackend] stopping ipc worker...
2023-11-03 01:17:46 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] requested shutdown, prepare to stop messaging
2023-11-03 01:17:46 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] channel /var/lib/amazon/ssm/i-0a2ce926164e897c6/channels/24f814f5-80aa-429a-ac8b-206b5f249bc3 requested close
2023-11-03 01:17:46 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] Closed the file watcher listener thread
2023-11-03 01:17:46 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] worker listener stopped on path: /var/lib/amazon/ssm/i-0a2ce926164e897c6/channels/24f814f5-80aa-429a-ac8b-206b5f249bc3
2023-11-03 01:17:46 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] channel /var/lib/amazon/ssm/i-0a2ce926164e897c6/channels/24f814f5-80aa-429a-ac8b-206b5f249bc3 closed
2023-11-03 01:17:46 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] file channel already closed: /var/lib/amazon/ssm/i-0a2ce926164e897c6/channels/24f814f5-80aa-429a-ac8b-206b5f249bc3
2023-11-03 01:17:46 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] ipc channel closed, stop messaging worker
2023-11-03 01:17:46 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] document worker closed
2023-11-03 01:17:46 INFO [ssm-agent-worker] [MessageService] [MGSInteractor] Parsing AgentMessage 26c8f403-1bcd-445e-8253-e990050465f7, Payload: {"schemaVersion":1,"jobId":"aws.ssm.24f814f5-80aa-429a-ac8b-206b5f249bc3.i-0a2ce926164e897c6","topic":"aws.ssm.sendCommand","content":"{\"OutputS3KeyPrefix\":\"\",\"CloudWatchOutputEnabled\":\"false\",\"Parameters\":{\"executionTimeout\":\"3600\",\"commands\":[\"echo test\"]},\"DocumentContent\":{\"schemaVersion\":\"1.2\",\"description\":\"Run a shell script or specify the commands to run.\",\"runtimeConfig\":{\"aws:runShellScript\":{\"properties\":[{\"workingDirectory\":\"{{ workingDirectory }}\",\"timeoutSeconds\":\"{{ executionTimeout }}\",\"runCommand\":\"{{ commands }}\",\"id\":\"0.aws:runShellScript\"}]}},\"parameters\":{\"executionTimeout\":{\"default\":\"3600\",\"description\":\"(Optional) The time in seconds for a command to complete before it is considered to have failed. Default is 3600 (1 hour). Maximum is 172800 (48 hours).\",\"type\":\"String\",\"allowedPattern\":\"([1-9][0-9]{0,4})|(1[0-6][0-9]{4})|(17[0-1][0-9]{3})|(172[0-7][0-9]{2})|(172800)\"},\"workingDirectory\":{\"default\":\"\",\"description\":\"(Optional) The path to the working directory on your instance.\",\"maxChars\":4096,\"type\":\"String\"},\"commands\":{\"minItems\":1,\"displayType\":\"textarea\",\"description\":\"(Required) Specify a shell script or a command to run.\",\"type\":\"StringList\"}}},\"CloudWatchLogGroupName\":\"\",\"OutputS3Region\":\"us-east-1\",\"CommandId\":\"24f814f5-80aa-429a-ac8b-206b5f249bc3\",\"OutputS3BucketName\":\"\",\"DocumentName\":\"AWS-RunShellScript\"}"}
2023-11-03 01:17:46 INFO [ssm-agent-worker] [MessageService] [EngineProcessor] document aws.ssm.24f814f5-80aa-429a-ac8b-206b5f249bc3.i-0a2ce926164e897c6 submission started
2023-11-03 01:17:46 INFO [ssm-agent-worker] [MessageService] [EngineProcessor] document aws.ssm.24f814f5-80aa-429a-ac8b-206b5f249bc3.i-0a2ce926164e897c6 submission ended
2023-11-03 01:17:46 INFO [ssm-agent-worker] [MessageService] [CommandProcessorWrapper] [Idempotency] writing command in the idempotency directory for command 24f814f5-80aa-429a-ac8b-206b5f249bc3
2023-11-03 01:17:46 INFO [ssm-agent-worker] [MessageService] [EngineProcessor] Got job aws.ssm.24f814f5-80aa-429a-ac8b-206b5f249bc3.i-0a2ce926164e897c6, starting worker
2023-11-03 01:17:46 INFO [ssm-agent-worker] [MessageService] [MGSInteractor] Successfully sent ack message id ff361094-3a69-41bf-8214-b574ec675495 back for JobID aws.ssm.24f814f5-80aa-429a-ac8b-206b5f249bc3.i-0a2ce926164e897c6
2023-11-03 01:17:46 INFO [ssm-agent-worker] [MessageService] [EngineProcessor] [BasicExecuter] [24f814f5-80aa-429a-ac8b-206b5f249bc3] channel: 24f814f5-80aa-429a-ac8b-206b5f249bc3 not found, creating a new file channel...
2023-11-03 01:17:46 INFO [ssm-agent-worker] [MessageService] [EngineProcessor] [BasicExecuter] [24f814f5-80aa-429a-ac8b-206b5f249bc3] master listener started onpath: /var/lib/amazon/ssm/i-0a2ce926164e897c6/channels/24f814f5-80aa-429a-ac8b-206b5f249bc3
2023-11-03 01:17:46 INFO [ssm-agent-worker] [MessageService] [EngineProcessor] [BasicExecuter] [24f814f5-80aa-429a-ac8b-206b5f249bc3] inter process communication started at /var/lib/amazon/ssm/i-0a2ce926164e897c6/channels/24f814f5-80aa-429a-ac8b-206b5f249bc3
2023-11-03 01:17:46 INFO [ssm-agent-worker] [MessageService] [EngineProcessor] [BasicExecuter] [24f814f5-80aa-429a-ac8b-206b5f249bc3] requested terminate messaging worker, destroying the channel
2023-11-03 01:17:46 INFO [ssm-agent-worker] [MessageService] [EngineProcessor] [BasicExecuter] [24f814f5-80aa-429a-ac8b-206b5f249bc3] channel /var/lib/amazon/ssm/i-0a2ce926164e897c6/channels/24f814f5-80aa-429a-ac8b-206b5f249bc3 requested close
2023-11-03 01:17:46 INFO [ssm-agent-worker] [MessageService] [EngineProcessor] sending document: 24f814f5-80aa-429a-ac8b-206b5f249bc3 complete response
2023-11-03 01:17:46 INFO [ssm-agent-worker] [MessageService] [CommandProcessorWrapper] command: aws.ssm.24f814f5-80aa-429a-ac8b-206b5f249bc3.i-0a2ce926164e897c6complete
2023-11-03 01:17:46 INFO [ssm-agent-worker] [MessageService] [EngineProcessor] [BasicExecuter] [24f814f5-80aa-429a-ac8b-206b5f249bc3] Closed the file watcher listener thread
2023-11-03 01:17:46 INFO [ssm-agent-worker] [MessageService] [EngineProcessor] [BasicExecuter] [24f814f5-80aa-429a-ac8b-206b5f249bc3] master listener stopped onpath: /var/lib/amazon/ssm/i-0a2ce926164e897c6/channels/24f814f5-80aa-429a-ac8b-206b5f249bc3
2023-11-03 01:17:46 INFO [ssm-agent-worker] [MessageService] [MGSInteractor] received reply for RunCommandResult aws.ssm.24f814f5-80aa-429a-ac8b-206b5f249bc3.i-0a2ce926164e897c6 with message id c3432f08-386d-47de-8e90-69237df400e7
2023-11-03 01:17:46 INFO [ssm-agent-worker] [MessageService] [MGSInteractor] received reply for RunCommandResult aws.ssm.24f814f5-80aa-429a-ac8b-206b5f249bc3.i-0a2ce926164e897c6 with message id 19838f76-aa69-4c24-8a1b-f6c357b4156f
2023-11-03 01:17:46 INFO [ssm-agent-worker] [MessageService] [MGSInteractor] Got reply msg Id c3432f08-386d-47de-8e90-69237df400e7 for RunCommandResult aws.ssm.24f814f5-80aa-429a-ac8b-206b5f249bc3.i-0a2ce926164e897c6, starting reply thread
2023-11-03 01:17:46 INFO [ssm-agent-worker] [MessageService] [MGSInteractor] Got reply msg Id 19838f76-aa69-4c24-8a1b-f6c357b4156f for RunCommandResult aws.ssm.24f814f5-80aa-429a-ac8b-206b5f249bc3.i-0a2ce926164e897c6, starting reply thread
2023-11-03 01:17:49 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] Stop the cloudwatchlogs publisher
2023-11-03 01:17:46 INFO [ssm-agent-worker] [MessageService] [EngineProcessor] [BasicExecuter] [24f814f5-80aa-429a-ac8b-206b5f249bc3] channel /var/lib/amazon/ssm/i-0a2ce926164e897c6/channels/24f814f5-80aa-429a-ac8b-206b5f249bc3 closed
2023-11-03 01:17:46 INFO [ssm-agent-worker] [MessageService] [EngineProcessor] [BasicExecuter] [24f814f5-80aa-429a-ac8b-206b5f249bc3] Executer closed
2023-11-03 01:17:46 INFO [ssm-agent-worker] [MessageService] [EngineProcessor] execution of aws.ssm.24f814f5-80aa-429a-ac8b-206b5f249bc3.i-0a2ce926164e897c6 is over. Removing interimState from current folder
2023-11-03 01:17:46 INFO [ssm-document-worker] [24f814f5-80aa-429a-ac8b-206b5f249bc3] [DataBackend] document execution complete
というログからssm-document-worker
というプロセスが動作して、実際のコマンドを実行していることが分かります。
そして、よくよく見ると[DataBackend]
として以下のログも記録されていました。
{
"DocumentInformation": {
"DocumentID": "24f814f5-80aa-429a-ac8b-206b5f249bc3",
"CommandID": "24f814f5-80aa-429a-ac8b-206b5f249bc3",
"AssociationID": "",
"InstanceID": "i-0a2ce926164e897c6",
"MessageID": "aws.ssm.24f814f5-80aa-429a-ac8b-206b5f249bc3.i-0a2ce926164e897c6",
"RunID": "2023-11-03T01-17-46.186Z",
"CreatedDate": "55808-05-09 00:09:44 +0000 UTC",
"DocumentName": "AWS-RunShellScript",
"DocumentVersion": "",
"DocumentStatus": "InProgress",
"RunCount": 0,
"ProcInfo": {
"Pid": 1499,
"StartTime": "2023-11-03T01:17:46.188405338Z"
},
"ClientId": "",
"RunAsUser": "",
"SessionOwner": ""
},
"DocumentType": "SendCommand",
"SchemaVersion": "1.2",
"InstancePluginsInformation": [
{
"Configuration": {
"Settings": null,
"Properties": [
{
"id": "0.aws:runShellScript",
"runCommand": [
"echo test"
],
"timeoutSeconds": "3600",
"workingDirectory": ""
}
],
"OutputS3KeyPrefix": "24f814f5-80aa-429a-ac8b-206b5f249bc3/i-0a2ce926164e897c6/awsrunShellScript",
"OutputS3BucketName": "",
"S3EncryptionEnabled": false,
"CloudWatchLogGroup": "",
"CloudWatchEncryptionEnabled": false,
"CloudWatchStreamingEnabled": false,
"OrchestrationDirectory": "/var/lib/amazon/ssm/i-0a2ce926164e897c6/document/orchestration/24f814f5-80aa-429a-ac8b-206b5f249bc3/awsrunShellScript",
"MessageId": "aws.ssm.24f814f5-80aa-429a-ac8b-206b5f249bc3.i-0a2ce926164e897c6",
"BookKeepingFileName": "24f814f5-80aa-429a-ac8b-206b5f249bc3",
"PluginName": "aws:runShellScript",
"PluginID": "aws:runShellScript",
"DefaultWorkingDirectory": "",
"Preconditions": null,
"IsPreconditionEnabled": false,
"CurrentAssociations": null,
"SessionId": "",
"ClientId": "",
"KmsKeyId": "",
"RunAsEnabled": false,
"RunAsUser": "",
"ShellProfile": {
"windows": "",
"linux": ""
},
"SessionOwner": "",
"UpstreamServiceName": ""
},
"Name": "aws:runShellScript",
"Result": {
"pluginID": "",
"pluginName": "",
"status": "",
"code": 0,
"output": null,
"startDateTime": "0001-01-01T00:00:00Z",
"endDateTime": "0001-01-01T00:00:00Z",
"outputS3BucketName": "",
"outputS3KeyPrefix": "",
"stepName": "",
"error": "",
"standardOutput": "",
"standardError": ""
},
"Id": "aws:runShellScript"
}
],
"CancelInformation": {
"CancelMessageID": "",
"CancelCommandID": "",
"Payload": "",
"DebugInfo": ""
},
"IOConfig": {
"OrchestrationDirectory": "/var/lib/amazon/ssm/i-0a2ce926164e897c6/document/orchestration/24f814f5-80aa-429a-ac8b-206b5f249bc3",
"OutputS3BucketName": "",
"OutputS3KeyPrefix": "24f814f5-80aa-429a-ac8b-206b5f249bc3/i-0a2ce926164e897c6",
"CloudWatchConfig": {
"LogGroupName": "",
"LogStreamPrefix": "",
"LogGroupEncryptionEnabled": false
}
},
"UpstreamServiceName": "MessageGatewayService"
}
Command IDはもちろん、渡されたパラメーターなども記録されていますね。
ここで注目すべきはDocumentInformation.ProcInfo.Pid
です。
以下記事でSSM Session ManagerのプロセスはSSM Agentの子プロセスであることを確認しました。
Run Commandで渡されたコマンドはssm-document-worker
で実行されていそうであることを確認しました。つまり、渡されたコマンド上で親プロセスのID(PPID)を取得すれば、上述のログからCommand IDを取得することができるのではないでしょうか。
試しに以下コマンドをRun Commandで渡してみます。
#!/bin/bash
# SSM Agentのステータスの確認
systemctl status amazon-ssm-agent.service
# プロセスツリーの確認
pstree -ulpc
実行結果は以下のとおりです。
● amazon-ssm-agent.service - amazon-ssm-agent
Loaded: loaded (/etc/systemd/system/amazon-ssm-agent.service; enabled; preset: disabled)
Active: active (running) since Fri 2023-11-03 01:15:48 UTC; 38min ago
Main PID: 951 (amazon-ssm-agen)
Tasks: 42 (limit: 4260)
Memory: 236.6M
CPU: 8.873s
CGroup: /system.slice/amazon-ssm-agent.service
├─ 951 /usr/bin/amazon-ssm-agent
├─1329 /usr/bin/ssm-agent-worker
├─1519 /usr/bin/ssm-session-worker <IAMユーザー名>-08b650a06d34643c8
├─1531 sh
├─1532 /bin/bash
├─1884 /usr/bin/ssm-document-worker a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae
├─1890 /bin/bash /var/lib/amazon/ssm/i-0a2ce926164e897c6/document/orchestration/a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae/awsrunShellScript/0.awsrunShellScript/_script.sh
└─1891 systemctl status amazon-ssm-agent.service
Nov 03 01:15:49 ip-172-31-86-227.ec2.internal amazon-ssm-agent[951]: 2023-11-03 01:15:49 INFO [amazon-ssm-agent] [LongRunningWorkerContainer] [WorkerProvider] Worker ssm-agent-worker is not running, starting worker process
Nov 03 01:15:50 ip-172-31-86-227.ec2.internal amazon-ssm-agent[951]: 2023-11-03 01:15:49 INFO [amazon-ssm-agent] [LongRunningWorkerContainer] [WorkerProvider] Worker ssm-agent-worker (pid:1329) started
Nov 03 01:15:50 ip-172-31-86-227.ec2.internal amazon-ssm-agent[951]: 2023-11-03 01:15:49 INFO [amazon-ssm-agent] [LongRunningWorkerContainer] Monitor long running worker health every 60 seconds
Nov 03 01:21:42 ip-172-31-86-227.ec2.internal sudo[1553]: ec2-user : TTY=pts/0 ; PWD=/home/ec2-user ; USER=root ; COMMAND=/bin/su -ls -l /var/log/amazon/ssm/
Nov 03 01:21:48 ip-172-31-86-227.ec2.internal sudo[1567]: ec2-user : TTY=pts/0 ; PWD=/home/ec2-user ; USER=root ; COMMAND=/bin/ls -l /var/log/amazon/ssm/
Nov 03 01:22:00 ip-172-31-86-227.ec2.internal sudo[1574]: ec2-user : TTY=pts/0 ; PWD=/home/ec2-user ; USER=root ; COMMAND=/bin/grep 24f814f5-80aa-429a-ac8b-206b5f249bc3 /var/log/amazon/ssm/amazon-ssm-agent.log
Nov 03 01:45:49 ip-172-31-86-227.ec2.internal amazon-ssm-agent[951]: 2023-11-03 01:45:49 INFO EC2RoleProvider Successfully connected with instance profile role credentials
Nov 03 01:45:50 ip-172-31-86-227.ec2.internal amazon-ssm-agent[951]: 2023-11-03 01:45:49 INFO [CredentialRefresher] Credentials ready
Nov 03 01:45:50 ip-172-31-86-227.ec2.internal amazon-ssm-agent[951]: 2023-11-03 01:45:49 INFO [CredentialRefresher] Next credential rotation will be in 29.999988924266667 minutes
Nov 03 01:46:03 ip-172-31-86-227.ec2.internal sudo[1724]: ec2-user : TTY=pts/0 ; PWD=/home/ec2-user ; USER=root ; COMMAND=/bin/ps --antp
systemd(1)-+-NetworkManager(640)-+-{NetworkManager}(641)
| `-{NetworkManager}(642)
|-agetty(962)
|-agetty(965)
|-amazon-ssm-agen(951)-+-ssm-agent-worke(1329)-+-ssm-document-wo(1884)-+-_script.sh(1890)---pstree(1892)
| | | |-{ssm-document-wo}(1885)
| | | |-{ssm-document-wo}(1886)
| | | |-{ssm-document-wo}(1887)
| | | |-{ssm-document-wo}(1888)
| | | |-{ssm-document-wo}(1889)
| | | `-{ssm-document-wo}(1893)
| | |-ssm-session-wor(1519)-+-sh(1531,ec2-user)---bash(1532)
| | | |-{ssm-session-wor}(1520)
| | | |-{ssm-session-wor}(1521)
| | | |-{ssm-session-wor}(1522)
| | | |-{ssm-session-wor}(1523)
| | | |-{ssm-session-wor}(1524)
| | | |-{ssm-session-wor}(1525)
| | | |-{ssm-session-wor}(1526)
| | | `-{ssm-session-wor}(1551)
| | |-{ssm-agent-worke}(1332)
| | |-{ssm-agent-worke}(1333)
| | |-{ssm-agent-worke}(1334)
| | |-{ssm-agent-worke}(1335)
| | |-{ssm-agent-worke}(1337)
| | |-{ssm-agent-worke}(1338)
| | |-{ssm-agent-worke}(1339)
| | |-{ssm-agent-worke}(1340)
| | |-{ssm-agent-worke}(1456)
| | |-{ssm-agent-worke}(1459)
| | |-{ssm-agent-worke}(1460)
| | |-{ssm-agent-worke}(1478)
| | |-{ssm-agent-worke}(1480)
| | `-{ssm-agent-worke}(1481)
| |-{amazon-ssm-agen}(957)
| |-{amazon-ssm-agen}(958)
| |-{amazon-ssm-agen}(959)
| |-{amazon-ssm-agen}(960)
| |-{amazon-ssm-agen}(963)
| |-{amazon-ssm-agen}(964)
| `-{amazon-ssm-agen}(1328)
|-auditd(574)---{auditd}(575)
|-chronyd(616,chrony)
|-crond(961)
|-dbus-broker-lau(599,dbus)---dbus-broker(605)
|-gssproxy(654)-+-{gssproxy}(656)
| |-{gssproxy}(657)
| |-{gssproxy}(658)
| |-{gssproxy}(659)
| `-{gssproxy}(660)
|-irqbalance(608)---{irqbalance}(617)
|-polkitd(902,polkitd)-+-{polkitd}(912)
| |-{polkitd}(913)
| |-{polkitd}(915)
| |-{polkitd}(916)
| `-{polkitd}(919)
|-rhsmcertd(652)---{rhsmcertd}(653)
|-rpcbind(573,rpc)
|-rsyslogd(609)-+-{rsyslogd}(613)
| `-{rsyslogd}(614)
|-sshd(955)
|-systemd-journal(499)
|-systemd-logind(610)
|-systemd-udevd(512)
`-tuned(651)-+-{tuned}(903)
|-{tuned}(906)
`-{tuned}(909)
Run Commandで実行されるコマンドは_script.sh
の子プロセスで、_script.sh
の親プロセスはssm-document-worker
であることが分かります。ssm-document-worker
のPIDは1884
です。
Command IDa042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae
のSSM Agentのログを確認して、PIDが1884
か確認します。
$ sudo grep a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae /var/log/amazon/ssm/amazon-ssm-agent.log
2023-11-03 01:54:48 INFO [ssm-document-worker] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] Init the cloudwatchlogs publisher
2023-11-03 01:54:48 INFO [ssm-document-worker] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] document: a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae worker started
2023-11-03 01:54:48 INFO [ssm-document-worker] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] channel: a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae found
2023-11-03 01:54:48 INFO [ssm-document-worker] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] Successfully loaded platform independent plugin aws:downloadContent
2023-11-03 01:54:48 INFO [ssm-document-worker] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] Successfully loaded platform independent plugin aws:runDocument
2023-11-03 01:54:48 INFO [ssm-document-worker] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] Successfully loaded platform independent plugin aws:softwareInventory
2023-11-03 01:54:48 INFO [ssm-document-worker] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] Successfully loaded platform independent plugin aws:runPowerShellScript
2023-11-03 01:54:48 INFO [ssm-document-worker] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] Successfully loaded platform independent plugin aws:updateSsmAgent
2023-11-03 01:54:48 INFO [ssm-document-worker] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] Successfully loaded platform independent plugin aws:configureDocker
2023-11-03 01:54:48 INFO [ssm-document-worker] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] Successfully loaded platform independent plugin aws:configurePackage
2023-11-03 01:54:48 INFO [ssm-document-worker] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] Successfully loaded platform independent plugin aws:runDockerAction
2023-11-03 01:54:48 INFO [ssm-document-worker] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] Successfully loaded platform independent plugin aws:refreshAssociation
2023-11-03 01:54:48 INFO [ssm-document-worker] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] Successfully loaded platform dependent plugin aws:runShellScript
2023-11-03 01:54:48 INFO [ssm-document-worker] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] Successfully loaded platform dependent plugin aws:domainJoin
2023-11-03 01:54:48 INFO [ssm-document-worker] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] inter process communication started at /var/lib/amazon/ssm/i-0a2ce926164e897c6/channels/a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae
2023-11-03 01:54:48 INFO [ssm-document-worker] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] worker listener started on path: /var/lib/amazon/ssm/i-0a2ce926164e897c6/channels/a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae
2023-11-03 01:54:48 INFO [ssm-document-worker] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] [DataBackend] received plugin config message
2023-11-03 01:54:48 INFO [ssm-document-worker] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] [DataBackend] {"DocumentInformation":{"DocumentID":"a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae","CommandID":"a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae","AssociationID":"","InstanceID":"i-0a2ce926164e897c6","MessageID":"aws.ssm.a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae.i-0a2ce926164e897c6","RunID":"2023-11-03T01-54-48.572Z","CreatedDate":"55808-06-03 17:29:29 +0000 UTC","DocumentName":"AWS-RunShellScript","DocumentVersion":"","DocumentStatus":"InProgress","RunCount":0,"ProcInfo":{"Pid":1884,"StartTime":"2023-11-03T01:54:48.573653529Z"},"ClientId":"","RunAsUser":"","SessionOwner":""},"DocumentType":"SendCommand","SchemaVersion":"1.2","InstancePluginsInformation":[{"Configuration":{"Settings":null,"Properties":[{"id":"0.aws:runShellScript","runCommand":["#!/bin/bash","","# SSM Agentのステータスの確認","systemctl status amazon-ssm-agent.service","","# プロセスツリーの確認","pstree -ulpc"],"timeoutSeconds":"3600","workingDirectory":""}],"OutputS3KeyPrefix":"a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae/i-0a2ce926164e897c6/awsrunShellScript","OutputS3BucketName":"","S3EncryptionEnabled":false,"CloudWatchLogGroup":"","CloudWatchEncryptionEnabled":false,"CloudWatchStreamingEnabled":false,"OrchestrationDirectory":"/var/lib/amazon/ssm/i-0a2ce926164e897c6/document/orchestration/a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae/awsrunShellScript","MessageId":"aws.ssm.a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae.i-0a2ce926164e897c6","BookKeepingFileName":"a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae","PluginName":"aws:runShellScript","PluginID":"aws:runShellScript","DefaultWorkingDirectory":"","Preconditions":null,"IsPreconditionEnabled":false,"CurrentAssociations":null,"SessionId":"","ClientId":"","KmsKeyId":"","RunAsEnabled":false,"RunAsUser":"","ShellProfile":{"windows":"","linux":""},"SessionOwner":"","UpstreamServiceName":""},"Name":"aws:runShellScript","Result":{"pluginID":"","pluginName":"","status":"","code":0,"output":null,"startDateTime":"0001-01-01T00:00:00Z","endDateTime":"0001-01-01T00:00:00Z","outputS3BucketName":"","outputS3KeyPrefix":"","stepName":"","error":"","standardOutput":"","standardError":""},"Id":"aws:runShellScript"}],"CancelInformation":{"CancelMessageID":"","CancelCommandID":"","Payload":"","DebugInfo":""},"IOConfig":{"OrchestrationDirectory":"/var/lib/amazon/ssm/i-0a2ce926164e897c6/document/orchestration/a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae","OutputS3BucketName":"","OutputS3KeyPrefix":"a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae/i-0a2ce926164e897c6","CloudWatchConfig":{"LogGroupName":"","LogStreamPrefix":"","LogGroupEncryptionEnabled":false}},"UpstreamServiceName":"MessageGatewayService"}
2023-11-03 01:54:48 INFO [ssm-document-worker] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] [DataBackend] Running plugin aws:runShellScript aws:runShellScript
2023-11-03 01:54:48 INFO [ssm-document-worker] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] [DataBackend] [pluginName=aws:runShellScript] aws:runShellScript started with configuration {<nil> map[id:0.aws:runShellScript runCommand:[#!/bin/bash # SSM Agentのステータスの確認 systemctl status amazon-ssm-agent.service # プロセスツリーの確認 pstree -ulpc] timeoutSeconds:3600 workingDirectory:] a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae/i-0a2ce926164e897c6/awsrunShellScript false false false/var/lib/amazon/ssm/i-0a2ce926164e897c6/document/orchestration/a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae/awsrunShellScript aws.ssm.a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae.i-0a2ce926164e897c6 a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae aws:runShellScript aws:runShellScript map[] false [] false { } MessageGatewayService}
2023-11-03 01:54:48 INFO [ssm-document-worker] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] [DataBackend] Sending plugin aws:runShellScript completion message
2023-11-03 01:54:48 INFO [ssm-document-worker] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] [DataBackend] document execution complete
2023-11-03 01:54:48 INFO [ssm-document-worker] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] [DataBackend] sending document complete response...
2023-11-03 01:54:48 INFO [ssm-document-worker] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] [DataBackend] stopping ipc worker...
2023-11-03 01:54:48 INFO [ssm-document-worker] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] requested shutdown, prepare to stop messaging
2023-11-03 01:54:48 INFO [ssm-document-worker] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] channel /var/lib/amazon/ssm/i-0a2ce926164e897c6/channels/a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae requested close
2023-11-03 01:54:48 INFO [ssm-document-worker] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] Closed the file watcher listener thread
2023-11-03 01:54:48 INFO [ssm-document-worker] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] worker listener stopped on path: /var/lib/amazon/ssm/i-0a2ce926164e897c6/channels/a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae
2023-11-03 01:54:48 INFO [ssm-document-worker] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] channel /var/lib/amazon/ssm/i-0a2ce926164e897c6/channels/a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae closed
2023-11-03 01:54:48 INFO [ssm-document-worker] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] file channel already closed: /var/lib/amazon/ssm/i-0a2ce926164e897c6/channels/a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae
2023-11-03 01:54:48 INFO [ssm-document-worker] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] ipc channel closed, stop messaging worker
2023-11-03 01:54:48 INFO [ssm-document-worker] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] document worker closed
2023-11-03 01:54:48 INFO [ssm-agent-worker] [MessageService] [MGSInteractor] Parsing AgentMessage 52cebd25-3fcb-4291-9a8f-0b2444f6fdb7, Payload: {"schemaVersion":1,"jobId":"aws.ssm.a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae.i-0a2ce926164e897c6","topic":"aws.ssm.sendCommand","content":"{\"OutputS3KeyPrefix\":\"\",\"CloudWatchOutputEnabled\":\"false\",\"Parameters\":{\"executionTimeout\":\"3600\",\"commands\":[\"#!/bin/bash\",\"\",\"# SSM Agentのステータスの確認\",\"systemctl status amazon-ssm-agent.service\",\"\",\"# プロセスツリーの確認\",\"pstree -ulpc\"]},\"DocumentContent\":{\"schemaVersion\":\"1.2\",\"description\":\"Run a shell script or specify the commands to run.\",\"runtimeConfig\":{\"aws:runShellScript\":{\"properties\":[{\"workingDirectory\":\"{{ workingDirectory }}\",\"timeoutSeconds\":\"{{ executionTimeout }}\",\"runCommand\":\"{{ commands }}\",\"id\":\"0.aws:runShellScript\"}]}},\"parameters\":{\"executionTimeout\":{\"default\":\"3600\",\"description\":\"(Optional) The time in seconds for a command to complete before it is considered to have failed. Default is 3600 (1 hour). Maximum is 172800 (48 hours).\",\"type\":\"String\",\"allowedPattern\":\"([1-9][0-9]{0,4})|(1[0-6][0-9]{4})|(17[0-1][0-9]{3})|(172[0-7][0-9]{2})|(172800)\"},\"workingDirectory\":{\"default\":\"\",\"description\":\"(Optional) The path to the working directory on your instance.\",\"maxChars\":4096,\"type\":\"String\"},\"commands\":{\"minItems\":1,\"displayType\":\"textarea\",\"description\":\"(Required) Specify a shell script or a command to run.\",\"type\":\"StringList\"}}},\"CloudWatchLogGroupName\":\"\",\"OutputS3Region\":\"us-east-1\",\"CommandId\":\"a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae\",\"OutputS3BucketName\":\"\",\"DocumentName\":\"AWS-RunShellScript\"}"}
2023-11-03 01:54:48 INFO [ssm-agent-worker] [MessageService] [EngineProcessor] document aws.ssm.a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae.i-0a2ce926164e897c6 submission started
2023-11-03 01:54:48 INFO [ssm-agent-worker] [MessageService] [EngineProcessor] document aws.ssm.a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae.i-0a2ce926164e897c6 submission ended
2023-11-03 01:54:48 INFO [ssm-agent-worker] [MessageService] [CommandProcessorWrapper] [Idempotency] writing command in the idempotency directory for command a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae
2023-11-03 01:54:48 INFO [ssm-agent-worker] [MessageService] [EngineProcessor] Got job aws.ssm.a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae.i-0a2ce926164e897c6, starting worker
2023-11-03 01:54:48 INFO [ssm-agent-worker] [MessageService] [MGSInteractor] Successfully sent ack message id 1516f4bb-16c1-4b16-b89f-babb00a8c33a back for JobID aws.ssm.a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae.i-0a2ce926164e897c6
2023-11-03 01:54:48 INFO [ssm-agent-worker] [MessageService] [EngineProcessor] [BasicExecuter] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] channel: a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae not found, creating a new file channel...
2023-11-03 01:54:48 INFO [ssm-agent-worker] [MessageService] [EngineProcessor] [BasicExecuter] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] master listener started onpath: /var/lib/amazon/ssm/i-0a2ce926164e897c6/channels/a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae
2023-11-03 01:54:48 INFO [ssm-agent-worker] [MessageService] [EngineProcessor] [BasicExecuter] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] inter process communication started at /var/lib/amazon/ssm/i-0a2ce926164e897c6/channels/a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae
2023-11-03 01:54:48 INFO [ssm-agent-worker] [MessageService] [MGSInteractor] received reply for RunCommandResult aws.ssm.a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae.i-0a2ce926164e897c6 with message id 400be319-dd2d-4bc6-b6d1-4891addd8867
2023-11-03 01:54:48 INFO [ssm-agent-worker] [MessageService] [EngineProcessor] [BasicExecuter] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] requested terminate messaging worker, destroying the channel
2023-11-03 01:54:48 INFO [ssm-agent-worker] [MessageService] [EngineProcessor] [BasicExecuter] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] channel /var/lib/amazon/ssm/i-0a2ce926164e897c6/channels/a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae requested close
2023-11-03 01:54:48 INFO [ssm-agent-worker] [MessageService] [EngineProcessor] sending document: a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae complete response
2023-11-03 01:54:48 INFO [ssm-agent-worker] [MessageService] [CommandProcessorWrapper] command: aws.ssm.a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae.i-0a2ce926164e897c6complete
2023-11-03 01:54:48 INFO [ssm-agent-worker] [MessageService] [EngineProcessor] [BasicExecuter] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] Closed the file watcher listener thread
2023-11-03 01:54:48 INFO [ssm-agent-worker] [MessageService] [EngineProcessor] [BasicExecuter] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] master listener stopped onpath: /var/lib/amazon/ssm/i-0a2ce926164e897c6/channels/a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae
2023-11-03 01:54:48 INFO [ssm-agent-worker] [MessageService] [EngineProcessor] [BasicExecuter] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] channel /var/lib/amazon/ssm/i-0a2ce926164e897c6/channels/a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae closed
2023-11-03 01:54:48 INFO [ssm-agent-worker] [MessageService] [MGSInteractor] received reply for RunCommandResult aws.ssm.a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae.i-0a2ce926164e897c6 with message id 0b9b480a-852a-417e-b2c3-0126e5db2e4e
2023-11-03 01:54:48 INFO [ssm-agent-worker] [MessageService] [MGSInteractor] Got reply msg Id 400be319-dd2d-4bc6-b6d1-4891addd8867 for RunCommandResult aws.ssm.a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae.i-0a2ce926164e897c6, starting reply thread
2023-11-03 01:54:48 INFO [ssm-agent-worker] [MessageService] [MGSInteractor] Got reply msg Id 0b9b480a-852a-417e-b2c3-0126e5db2e4e for RunCommandResult aws.ssm.a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae.i-0a2ce926164e897c6, starting reply thread
2023-11-03 01:54:51 INFO [ssm-document-worker] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] Stop the cloudwatchlogs publisher
"output": "● amazon-ssm-agent.service - amazon-ssm-agent\n Loaded: loaded (/etc/systemd/system/amazon-ssm-agent.service; enabled; preset: disabled)\n Active: active (running) since Fri 2023-11-03 01:15:48 UTC; 38min ago\n Main PID: 951 (amazon-ssm-agen)\n Tasks: 42 (limit: 4260)\n Memory: 236.6M\n CPU: 8.873s\n CGroup: /system.slice/amazon-ssm-agent.service\n ├─ 951 /usr/bin/amazon-ssm-agent\n ├─1329 /usr/bin/ssm-agent-worker\n ├─1519 /usr/bin/ssm-session-worker <IAMユーザー名>-08b650a06d34643c8\n ├─1531 sh\n ├─1532 /bin/bash\n├─1884 /usr/bin/ssm-document-worker a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae\n ├─1890 /bin/bash /var/lib/amazon/ssm/i-0a2ce926164e897c6/document/orchestration/a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae/awsrunShellScript/0.awsrunShellScript/_script.sh\n └─1891 systemctl status amazon-ssm-agent.service\n\nNov 03 01:15:49 ip-172-31-86-227.ec2.internal amazon-ssm-agent[951]: 2023-11-03 01:15:49 INFO [amazon-ssm-agent] [LongRunningWorkerContainer] [WorkerProvider] Worker ssm-agent-worker is not running, starting worker process\nNov 03 01:15:50 ip-172-31-86-227.ec2.internal amazon-ssm-agent[951]: 2023-11-03 01:15:49 INFO [amazon-ssm-agent] [LongRunningWorkerContainer] [WorkerProvider] Worker ssm-agent-worker (pid:1329) started\nNov 03 01:15:50 ip-172-31-86-227.ec2.internal amazon-ssm-agent[951]: 2023-11-03 01:15:49 INFO [amazon-ssm-agent] [LongRunningWorkerContainer] Monitor long running worker health every 60 seconds\nNov 03 01:21:42 ip-172-31-86-227.ec2.internal sudo[1553]: ec2-user : TTY=pts/0 ; PWD=/home/ec2-user ; USER=root ; COMMAND=/bin/su -ls -l /var/log/amazon/ssm/\nNov 03 01:21:48 ip-172-31-86-227.ec2.internal sudo[1567]: ec2-user : TTY=pts/0 ; PWD=/home/ec2-user ; USER=root ; COMMAND=/bin/ls -l /var/log/amazon/ssm/\nNov 03 01:22:00 ip-172-31-86-227.ec2.internal sudo[1574]: ec2-user : TTY=pts/0 ; PWD=/home/ec2-user ; USER=root ; COMMAND=/bin/grep 24f814f5-80aa-429a-ac8b-206b5f249bc3 /var/log/amazon/ssm/amazon-ssm-agent.log\nNov 03 01:45:49 ip-172-31-86-227.ec2.internal amazon-ssm-agent[951]: 2023-11-03 01:45:49 INFO EC2RoleProvider Successfully connected with instance profile role credentials\nNov 03 01:45:50 ip-172-31-86-227.ec2.internal amazon-ssm-agent[951]: 2023-11-03 01:45:49 INFO [CredentialRefresher] Credentials ready\nNov 03 01:45:50 ip-172-31-86-227.ec2.internal amazon-ssm-agent[951]\n---Output truncated---",
"standardOutput": "● amazon-ssm-agent.service - amazon-ssm-agent\n Loaded: loaded (/etc/systemd/system/amazon-ssm-agent.service; enabled; preset: disabled)\n Active: active (running) since Fri 2023-11-03 01:15:48 UTC; 38min ago\n Main PID: 951 (amazon-ssm-agen)\n Tasks: 42 (limit: 4260)\n Memory: 236.6M\n CPU: 8.873s\n CGroup: /system.slice/amazon-ssm-agent.service\n ├─ 951 /usr/bin/amazon-ssm-agent\n ├─1329 /usr/bin/ssm-agent-worker\n ├─1519 /usr/bin/ssm-session-worker <IAMユーザー名>-08b650a06d34643c8\n ├─1531 sh\n ├─1532 /bin/bash\n ├─1884 /usr/bin/ssm-document-worker a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae\n ├─1890 /bin/bash /var/lib/amazon/ssm/i-0a2ce926164e897c6/document/orchestration/a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae/awsrunShellScript/0.awsrunShellScript/_script.sh\n └─1891 systemctl status amazon-ssm-agent.service\n\nNov 03 01:15:49 ip-172-31-86-227.ec2.internal amazon-ssm-agent[951]: 2023-11-03 01:15:49 INFO [amazon-ssm-agent] [LongRunningWorkerContainer] [WorkerProvider] Worker ssm-agent-worker is not running, starting worker process\nNov 03 01:15:50 ip-172-31-86-227.ec2.internal amazon-ssm-agent[951]: 2023-11-03 01:15:49 INFO [amazon-ssm-agent] [LongRunningWorkerContainer] [WorkerProvider] Worker ssm-agent-worker (pid:1329) started\nNov 03 01:15:50 ip-172-31-86-227.ec2.internal amazon-ssm-agent[951]: 2023-11-03 01:15:49 INFO [amazon-ssm-agent] [LongRunningWorkerContainer] Monitor long running worker health every 60 seconds\nNov 03 01:21:42 ip-172-31-86-227.ec2.internal sudo[1553]: ec2-user : TTY=pts/0 ; PWD=/home/ec2-user ; USER=root ; COMMAND=/bin/su -ls -l /var/log/amazon/ssm/\nNov 03 01:21:48 ip-172-31-86-227.ec2.internal sudo[1567]: ec2-user : TTY=pts/0 ; PWD=/home/ec2-user ; USER=root ; COMMAND=/bin/ls -l /var/log/amazon/ssm/\nNov 03 01:22:00 ip-172-31-86-227.ec2.internal sudo[1574]: ec2-user : TTY=pts/0 ; PWD=/home/ec2-user ; USER=root ; COMMAND=/bin/grep 24f814f5-80aa-429a-ac8b-206b5f249bc3 /var/log/amazon/ssm/amazon-ssm-agent.log\nNov 03 01:45:49 ip-172-31-86-227.ec2.internal amazon-ssm-agent[951]: 2023-11-03 01:45:49 INFO EC2RoleProvider Successfully connected with instance profile role credentials\nNov 03 01:45:50 ip-172-31-86-227.ec2.internal amazon-ssm-agent[951]: 2023-11-03 01:45:49 INFO [CredentialRefresher] Credentials ready\nNov 03 01:45:50 ip-172-31-86-227.ec2.internal amazon-ssm-agent[951]: 2023-11-03 01:45:49 INFO [CredentialRefresher] Next credential rotation will be in 29.999988924266667 minutes\nNov 03 01:46:03 ip-172-31-86-227.ec2.internal sudo[1724]: ec2-user : TTY=pts/0 ; PWD=/home/ec2-user ; USER=root ; COMMAND=/bin/ps --antp\nsystemd(1)-+-NetworkManager(640)-+-{NetworkManager}(641)\n | `-{NetworkManager}(642)\n |-agetty(962)\n |-agetty(965)\n |-amazon-ssm-agen(951)-+-ssm-agent-worke(1329)-+-ssm-document-wo(1884)-+-_script.sh(1890)---pstree(1892)\n | | | |-{ssm-document-wo}(1885)\n | | ||-{ssm-document-wo}(1886)\n | | | |-{ssm-document-wo}(1887)\n | | | |-{ssm-document-wo}(1888)\n | | | |-{ssm-document-wo}(1889)\n | | | `-{ssm-document-wo}(1893)\n | | |-ssm-session-wor(1519)-+-sh(1531,ec2-user)---bash(1532)\n | | | |-{ssm-session-wor}(1520)\n | | | |-{ssm-session-wor}(1521)\n | | | |-{ssm-session-wor}(1522)\n | | | |-{ssm-session-wor}(1523)\n | | | |-{ssm-session-wor}(1524)\n | | | |-{ssm-session-wor}(1525)\n | | | |-{ssm-session-wor}(1526)\n | | | `-{ssm-session-wor}(1551)\n | | |-{ssm-agent-worke}(1332)\n | | |-{ssm-agent-worke}(1333)\n | | |-{ssm-agent-worke}(1334)\n | | |-{ssm-agent-worke}(1335)\n | | |-{ssm-agent-worke}(1337)\n | | |-{ssm-agent-worke}(1338)\n | | |-{ssm-agent-worke}(1339)\n | | |-{ssm-agent-worke}(1340)\n | | |-{ssm-agent-worke}(1456)\n | | |-{ssm-agent-worke}(1459)\n | | |-{ssm-agent-worke}(1460)\n | | |-{ssm-agent-worke}(1478)\n | | |-{ssm-agent-worke}(1480)\n | | `-{ssm-agent-worke}(1481)\n | |-{amazon-ssm-agen}(957)\n | |-{amazon-ssm-agen}(958)\n | |-{amazon-ssm-agen}(959)\n | |-{amazon-ssm-agen}(960)\n | |-{amazon-ssm-agen}(963)\n | |-{amazon-ssm-agen}(964)\n | `-{amazon-ssm-agen}(1328)\n |-auditd(574)---{auditd}(575)\n |-chronyd(616,chrony)\n |-crond(961)\n |-dbus-broker-lau(599,dbus)---dbus-broker(605)\n |-gssproxy(654)-+-{gssproxy}(656)\n | |-{gssproxy}(657)\n | |-{gssproxy}(658)\n | |-{gssproxy}(659)\n | `-{gssproxy}(660)\n |-irqbalance(608)---{irqbalance}(617)\n |-polkitd(902,polkitd)-+-{polkitd}(912)\n | |-{polkitd}(913)\n | |-{polkitd}(915)\n | |-{polkitd}(916)\n | `-{polkitd}(919)\n |-rhsmcertd(652)---{rhsmcertd}(653)\n |-rpcbind(573,rpc)\n |-rsyslogd(609)-+-{rsyslogd}(613)\n | `-{rsyslogd}(614)\n |-sshd(955)\n |-systemd-journal(499)\n |-systemd-logind(610)\n |-systemd-udevd(512)\n `-tuned(651)-+-{tuned}(903)\n |-{tuned}(906)\n `-{tuned}(909)\n",
2023-11-03 01:54:48 INFO [ssm-agent-worker] [MessageService] [EngineProcessor] [BasicExecuter] [a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae] Executer closed
2023-11-03 01:54:48 INFO [ssm-agent-worker] [MessageService] [EngineProcessor] execution of aws.ssm.a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae.i-0a2ce926164e897c6 is over. Removing interimState from current folder
"output": "● amazon-ssm-agent.service - amazon-ssm-agent\n Loaded: loaded (/etc/systemd/system/amazon-ssm-agent.service; enabled; preset: disabled)\n Active: active (running) since Fri 2023-11-03 01:15:48 UTC; 38min ago\n Main PID: 951 (amazon-ssm-agen)\n Tasks: 42 (limit: 4260)\n Memory: 236.6M\n CPU: 8.873s\n CGroup: /system.slice/amazon-ssm-agent.service\n ├─ 951 /usr/bin/amazon-ssm-agent\n ├─1329 /usr/bin/ssm-agent-worker\n ├─1519 /usr/bin/ssm-session-worker <IAMユーザー名>-08b650a06d34643c8\n ├─1531 sh\n ├─1532 /bin/bash\n├─1884 /usr/bin/ssm-document-worker a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae\n ├─1890 /bin/bash /var/lib/amazon/ssm/i-0a2ce926164e897c6/document/orchestration/a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae/awsrunShellScript/0.awsrunShellScript/_script.sh\n └─1891 systemctl status amazon-ssm-agent.service\n\nNov 03 01:15:49 ip-172-31-86-227.ec2.internal amazon-ssm-agent[951]: 2023-11-03 01:15:49 INFO [amazon-ssm-agent] [LongRunningWorkerContainer] [WorkerProvider] Worker ssm-agent-worker is not running, starting worker process\nNov 03 01:15:50 ip-172-31-86-227.ec2.internal amazon-ssm-agent[951]: 2023-11-03 01:15:49 INFO [amazon-ssm-agent] [LongRunningWorkerContainer] [WorkerProvider] Worker ssm-agent-worker (pid:1329) started\nNov 03 01:15:50 ip-172-31-86-227.ec2.internal amazon-ssm-agent[951]: 2023-11-03 01:15:49 INFO [amazon-ssm-agent] [LongRunningWorkerContainer] Monitor long running worker health every 60 seconds\nNov 03 01:21:42 ip-172-31-86-227.ec2.internal sudo[1553]: ec2-user : TTY=pts/0 ; PWD=/home/ec2-user ; USER=root ; COMMAND=/bin/su -ls -l /var/log/amazon/ssm/\nNov 03 01:21:48 ip-172-31-86-227.ec2.internal sudo[1567]: ec2-user : TTY=pts/0 ; PWD=/home/ec2-user ; USER=root ; COMMAND=/bin/ls -l /var/log/amazon/ssm/\nNov 03 01:22:00 ip-172-31-86-227.ec2.internal sudo[1574]: ec2-user : TTY=pts/0 ; PWD=/home/ec2-user ; USER=root ; COMMAND=/bin/grep 24f814f5-80aa-429a-ac8b-206b5f249bc3 /var/log/amazon/ssm/amazon-ssm-agent.log\nNov 03 01:45:49 ip-172-31-86-227.ec2.internal amazon-ssm-agent[951]: 2023-11-03 01:45:49 INFO EC2RoleProvider Successfully connected with instance profile role credentials\nNov 03 01:45:50 ip-172-31-86-227.ec2.internal amazon-ssm-agent[951]: 2023-11-03 01:45:49 INFO [CredentialRefresher] Credentials ready\nNov 03 01:45:50 ip-172-31-86-227.ec2.internal amazon-ssm-agent[951]\n---Output truncated---",
"standardOutput": "● amazon-ssm-agent.service - amazon-ssm-agent\n Loaded: loaded (/etc/systemd/system/amazon-ssm-agent.service; enabled; preset: disabled)\n Active: active (running) since Fri 2023-11-03 01:15:48 UTC; 38min ago\n Main PID: 951 (amazon-ssm-agen)\n Tasks: 42 (limit: 4260)\n Memory: 236.6M\n CPU: 8.873s\n CGroup: /system.slice/amazon-ssm-agent.service\n ├─ 951 /usr/bin/amazon-ssm-agent\n ├─1329 /usr/bin/ssm-agent-worker\n ├─1519 /usr/bin/ssm-session-worker <IAMユーザー名>-08b650a06d34643c8\n ├─1531 sh\n ├─1532 /bin/bash\n ├─1884 /usr/bin/ssm-document-worker a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae\n ├─1890 /bin/bash /var/lib/amazon/ssm/i-0a2ce926164e897c6/document/orchestration/a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae/awsrunShellScript/0.awsrunShellScript/_script.sh\n └─1891 systemctl status amazon-ssm-agent.service\n\nNov 03 01:15:49 ip-172-31-86-227.ec2.internal amazon-ssm-agent[951]: 2023-11-03 01:15:49 INFO [amazon-ssm-agent] [LongRunningWorkerContainer] [WorkerProvider] Worker ssm-agent-worker is not running, starting worker process\nNov 03 01:15:50 ip-172-31-86-227.ec2.internal amazon-ssm-agent[951]: 2023-11-03 01:15:49 INFO [amazon-ssm-agent] [LongRunningWorkerContainer] [WorkerProvider] Worker ssm-agent-worker (pid:1329) started\nNov 03 01:15:50 ip-172-31-86-227.ec2.internal amazon-ssm-agent[951]: 2023-11-03 01:15:49 INFO [amazon-ssm-agent] [LongRunningWorkerContainer] Monitor long running worker health every 60 seconds\nNov 03 01:21:42 ip-172-31-86-227.ec2.internal sudo[1553]: ec2-user : TTY=pts/0 ; PWD=/home/ec2-user ; USER=root ; COMMAND=/bin/su -ls -l /var/log/amazon/ssm/\nNov 03 01:21:48 ip-172-31-86-227.ec2.internal sudo[1567]: ec2-user : TTY=pts/0 ; PWD=/home/ec2-user ; USER=root ; COMMAND=/bin/ls -l /var/log/amazon/ssm/\nNov 03 01:22:00 ip-172-31-86-227.ec2.internal sudo[1574]: ec2-user : TTY=pts/0 ; PWD=/home/ec2-user ; USER=root ; COMMAND=/bin/grep 24f814f5-80aa-429a-ac8b-206b5f249bc3 /var/log/amazon/ssm/amazon-ssm-agent.log\nNov 03 01:45:49 ip-172-31-86-227.ec2.internal amazon-ssm-agent[951]: 2023-11-03 01:45:49 INFO EC2RoleProvider Successfully connected with instance profile role credentials\nNov 03 01:45:50 ip-172-31-86-227.ec2.internal amazon-ssm-agent[951]: 2023-11-03 01:45:49 INFO [CredentialRefresher] Credentials ready\nNov 03 01:45:50 ip-172-31-86-227.ec2.internal amazon-ssm-agent[951]: 2023-11-03 01:45:49 INFO [CredentialRefresher] Next credential rotation will be in 29.999988924266667 minutes\nNov 03 01:46:03 ip-172-31-86-227.ec2.internal sudo[1724]: ec2-user : TTY=pts/0 ; PWD=/home/ec2-user ; USER=root ; COMMAND=/bin/ps --antp\nsystemd(1)-+-NetworkManager(640)-+-{NetworkManager}(641)\n | `-{NetworkManager}(642)\n |-agetty(962)\n |-agetty(965)\n |-amazon-ssm-agen(951)-+-ssm-agent-worke(1329)-+-ssm-document-wo(1884)-+-_script.sh(1890)---pstree(1892)\n | | | |-{ssm-document-wo}(1885)\n | | ||-{ssm-document-wo}(1886)\n | | | |-{ssm-document-wo}(1887)\n | | | |-{ssm-document-wo}(1888)\n | | | |-{ssm-document-wo}(1889)\n | | | `-{ssm-document-wo}(1893)\n | | |-ssm-session-wor(1519)-+-sh(1531,ec2-user)---bash(1532)\n | | | |-{ssm-session-wor}(1520)\n | | | |-{ssm-session-wor}(1521)\n | | | |-{ssm-session-wor}(1522)\n | | | |-{ssm-session-wor}(1523)\n | | | |-{ssm-session-wor}(1524)\n | | | |-{ssm-session-wor}(1525)\n | | | |-{ssm-session-wor}(1526)\n | | | `-{ssm-session-wor}(1551)\n | | |-{ssm-agent-worke}(1332)\n | | |-{ssm-agent-worke}(1333)\n | | |-{ssm-agent-worke}(1334)\n | | |-{ssm-agent-worke}(1335)\n | | |-{ssm-agent-worke}(1337)\n | | |-{ssm-agent-worke}(1338)\n | | |-{ssm-agent-worke}(1339)\n | | |-{ssm-agent-worke}(1340)\n | | |-{ssm-agent-worke}(1456)\n | | |-{ssm-agent-worke}(1459)\n | | |-{ssm-agent-worke}(1460)\n | | |-{ssm-agent-worke}(1478)\n | | |-{ssm-agent-worke}(1480)\n | | `-{ssm-agent-worke}(1481)\n | |-{amazon-ssm-agen}(957)\n | |-{amazon-ssm-agen}(958)\n | |-{amazon-ssm-agen}(959)\n | |-{amazon-ssm-agen}(960)\n | |-{amazon-ssm-agen}(963)\n | |-{amazon-ssm-agen}(964)\n | `-{amazon-ssm-agen}(1328)\n |-auditd(574)---{auditd}(575)\n |-chronyd(616,chrony)\n |-crond(961)\n |-dbus-broker-lau(599,dbus)---dbus-broker(605)\n |-gssproxy(654)-+-{gssproxy}(656)\n | |-{gssproxy}(657)\n | |-{gssproxy}(658)\n | |-{gssproxy}(659)\n | `-{gssproxy}(660)\n |-irqbalance(608)---{irqbalance}(617)\n |-polkitd(902,polkitd)-+-{polkitd}(912)\n | |-{polkitd}(913)\n | |-{polkitd}(915)\n | |-{polkitd}(916)\n | `-{polkitd}(919)\n |-rhsmcertd(652)---{rhsmcertd}(653)\n |-rpcbind(573,rpc)\n |-rsyslogd(609)-+-{rsyslogd}(613)\n | `-{rsyslogd}(614)\n |-sshd(955)\n |-systemd-journal(499)\n |-systemd-logind(610)\n |-systemd-udevd(512)\n `-tuned(651)-+-{tuned}(903)\n |-{tuned}(906)\n `-{tuned}(909)\n",
以下のように確かにDocumentInformation.ProcInfo.Pid
が1884
でした。
{
"DocumentInformation": {
"DocumentID": "a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae",
"CommandID": "a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae",
"AssociationID": "",
"InstanceID": "i-0a2ce926164e897c6",
"MessageID": "aws.ssm.a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae.i-0a2ce926164e897c6",
"RunID": "2023-11-03T01-54-48.572Z",
"CreatedDate": "55808-06-03 17:29:29 +0000 UTC",
"DocumentName": "AWS-RunShellScript",
"DocumentVersion": "",
"DocumentStatus": "InProgress",
"RunCount": 0,
"ProcInfo": {
"Pid": 1884,
"StartTime": "2023-11-03T01:54:48.573653529Z"
},
"ClientId": "",
"RunAsUser": "",
"SessionOwner": ""
},
"DocumentType": "SendCommand",
"SchemaVersion": "1.2",
"InstancePluginsInformation": [
{
"Configuration": {
"Settings": null,
"Properties": [
{
"id": "0.aws:runShellScript",
"runCommand": [
"#!/bin/bash",
"",
"# SSM Agentのステータスの確認",
"systemctl status amazon-ssm-agent.service",
"",
"# プロセスツリーの確認",
"pstree -ulpc"
],
"timeoutSeconds": "3600",
"workingDirectory": ""
}
],
"OutputS3KeyPrefix": "a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae/i-0a2ce926164e897c6/awsrunShellScript",
"OutputS3BucketName": "",
"S3EncryptionEnabled": false,
"CloudWatchLogGroup": "",
"CloudWatchEncryptionEnabled": false,
"CloudWatchStreamingEnabled": false,
"OrchestrationDirectory": "/var/lib/amazon/ssm/i-0a2ce926164e897c6/document/orchestration/a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae/awsrunShellScript",
"MessageId": "aws.ssm.a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae.i-0a2ce926164e897c6",
"BookKeepingFileName": "a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae",
"PluginName": "aws:runShellScript",
"PluginID": "aws:runShellScript",
"DefaultWorkingDirectory": "",
"Preconditions": null,
"IsPreconditionEnabled": false,
"CurrentAssociations": null,
"SessionId": "",
"ClientId": "",
"KmsKeyId": "",
"RunAsEnabled": false,
"RunAsUser": "",
"ShellProfile": {
"windows": "",
"linux": ""
},
"SessionOwner": "",
"UpstreamServiceName": ""
},
"Name": "aws:runShellScript",
"Result": {
"pluginID": "",
"pluginName": "",
"status": "",
"code": 0,
"output": null,
"startDateTime": "0001-01-01T00:00:00Z",
"endDateTime": "0001-01-01T00:00:00Z",
"outputS3BucketName": "",
"outputS3KeyPrefix": "",
"stepName": "",
"error": "",
"standardOutput": "",
"standardError": ""
},
"Id": "aws:runShellScript"
}
],
"CancelInformation": {
"CancelMessageID": "",
"CancelCommandID": "",
"Payload": "",
"DebugInfo": ""
},
"IOConfig": {
"OrchestrationDirectory": "/var/lib/amazon/ssm/i-0a2ce926164e897c6/document/orchestration/a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae",
"OutputS3BucketName": "",
"OutputS3KeyPrefix": "a042e1f0-5fa6-4bf1-bf6c-1c64cf79c2ae/i-0a2ce926164e897c6",
"CloudWatchConfig": {
"LogGroupName": "",
"LogStreamPrefix": "",
"LogGroupEncryptionEnabled": false
}
},
"UpstreamServiceName": "MessageGatewayService"
}
ということで、Run Commandで渡すコマンド上でPPIDを取得して、SSM AgentのログからCommand IDを取得することができそうです。
実際のCommand IDを取得するコマンドは以下のとおりです。
sleep 3
run_command_pid=$(echo "$PPID")
echo PPID : "$run_command_pid"
command_id=$(grep "\"Pid\":$run_command_pid" /var/log/amazon/ssm/amazon-ssm-agent.log \
| awk '{print $5}' \
| tr -d []
)
echo Command ID : "$command_id"
実行すると、以下のような結果が出力されます。
PPID : 1997
Command ID : ba9b8afe-e84f-4eab-985b-67cc11ee3720
ポイントはsleep
です。sleep
なりで待機しなければ、まだログが出力されていないようで上手く動作することができませんでした。以下のようにCommand IDを取得できるまではループする形でも良いと思います。
run_command_pid=$(echo "$PPID")
echo PPID : "$run_command_pid"
while true; do
command_id=$(grep "\"Pid\":$run_command_pid" /var/log/amazon/ssm/amazon-ssm-agent.log \
| awk '{print $5}' \
| tr -d []
)
if [[ -n "$command_id" ]]; then
break
else
sleep 1
fi
done
echo Command ID : "$command_id"
SSM AgentのログファイルからPPIDで検索して抽出
SSM Run CommandのターゲットのEC2インスタンス上でCommand IDを取得してみました。
Run Command実行ごとに一意のファイルを作成したい場合にはファイル名のサフィックスにCommand IDを付与すると一目で、どのRun commandで生成されたファイルなのか分かりやすそうですね。
「Command IDを使ってこねくり回したい」という方はぜひ、試してみてください。
この記事が誰かの助けになれば幸いです。
以上、AWS事業本部 コンサルティング部の のんピ(@non____97)でした!