(from web dashboard):
Edit the instance
go to the 'ssh keys' section, and add ssh key from local machine '~/.ssh/id_rsa.pub'. usually just copy and paste the contents of the file to the web interface.
The ssh key will have 'user@host' on the end, edit this to just have the username you require, leave off the @host portion.
save (you may need to restart also, but try without first).
This will allow you to ssh. If you need to use the gcloud tool then copy the contents of the 'google_compute_engine.pub' above instead, then you can use the gcloud compute commands.
Key:
instance = the instance with the ssh issue of this post
instance2 = a 2nd instance on the same VPC subnet that ssh works correctly
myusername = the linux userid I have that also is what is on the project metadata and works on all other 40+ instances.
myhost = my local linux workstation machine name
IP's and DNS addresses are modified ficticious replacements also for security
Connected from outside using [ gcloud compute ssh instance ] where I redacted/modified user and IP info from the serial log shown below:Jul 13 14:53:33 instance gcua[374]: Accepted connection. Jul 13 14:53:33 instance gcua[374]: Getting user by name: myusername.
Jul 13 14:53:33 instance gcua[374]: Triggering refresh due to missing user myusername.
Jul 13 14:53:33 instance gcua[374]: Refreshing users and groups.
Jul 13 14:53:33 instance gcua[374]: Fetching users and groups.
Jul 13 14:53:33 instance gcua[374]: Failed refresh: googleapi: got HTTP response code 404 with body: Not Found.
Jul 13 14:53:33 instance gcua[374]: Request failed: unable to find user with name "myusername".
Jul 13 14:53:33 instance gcua[374]: Request completed.
Jul 13 14:53:33 instance sshd[23339]: Invalid user myusername from 87.65.43.21
Jul 13 14:53:33 instance sshd[23339]: input_userauth_request: invalid user myusername [preauth]
Jul 13 14:53:33 instance sshd[23339]: Connection closed by 87.65.43.21 [preauth]
The above gave this feedback on my linux console:
myusername@myhost ~/.ssh $ gcloud compute ssh instance
Permission denied (publickey).
ERROR: (gcloud.compute.ssh) [/usr/bin/ssh] exited with return code [255].
myusername@myhost ~/.ssh $
...
This happens constantly in the serial logs and probably is important to the issue:
Jul 13 15:00:57 instance gcua[374]: Refreshing users and groups.
Jul 13 15:00:57 instance gcua[374]: Fetching users and groups.
Jul 13 15:00:57 instance gcua[374]: Failed refresh: googleapi: got HTTP response code 404 with body: Not Found.
...
When I tried to connect internally from another host we'll call instance2 on the same VPC subnet. I connected to instance2 via [ gcloud compute ssh --ssh-flag="-A" instance2 ] and then from there using just [ ssh instance ]:
Jul 13 15:01:24 instance gcua[374]: Accepted connection.
Jul 13 15:01:24 instance gcua[374]: Getting user by name: myusername.
Jul 13 15:01:24 instance gcua[374]: Triggering refresh due to missing user myusername.
Jul 13 15:01:24 instance gcua[374]: Refreshing users and groups.
Jul 13 15:01:24 instance gcua[374]: Fetching users and groups.
Jul 13 15:01:24 instance gcua[374]: Failed refresh: googleapi: got HTTP response code 404 with body: Not Found.
Jul 13 15:01:24 instance gcua[374]: Request failed: unable to find user with name "myusername".
Jul 13 15:01:24 instance gcua[374]: Request completed.
Jul 13 15:01:24 instance sshd[23360]: Invalid user myusername from 10.20.30.40
Jul 13 15:01:24 instance sshd[23360]: input_userauth_request: invalid user myusername [preauth]
Jul 13 15:01:24 instance sshd[23360]: Connection closed by 10.20.30.40 [preauth]
Jul 13 15:49:09 instance2 sshd[3116]: Accepted publickey for myusername from 87.65.43.21 port 41800 ssh2: RSA 5d:43:a7:0c:d2:34:58:2f:21:a7:2a:6b:9f:c6:c9:4c Jul 13 15:49:16 instance2 sshd[3118]: Received disconnect from 87.65.43.21: 11: disconnected by user
This is a workaround that will help you to fix your issue and you have to follow these steps:
Then inside the instance you need to fetch which is not working by Validate the Guest Environment :
debug2: KEX algorithms: curve25519-sha256,curve25519-sha...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c
debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384...@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v...@openssh.com,ssh-rsa-cert-v...@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa
debug2: ciphers ctos: chacha20...@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes12...@openssh.com,aes256...@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc
debug2: ciphers stoc: chacha20...@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes12...@openssh.com,aes256...@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc
debug2: MACs ctos: umac-...@openssh.com,umac-128...@openssh.com,hmac-sha2-256...@openssh.com,hmac-sha2-512...@openssh.com,hmac-sha1-e...@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-...@openssh.com,umac-128...@openssh.com,hmac-sha2-256...@openssh.com,hmac-sha2-512...@openssh.com,hmac-sha1-e...@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,zl...@openssh.com,zlib
debug2: compression stoc: none,zl...@openssh.com,zlib
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug2: peer server KEXINIT proposal
debug2: KEX algorithms: curve255...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1
debug2: host key algorithms: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ssh-ed25519
debug2: ciphers ctos: aes128-ctr,aes192-ctr,aes256-ctr,aes12...@openssh.com,aes256...@openssh.com,chacha20-poly...@openssh.com
debug2: ciphers stoc: aes128-ctr,aes192-ctr,aes256-ctr,aes12...@openssh.com,aes256...@openssh.com,chacha20-poly...@openssh.com
debug2: MACs ctos: umac-...@openssh.com,umac-128...@openssh.com,hmac-sha2-256...@openssh.com,hmac-sha2-512...@openssh.com,hmac-sha1-e...@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-...@openssh.com,umac-128...@openssh.com,hmac-sha2-256...@openssh.com,hmac-sha2-512...@openssh.com,hmac-sha1-e...@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
DEBUG: Current SSH keys in project: [u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:59+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:57+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:24+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:23+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:33:47+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:33:46+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:33:00+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:59+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:24+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:23+0000"}', u'dev:ssh-rsa REDACTEDKEY dev@templaptop', u'redactedusername:ssh-rsa REDACTEDKEY redactedusername@deverlt01', u'redacteduser2:ssh-rsa REDACTEDKEY redacteduser2@cs-6000-devshell-vm-0c8dfgc65-d401-48yh-b431-163hdbfhdbfk0', u'redactedusername:ssh-rsa REDACTEDKEY redactedusername@bastionhost2', u'root:ssh-rsa REDACTEDKEY root@bastionhost2', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:42+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:40+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:05+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:04+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:33:18+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:33:17+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:43+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:42+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:09+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:08+0000"}', u'formerdevop:ssh-rsa REDACTEDKEY formerdevop@schmuckss-Computer.local', u'redacteduser4:ssh-rsa REDACTEDKEY redacteduser4@redacteduser4-this-MBP-computer.local', u'redacteduser3:ssh-rsa REDACTEDKEYREDACTEDKEY redacteduser3@Dudes-Computer.local', u'redacteduser3:ssh-rsa REDACTEDKEY redacteduser3@Dudes-Computer.local', u'workinguseracct:ssh-rsa REDACTEDKEYTHATWORKS workinguseracct@workinguseracctdev', u'dev:ssh-rsa REDACTEDKEY d...@schmuckss-iMac.local', u'gke-g93w8tvgn384rg8v734h:ssh-rsa REDACTEDKEY gke-789nhth34980v3488n34@gke-g93w8tvgn384rg8v734h', u'root:ssh-rsa REDACTEDKEY formerdevop@schmuckss-Computer.local', u'gke-hw8y4v5thow8n43htv87:ssh-rsa REDACTEDKEY, u'schmuck_2_whomayhavebrokethis_b4_me:ssh-rsa REDACTEDKEY formerdevop@schmuckss-Computer.local', u'mongodb:ssh-rsa REDACTEDKEY formerdevop@schmuckss-Computer.local', u'workinguseracct:ssh-rsa REDACTEDKEYTHATWORKS workinguseracct@workinguseracctdev', u'workinguseracct:ssh-rsa REDACTEDKEYTHATWORKS workinguseracct@workinguseracctdev', u'formerdevop:ssh-rsa REDACTEDKEY formerdevop@schmuckss-Computer.local', u'root:ssh-rsa REDACTEDKEY root@bastionhost', u'coworkeralsobroken:ssh-rsa REDACTEDKEY redacteduser4@usersmachine', u'dudewhosucked:ssh-rsa REDACTEDKEY schmuck@brokethisb4me', u'root:ssh-rsa REDACTEDKEY redacteduser4@redacteduser4-this-MBP-computer.local', u'coworkeralsobroken:ssh-rsa REDACTEDKEY redacteduser4@usersmachine']
debug2: KEX algorithms: curve25519-sha256,curve25519-sha...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c
debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384...@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v...@openssh.com,ssh-rsa-cert-v...@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa
debug2: ciphers ctos: chacha20...@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes12...@openssh.com,aes256...@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc
debug2: ciphers stoc: chacha20...@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes12...@openssh.com,aes256...@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc
debug2: MACs ctos: umac-...@openssh.com,umac-128...@openssh.com,hmac-sha2-256...@openssh.com,hmac-sha2-512...@openssh.com,hmac-sha1-e...@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-...@openssh.com,umac-128...@openssh.com,hmac-sha2-256...@openssh.com,hmac-sha2-512...@openssh.com,hmac-sha1-e...@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,zl...@openssh.com,zlib
debug2: compression stoc: none,zl...@openssh.com,zlib
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug2: peer server KEXINIT proposal
debug2: KEX algorithms: curve255...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1
debug2: host key algorithms: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ssh-ed25519
debug2: ciphers ctos: aes128-ctr,aes192-ctr,aes256-ctr,aes12...@openssh.com,aes256...@openssh.com,chacha20-poly...@openssh.com
debug2: ciphers stoc: aes128-ctr,aes192-ctr,aes256-ctr,aes12...@openssh.com,aes256...@openssh.com,chacha20-poly...@openssh.com
debug2: MACs ctos: umac-...@openssh.com,umac-128...@openssh.com,hmac-sha2-256...@openssh.com,hmac-sha2-512...@openssh.com,hmac-sha1-e...@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-...@openssh.com,umac-128...@openssh.com,hmac-sha2-256...@openssh.com,hmac-sha2-512...@openssh.com,hmac-sha1-e...@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
DEBUG: Current SSH keys in project: [u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:59+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:57+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:24+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:23+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:33:47+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:33:46+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:33:00+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:59+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:24+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:23+0000"}', u'dev:ssh-rsa REDACTEDKEY dev@templaptop', u'redactedusername:ssh-rsa REDACTEDKEY redactedusername@deverlt01', u'redacteduser2:ssh-rsa REDACTEDKEY redacteduser2@cs-6000-devshell-vm-0c8dfgc65-d401-48yh-b431-163hdbfhdbfk0', u'redactedusername:ssh-rsa REDACTEDKEY redactedusername@bastionhost2', u'root:ssh-rsa REDACTEDKEY root@bastionhost2', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:42+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:40+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:05+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:04+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:33:18+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:33:17+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:43+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:42+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:09+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:08+0000"}', u'formerdevop:ssh-rsa REDACTEDKEY formerdevop@schmuckss-Computer.local', u'redacteduser4:ssh-rsa REDACTEDKEY redacteduser4@redacteduser4-this-MBP-computer.local', u'redacteduser3:ssh-rsa REDACTEDKEYREDACTEDKEY redacteduser3@Dudes-Computer.local', u'redacteduser3:ssh-rsa REDACTEDKEY redacteduser3@Dudes-Computer.local', u'workinguseracct:ssh-rsa REDACTEDKEYTHATWORKS workinguseracct@workinguseracctdev', u'dev:ssh-rsa REDACTEDKEY d...@schmuckss-iMac.local', u'gke-g93w8tvgn384rg8v734h:ssh-rsa REDACTEDKEY gke-789nhth34980v3488n34@gke-g93w8tvgn384rg8v734h', u'root:ssh-rsa REDACTEDKEY formerdevop@schmuckss-Computer.local', u'gke-hw8y4v5thow8n43htv87:ssh-rsa REDACTEDKEY, u'schmuck_2_whomayhavebrokethis_b4_me:ssh-rsa REDACTEDKEY formerdevop@schmuckss-Computer.local', u'mongodb:ssh-rsa REDACTEDKEY formerdevop@schmuckss-Computer.local', u'workinguseracct:ssh-rsa REDACTEDKEYTHATWORKS workinguseracct@workinguseracctdev', u'workinguseracct:ssh-rsa REDACTEDKEYTHATWORKS workinguseracct@workinguseracctdev', u'formerdevop:ssh-rsa REDACTEDKEY formerdevop@schmuckss-Computer.local', u'root:ssh-rsa REDACTEDKEY root@bastionhost', u'coworkeralsobroken:ssh-rsa REDACTEDKEY redacteduser4@usersmachine', u'dudewhosucked:ssh-rsa REDACTEDKEY schmuck@brokethisb4me', u'root:ssh-rsa REDACTEDKEY redacteduser4@redacteduser4-this-MBP-computer.local', u'coworkeralsobroken:ssh-rsa REDACTEDKEY redacteduser4@usersmachine']
debug2: KEX algorithms: curve25519-sha256,curve25519-sha...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c
debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384...@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v...@openssh.com,ssh-rsa-cert-v...@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa
debug2: ciphers ctos: chacha20...@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes12...@openssh.com,aes256...@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc
debug2: ciphers stoc: chacha20...@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes12...@openssh.com,aes256...@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc
debug2: MACs ctos: umac-...@openssh.com,umac-128...@openssh.com,hmac-sha2-256...@openssh.com,hmac-sha2-512...@openssh.com,hmac-sha1-e...@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-...@openssh.com,umac-128...@openssh.com,hmac-sha2-256...@openssh.com,hmac-sha2-512...@openssh.com,hmac-sha1-e...@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,zl...@openssh.com,zlib
debug2: compression stoc: none,zl...@openssh.com,zlib
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug2: peer server KEXINIT proposal
debug2: KEX algorithms: curve255...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1
debug2: host key algorithms: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ssh-ed25519
debug2: ciphers ctos: aes128-ctr,aes192-ctr,aes256-ctr,aes12...@openssh.com,aes256...@openssh.com,chacha20-poly...@openssh.com
debug2: ciphers stoc: aes128-ctr,aes192-ctr,aes256-ctr,aes12...@openssh.com,aes256...@openssh.com,chacha20-poly...@openssh.com
debug2: MACs ctos: umac-...@openssh.com,umac-128...@openssh.com,hmac-sha2-256...@openssh.com,hmac-sha2-512...@openssh.com,hmac-sha1-e...@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-...@openssh.com,umac-128...@openssh.com,hmac-sha2-256...@openssh.com,hmac-sha2-512...@openssh.com,hmac-sha1-e...@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
DEBUG: Current SSH keys in project: [u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:59+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:57+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:24+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:23+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:33:47+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:33:46+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:33:00+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:59+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:24+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:23+0000"}', u'dev:ssh-rsa REDACTEDKEY dev@templaptop', u'redactedusername:ssh-rsa REDACTEDKEY redactedusername@deverlt01', u'redacteduser2:ssh-rsa REDACTEDKEY redacteduser2@cs-6000-devshell-vm-0c8dfgc65-d401-48yh-b431-163hdbfhdbfk0', u'redactedusername:ssh-rsa REDACTEDKEY redactedusername@bastionhost2', u'root:ssh-rsa REDACTEDKEY root@bastionhost2', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:42+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:40+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:05+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:04+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:33:18+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:33:17+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:43+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:42+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:09+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:08+0000"}', u'formerdevop:ssh-rsa REDACTEDKEY formerdevop@schmuckss-Computer.local', u'redacteduser4:ssh-rsa REDACTEDKEY redacteduser4@redacteduser4-this-MBP-computer.local', u'redacteduser3:ssh-rsa REDACTEDKEYREDACTEDKEY redacteduser3@Dudes-Computer.local', u'redacteduser3:ssh-rsa REDACTEDKEY redacteduser3@Dudes-Computer.local', u'workinguseracct:ssh-rsa REDACTEDKEYTHATWORKS workinguseracct@workinguseracctdev', u'dev:ssh-rsa REDACTEDKEY d...@schmuckss-iMac.local', u'gke-g93w8tvgn384rg8v734h:ssh-rsa REDACTEDKEY gke-789nhth34980v3488n34@gke-g93w8tvgn384rg8v734h', u'root:ssh-rsa REDACTEDKEY formerdevop@schmuckss-Computer.local', u'gke-hw8y4v5thow8n43htv87:ssh-rsa REDACTEDKEY, u'schmuck_2_whomayhavebrokethis_b4_me:ssh-rsa REDACTEDKEY formerdevop@schmuckss-Computer.local', u'mongodb:ssh-rsa REDACTEDKEY formerdevop@schmuckss-Computer.local', u'workinguseracct:ssh-rsa REDACTEDKEYTHATWORKS workinguseracct@workinguseracctdev', u'workinguseracct:ssh-rsa REDACTEDKEYTHATWORKS workinguseracct@workinguseracctdev', u'formerdevop:ssh-rsa REDACTEDKEY formerdevop@schmuckss-Computer.local', u'root:ssh-rsa REDACTEDKEY root@bastionhost', u'coworkeralsobroken:ssh-rsa REDACTEDKEY redacteduser4@usersmachine', u'dudewhosucked:ssh-rsa REDACTEDKEY schmuck@brokethisb4me', u'root:ssh-rsa REDACTEDKEY redacteduser4@redacteduser4-this-MBP-computer.local', u'coworkeralsobroken:ssh-rsa REDACTEDKEY redacteduser4@usersmachine']
In order to interact with instance's serial console to troubleshoot a VM, you will need to have root or a sudoer privilege. You can add the following startup script to your VM and then reboot it to create a sudoer account:
useradd -G sudo USERNAME
echo 'USERNAME:PASSWORD' | chpasswd
Replace USERNAME
and PASSWORD
with values that you wish.
debug2: KEX algorithms: curve25519-sha256,curve25519-sha...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c
debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384...@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v...@openssh.com,ssh-rsa-cert-v...@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa
debug2: ciphers ctos: chacha20...@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes12...@openssh.com,aes256...@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc
debug2: ciphers stoc: chacha20...@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes12...@openssh.com,aes256...@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc
debug2: MACs ctos: umac-...@openssh.com,umac-128...@openssh.com,hmac-sha2-256...@openssh.com,hmac-sha2-512...@openssh.com,hmac-sha1-e...@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-...@openssh.com,umac-128...@openssh.com,hmac-sha2-256...@openssh.com,hmac-sha2-512...@openssh.com,hmac-sha1-e...@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,zl...@openssh.com,zlib
debug2: compression stoc: none,zl...@openssh.com,zlib
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug2: peer server KEXINIT proposal
debug2: KEX algorithms: curve255...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1
debug2: host key algorithms: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ssh-ed25519
debug2: ciphers ctos: aes128-ctr,aes192-ctr,aes256-ctr,aes12...@openssh.com,aes256...@openssh.com,chacha20-poly...@openssh.com
debug2: ciphers stoc: aes128-ctr,aes192-ctr,aes256-ctr,aes12...@openssh.com,aes256...@openssh.com,chacha20-poly...@openssh.com
debug2: MACs ctos: umac-...@openssh.com,umac-128...@openssh.com,hmac-sha2-256...@openssh.com,hmac-sha2-512...@openssh.com,hmac-sha1-e...@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-...@openssh.com,umac-128...@openssh.com,hmac-sha2-256...@openssh.com,hmac-sha2-512...@openssh.com,hmac-sha1-e...@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
DEBUG: Current SSH keys in project: [u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:59+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:57+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:24+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:23+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:33:47+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:33:46+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:33:00+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:59+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:24+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:23+0000"}', u'dev:ssh-rsa REDACTEDKEY dev@templaptop', u'redactedusername:ssh-rsa REDACTEDKEY redactedusername@deverlt01', u'redacteduser2:ssh-rsa REDACTEDKEY redacteduser2@cs-6000-devshell-vm-0c8dfgc65-d401-48yh-b431-163hdbfhdbfk0', u'redactedusername:ssh-rsa REDACTEDKEY redactedusername@bastionhost2', u'root:ssh-rsa REDACTEDKEY root@bastionhost2', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:42+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:40+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:05+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:04+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:33:18+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:33:17+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:43+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:42+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:09+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:08+0000"}', u'formerdevop:ssh-rsa REDACTEDKEY formerdevop@schmuckss-Computer.local', u'redacteduser4:ssh-rsa REDACTEDKEY redacteduser4@redacteduser4-this-MBP-computer.local', u'redacteduser3:ssh-rsa REDACTEDKEYREDACTEDKEY redacteduser3@Dudes-Computer.local', u'redacteduser3:ssh-rsa REDACTEDKEY redacteduser3@Dudes-Computer.local', u'workinguseracct:ssh-rsa REDACTEDKEYTHATWORKS workinguseracct@workinguseracctdev', u'dev:ssh-rsa REDACTEDKEY d...@schmuckss-iMac.local', u'gke-g93w8tvgn384rg8v734h:ssh-rsa REDACTEDKEY gke-789nhth34980v3488n34@gke-g93w8tvgn384rg8v734h', u'root:ssh-rsa REDACTEDKEY formerdevop@schmuckss-Computer.local', u'gke-hw8y4v5thow8n43htv87:ssh-rsa REDACTEDKEY, u'schmuck_2_whomayhavebrokethis_b4_me:ssh-rsa REDACTEDKEY formerdevop@schmuckss-Computer.local', u'mongodb:ssh-rsa REDACTEDKEY formerdevop@schmuckss-Computer.local', u'workinguseracct:ssh-rsa REDACTEDKEYTHATWORKS workinguseracct@workinguseracctdev', u'workinguseracct:ssh-rsa REDACTEDKEYTHATWORKS workinguseracct@workinguseracctdev', u'formerdevop:ssh-rsa REDACTEDKEY formerdevop@schmuckss-Computer.local', u'root:ssh-rsa REDACTEDKEY root@bastionhost', u'coworkeralsobroken:ssh-rsa REDACTEDKEY redacteduser4@usersmachine', u'dudewhosucked:ssh-rsa REDACTEDKEY schmuck@brokethisb4me', u'root:ssh-rsa REDACTEDKEY redacteduser4@redacteduser4-this-MBP-computer.local', u'coworkeralsobroken:ssh-rsa REDACTEDKEY redacteduser4@usersmachine']
debug2: KEX algorithms: curve25519-sha256,curve25519-sha...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c
debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384...@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v...@openssh.com,ssh-rsa-cert-v...@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa
debug2: ciphers ctos: chacha20...@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes12...@openssh.com,aes256...@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc
debug2: ciphers stoc: chacha20...@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes12...@openssh.com,aes256...@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc
debug2: MACs ctos: umac-...@openssh.com,umac-128...@openssh.com,hmac-sha2-256...@openssh.com,hmac-sha2-512...@openssh.com,hmac-sha1-e...@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-...@openssh.com,umac-128...@openssh.com,hmac-sha2-256...@openssh.com,hmac-sha2-512...@openssh.com,hmac-sha1-e...@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,zl...@openssh.com,zlib
debug2: compression stoc: none,zl...@openssh.com,zlib
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug2: peer server KEXINIT proposal
debug2: KEX algorithms: curve255...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1
debug2: host key algorithms: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ssh-ed25519
debug2: ciphers ctos: aes128-ctr,aes192-ctr,aes256-ctr,aes12...@openssh.com,aes256...@openssh.com,chacha20-poly...@openssh.com
debug2: ciphers stoc: aes128-ctr,aes192-ctr,aes256-ctr,aes12...@openssh.com,aes256...@openssh.com,chacha20-poly...@openssh.com
debug2: MACs ctos: umac-...@openssh.com,umac-128...@openssh.com,hmac-sha2-256...@openssh.com,hmac-sha2-512...@openssh.com,hmac-sha1-e...@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-...@openssh.com,umac-128...@openssh.com,hmac-sha2-256...@openssh.com,hmac-sha2-512...@openssh.com,hmac-sha1-e...@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
DEBUG: Current SSH keys in project: [u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:59+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:57+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:24+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:23+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:33:47+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:33:46+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:33:00+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:59+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:24+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:23+0000"}', u'dev:ssh-rsa REDACTEDKEY dev@templaptop', u'redactedusername:ssh-rsa REDACTEDKEY redactedusername@deverlt01', u'redacteduser2:ssh-rsa REDACTEDKEY redacteduser2@cs-6000-devshell-vm-0c8dfgc65-d401-48yh-b431-163hdbfhdbfk0', u'redactedusername:ssh-rsa REDACTEDKEY redactedusername@bastionhost2', u'root:ssh-rsa REDACTEDKEY root@bastionhost2', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:42+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:40+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:05+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:04+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:33:18+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:33:17+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:43+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:42+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:09+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:08+0000"}', u'formerdevop:ssh-rsa REDACTEDKEY formerdevop@schmuckss-Computer.local', u'redacteduser4:ssh-rsa REDACTEDKEY redacteduser4@redacteduser4-this-MBP-computer.local', u'redacteduser3:ssh-rsa REDACTEDKEYREDACTEDKEY redacteduser3@Dudes-Computer.local', u'redacteduser3:ssh-rsa REDACTEDKEY redacteduser3@Dudes-Computer.local', u'workinguseracct:ssh-rsa REDACTEDKEYTHATWORKS workinguseracct@workinguseracctdev', u'dev:ssh-rsa REDACTEDKEY d...@schmuckss-iMac.local', u'gke-g93w8tvgn384rg8v734h:ssh-rsa REDACTEDKEY gke-789nhth34980v3488n34@gke-g93w8tvgn384rg8v734h', u'root:ssh-rsa REDACTEDKEY formerdevop@schmuckss-Computer.local', u'gke-hw8y4v5thow8n43htv87:ssh-rsa REDACTEDKEY, u'schmuck_2_whomayhavebrokethis_b4_me:ssh-rsa REDACTEDKEY formerdevop@schmuckss-Computer.local', u'mongodb:ssh-rsa REDACTEDKEY formerdevop@schmuckss-Computer.local', u'workinguseracct:ssh-rsa REDACTEDKEYTHATWORKS workinguseracct@workinguseracctdev', u'workinguseracct:ssh-rsa REDACTEDKEYTHATWORKS workinguseracct@workinguseracctdev', u'formerdevop:ssh-rsa REDACTEDKEY formerdevop@schmuckss-Computer.local', u'root:ssh-rsa REDACTEDKEY root@bastionhost', u'coworkeralsobroken:ssh-rsa REDACTEDKEY redacteduser4@usersmachine', u'dudewhosucked:ssh-rsa REDACTEDKEY schmuck@brokethisb4me', u'root:ssh-rsa REDACTEDKEY redacteduser4@redacteduser4-this-MBP-computer.local', u'coworkeralsobroken:ssh-rsa REDACTEDKEY redacteduser4@usersmachine']
debug2: KEX algorithms: curve25519-sha256,curve25519-sha...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c
debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384...@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ssh-ed25519-cert-v...@openssh.com,ssh-rsa-cert-v...@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa
debug2: ciphers ctos: chacha20...@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes12...@openssh.com,aes256...@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc
debug2: ciphers stoc: chacha20...@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes12...@openssh.com,aes256...@openssh.com,aes128-cbc,aes192-cbc,aes256-cbc
debug2: MACs ctos: umac-...@openssh.com,umac-128...@openssh.com,hmac-sha2-256...@openssh.com,hmac-sha2-512...@openssh.com,hmac-sha1-e...@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-...@openssh.com,umac-128...@openssh.com,hmac-sha2-256...@openssh.com,hmac-sha2-512...@openssh.com,hmac-sha1-e...@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,zl...@openssh.com,zlib
debug2: compression stoc: none,zl...@openssh.com,zlib
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug2: peer server KEXINIT proposal
debug2: KEX algorithms: curve255...@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1
debug2: host key algorithms: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ssh-ed25519
debug2: ciphers ctos: aes128-ctr,aes192-ctr,aes256-ctr,aes12...@openssh.com,aes256...@openssh.com,chacha20-poly...@openssh.com
debug2: ciphers stoc: aes128-ctr,aes192-ctr,aes256-ctr,aes12...@openssh.com,aes256...@openssh.com,chacha20-poly...@openssh.com
debug2: MACs ctos: umac-...@openssh.com,umac-128...@openssh.com,hmac-sha2-256...@openssh.com,hmac-sha2-512...@openssh.com,hmac-sha1-e...@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc: umac-...@openssh.com,umac-128...@openssh.com,hmac-sha2-256...@openssh.com,hmac-sha2-512...@openssh.com,hmac-sha1-e...@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
DEBUG: Current SSH keys in project: [u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:59+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:57+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:24+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:23+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:33:47+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:33:46+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:33:00+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:59+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:24+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:23+0000"}', u'dev:ssh-rsa REDACTEDKEY dev@templaptop', u'redactedusername:ssh-rsa REDACTEDKEY redactedusername@deverlt01', u'redacteduser2:ssh-rsa REDACTEDKEY redacteduser2@cs-6000-devshell-vm-0c8dfgc65-d401-48yh-b431-163hdbfhdbfk0', u'redactedusername:ssh-rsa REDACTEDKEY redactedusername@bastionhost2', u'root:ssh-rsa REDACTEDKEY root@bastionhost2', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:42+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:40+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:05+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:34:04+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:33:18+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:33:17+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:43+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:42+0000"}', u'redacteduser2:ecdsa-sha2-nistp256 REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:09+0000"}', u'redacteduser2:ssh-rsa REDACTEDKEY= google-ssh {"userName":"redacteduser2@domain.ext","expireOn":"2018-06-20T15:32:08+0000"}', u'formerdevop:ssh-rsa REDACTEDKEY formerdevop@schmuckss-Computer.local', u'redacteduser4:ssh-rsa REDACTEDKEY redacteduser4@redacteduser4-this-MBP-computer.local', u'redacteduser3:ssh-rsa REDACTEDKEYREDACTEDKEY redacteduser3@Dudes-Computer.local', u'redacteduser3:ssh-rsa REDACTEDKEY redacteduser3@Dudes-Computer.local', u'workinguseracct:ssh-rsa REDACTEDKEYTHATWORKS workinguseracct@workinguseracctdev', u'dev:ssh-rsa REDACTEDKEY d...@schmuckss-iMac.local', u'gke-g93w8tvgn384rg8v734h:ssh-rsa REDACTEDKEY gke-789nhth34980v3488n34@gke-g93w8tvgn384rg8v734h', u'root:ssh-rsa REDACTEDKEY formerdevop@schmuckss-Computer.local', u'gke-hw8y4v5thow8n43htv87:ssh-rsa REDACTEDKEY, u'schmuck_2_whomayhavebrokethis_b4_me:ssh-rsa REDACTEDKEY formerdevop@schmuckss-Computer.local', u'mongodb:ssh-rsa REDACTEDKEY formerdevop@schmuckss-Computer.local', u'workinguseracct:ssh-rsa REDACTEDKEYTHATWORKS workinguseracct@workinguseracctdev', u'workinguseracct:ssh-rsa REDACTEDKEYTHATWORKS workinguseracct@workinguseracctdev', u'formerdevop:ssh-rsa REDACTEDKEY formerdevop@schmuckss-Computer.local', u'root:ssh-rsa REDACTEDKEY root@bastionhost', u'coworkeralsobroken:ssh-rsa REDACTEDKEY redacteduser4@usersmachine', u'dudewhosucked:ssh-rsa REDACTEDKEY schmuck@brokethisb4me', u'root:ssh-rsa REDACTEDKEY redacteduser4@redacteduser4-this-MBP-computer.local', u'coworkeralsobroken:ssh-rsa REDACTEDKEY redacteduser4@usersmachine']
useradd -G sudo USERNAME
echo 'USERNAME:PASSWORD' | chpasswd
Hello Danica,
I am assuming you are trying to interact with serial console where a sudo user needs to be created:
Activate the “Connect to serial console” button
> Go to VM instances, click on your VM, Edit, and active “enable connecting to serial ports” in the Remote access area and click on save.
Create a username and password.
> Go to Vm instance, click on your Vm again, Edit, and fill up the custom metadata section with:
In key: startup-script
In value:
#!/bin/bash
sudo useradd -G sudo pamela
sudo echo 'pamela:pamela5' | chpasswd
(This is a script that creates a username : pamela and password: pamela5, which you are going to use later. Please use something else for security purposes)
Note that change will only take effect after a complete restart (stop/restart) of the VM.
At this point, I do not suspect a role issue as we would get permission errors instead. Let me know of your results.