I was thinking both firewall and ssh/sft server logs. If no SSH log, then check the firewall logs. Actually it will depend on how aws is set up. If they are in a VPC, then they have (or can enable) firewall logs to show connection attempts. We have been in a VPC setup for so long that I forgot that the logging isn't available in a default setup. The likely culprit is that someone fat fingered the security group setup. But the vendor is going to be the only one that can check.
On Mon, 2020-01-27 at 08:32 -0700, Jack Woehr wrote:
On Mon, Jan 27, 2020 at 7:54 AM Kevin Bucknum <
Someone has access to the logs.
Kevin, from the diagnostics Jay provided yesterday, there's not going to be
any log info: his SSH request is never reaching the target server across
the net at all.
No one got his message in a bottle :)
Absolute Performance, Inc.
12303 Airport Way, Suite 100
Broomfield, CO 80021
] Kevin Bucknum
Senior Programmer Analyst
MEDDATA / MEDTRON
120 Innwood Drive
Covington LA 70433
Toll Free: 877-893-2550
This document and any accompanying this email transmission contain confidential information, belonging to the sender that is legally privileged. This information is intended only for the use of the individual or entity named above. The authorized recipient of this information is prohibited from disclosing this information to any other party and is required to destroy the information after its stated need has been fulfilled. If you are not the intended recipient, or the employee of agent responsible to deliver it to the intended recipient, you are hereby notified that any disclosure, copying, distribution or action taken in reliance on the contents of these documents is STRICTLY PROHIBITED. If you have received this email in error, please notify the sender immediately to arrange for return or destruction of these documents.
As an Amazon Associate we earn from qualifying purchases.