Cod*_*bit 8 ssh amazon-ec2 amazon-web-services boto3
阅读此问题后如何使用 boto3 SSH 并在 EC2 中运行命令?
我尝试使用SSM
在 EC2 实例上自动运行命令。但是,当我写这样的代码时
def excute_command_on_instance(client, command, instance_id):
response = client.send_command(
DocumentName="AWS-RunShellScript", # One of AWS' preconfigured documents
Parameters={'commands': command},
InstanceIds=instance_id,
)
return response
# Using SSM in boto3 to send command to EC2 instances.
ssm_client = boto3.client('ssm')
commands = ['echo "hello world']
instance_id = running_instance[0:1]
excute_command_on_instance(ssm_client, commands, instance_id)
Run Code Online (Sandbox Code Playgroud)
这让我想起
botocore.exceptions.ClientError: An error occurred (AccessDeniedException) when calling the SendCommand operation: User: arn:aws:iam::62771xxxx946:user/Python_CloudComputing is not authorized to perform: ssm:SendCommand on resource: arn:aws:ec2:eu-west-2:6277xxxx3946:instance/i-074f862c3xxxxfc07
.
在我SST
用来生成凭据后client
,我得到了如下代码。
def excute_command_on_instance(client, command, instance_id):
response = client.send_command(
DocumentName="AWS-RunShellScript", # One of AWS' preconfigured documents
Parameters={'commands': command},
InstanceIds=instance_id,
)
return response
# Using SSM in boto3 to send command to EC2 instances.
sts = boto3.client('sts')
sts_response = sts.get_session_token()
ACCESS_KEY = sts_response['Credentials']['AccessKeyId']
SECRET_KEY = sts_response['Credentials']['SecretAccessKey']
ssm_client = boto3.client(
'ssm',
aws_access_key_id=ACCESS_KEY,
aws_secret_access_key=SECRET_KEY,
)
commands = ['echo "hello world']
instance_id = running_instance[0:1]
excute_command_on_instance(ssm_client, commands, instance_id)
Run Code Online (Sandbox Code Playgroud)
然而,这一次让我想起了
botocore.exceptions.ClientError: An error occurred (UnrecognizedClientException) when calling the SendCommand operation: The security token included in the request is invalid.
谁能告诉我如何解决这个问题?
您缺少 IAM 用户或角色访问 SSM 的权限。
您还尝试使用 STS 来获得访问权限,这使您需要做的事情变得过于复杂。STS 需要承担的策略需要相同的权限。使用 STS(最小特权规则)有很多很好的案例,但我认为您不需要 STS。
Amazon 为 SSM 提供了预定义的策略,您可以将其快速添加到策略或角色中,例如:
AmazonEC2RoleForSSM
AmazonSSMFullAccess
AmazonSSMReadOnlyAccess
Run Code Online (Sandbox Code Playgroud)
此链接将帮助您配置对 Systems Manager 的访问:
归档时间: |
|
查看次数: |
29606 次 |
最近记录: |