{"id":17237,"date":"2019-10-04T15:00:05","date_gmt":"2019-10-04T06:00:05","guid":{"rendered":"http:\/\/www.skyarch.net\/blog\/?p=17237"},"modified":"2019-10-04T10:13:11","modified_gmt":"2019-10-04T01:13:11","slug":"ssm%e3%82%bb%e3%83%83%e3%82%b7%e3%83%a7%e3%83%b3%e3%83%9e%e3%83%8d%e3%83%bc%e3%82%b8%e3%83%a3%e3%83%bc%e3%81%ae%e3%83%9d%e3%83%bc%e3%83%88%e3%83%95%e3%82%a9%e3%83%af%e3%83%bc%e3%83%87%e3%82%a3","status":"publish","type":"post","link":"https:\/\/www.skyarch.net\/blog\/ssm%e3%82%bb%e3%83%83%e3%82%b7%e3%83%a7%e3%83%b3%e3%83%9e%e3%83%8d%e3%83%bc%e3%82%b8%e3%83%a3%e3%83%bc%e3%81%ae%e3%83%9d%e3%83%bc%e3%83%88%e3%83%95%e3%82%a9%e3%83%af%e3%83%bc%e3%83%87%e3%82%a3\/","title":{"rendered":"SSM\u30bb\u30c3\u30b7\u30e7\u30f3\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u306e\u30dd\u30fc\u30c8\u30d5\u30a9\u30ef\u30fc\u30c7\u30a3\u30f3\u30b0\u6a5f\u80fd\u3092\u5229\u7528\u3057\u3066\u307f\u305f"},"content":{"rendered":"<p>AWS System Manager\u30bb\u30c3\u30b7\u30e7\u30f3\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u306b\u30dd\u30fc\u30c8\u30d5\u30a9\u30ef\u30fc\u30c7\u30a3\u30f3\u30b0\u6a5f\u80fd\u304c\u8ffd\u52a0\u3055\u308c\u307e\u3057\u305f\u3002<\/p>\n<p><a href=\"https:\/\/aws.amazon.com\/jp\/blogs\/news\/new-port-forwarding-using-aws-system-manager-sessions-manager\/\" target=\"_blank\" rel=\"noopener\">AWS System Manager Sessions Manager \u3092\u4f7f\u7528\u3057\u305f\u65b0\u3057\u3044\u6a5f\u80fd \u2013 Port Forwarding<\/a><\/p>\n<p>\u3053\u306e\u6a5f\u80fd\u3092\u5229\u7528\u3059\u308c\u3070\u3001\u30a4\u30f3\u30d0\u30a6\u30f3\u30c9\u30dd\u30fc\u30c8(SSH\/RDP)\u3092\u8a31\u53ef\u305b\u305a\u306b\u5bfe\u8c61\u30a4\u30f3\u30b9\u30bf\u30f3\u30b9\u3078\u30ed\u30b0\u30a4\u30f3\u3059\u308b\u3053\u3068\u304c\u51fa\u6765\u307e\u3059\u3002<br \/>\n\u5b9f\u969b\u306b\u672c\u6a5f\u80fd\u3092\u5229\u7528\u3057\u3066\u307f\u307e\u3057\u3087\u3046\u3002<br \/>\n\u203b\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u6a5f\u306fWindows\u3092\u60f3\u5b9a\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n<h3>\u30b5\u30fc\u30d0\u30fc\u5074(EC2\u30a4\u30f3\u30b9\u30bf\u30f3\u30b9)\u306e\u6e96\u5099<\/h3>\n<h4>IAM\u30ed\u30fc\u30eb<\/h4>\n<p>\u30ed\u30b0\u30a4\u30f3\u3059\u308bEC2\u30a4\u30f3\u30b9\u30bf\u30f3\u30b9\u306bIAM\u30ed\u30fc\u30eb\u3092\u30a2\u30bf\u30c3\u30c1\u3057\u307e\u3059\u3002<br \/>\nIAM\u30dd\u30ea\u30b7\u30fc\u306f <strong>AmazonSSMManagedInstanceCore<\/strong> (AWS\u7ba1\u7406\u30dd\u30ea\u30b7\u30fc) \u3092\u5229\u7528\u3057\u307e\u3059\u3002<\/p>\n<h4>SSM\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u306e\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb<\/h4>\n<p>\u4ee5\u4e0b\u3092\u53c2\u7167\u304f\u3060\u3055\u3044\u3002Amazon Linux\u7b49\u306b\u306f\u65e2\u5b9a\u3067\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p><a href=\"https:\/\/docs.aws.amazon.com\/ja_jp\/systems-manager\/latest\/userguide\/sysman-manual-agent-install.html\" target=\"_blank\" rel=\"noopener\">Amazon EC2 Linux \u30a4\u30f3\u30b9\u30bf\u30f3\u30b9\u306b SSM \u30a8\u30fc\u30b8\u30a7\u30f3\u30c8 \u3092\u624b\u52d5\u3067\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3059\u308b<\/a><\/p>\n<h4>SSM\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u306e\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8<\/h4>\n<p>\u4ee5\u4e0b\u3092\u53c2\u7167\u304f\u3060\u3055\u3044\u3002<\/p>\n<p><a href=\"https:\/\/docs.aws.amazon.com\/ja_jp\/systems-manager\/latest\/userguide\/rc-console.html#rc-console-agentexample\" target=\"_blank\" rel=\"noopener\">Run Command \u3092\u4f7f\u7528\u3057\u3066 SSM \u30a8\u30fc\u30b8\u30a7\u30f3\u30c8 \u3092\u66f4\u65b0\u3059\u308b<\/a><\/p>\n<p>yum update\u7b49\u3092\u5229\u7528\u3057\u305f\u5834\u5408\u306f\u6700\u65b0\u30d0\u30fc\u30b8\u30e7\u30f3\u306b\u66f4\u65b0\u3055\u308c\u306a\u3044\u5834\u5408\u3082\u3042\u308b\u306e\u3067\u3001Run Command \u3067\u306e\u66f4\u65b0\u3092\u304a\u52e7\u3081\u3057\u307e\u3059\u3002<\/p>\n<h3>\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u5074\u306e\u6e96\u5099<\/h3>\n<h4>AWS CLI\u306e\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb<\/h4>\n<p>\u4ee5\u4e0b\u3092\u53c2\u7167\u304f\u3060\u3055\u3044\u3002\u65e2\u306b\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3055\u308c\u3066\u3044\u308b\u5834\u5408\u3082\u6700\u65b0\u7248\u306e\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3092\u304a\u52e7\u3081\u3057\u307e\u3059\u3002<\/p>\n<p><a href=\"https:\/\/docs.aws.amazon.com\/ja_jp\/cli\/latest\/userguide\/install-windows.html\" target=\"_blank\" rel=\"noopener\">Windows \u306b AWS CLI \u3092\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3059\u308b<\/a><\/p>\n<h4>\u30bb\u30c3\u30b7\u30e7\u30f3\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u30d7\u30e9\u30b0\u30a4\u30f3\u306e\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb<\/h4>\n<p>\u4ee5\u4e0b\u3092\u53c2\u7167\u304f\u3060\u3055\u3044\u3002\u65e2\u306b\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3055\u308c\u3066\u3044\u308b\u5834\u5408\u3082\u6700\u65b0\u7248\u306e\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3092\u304a\u52e7\u3081\u3057\u307e\u3059\u3002<\/p>\n<p><a href=\"https:\/\/docs.aws.amazon.com\/ja_jp\/systems-manager\/latest\/userguide\/session-manager-working-with-install-plugin.html#install-plugin-windows\" target=\"_blank\" rel=\"noopener\">Windows \u306b Session Manager Plugin \u3092\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3059\u308b<\/a><\/p>\n<h3>\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u3067\u5229\u7528\u3059\u308b\u30a2\u30af\u30bb\u30b9\u30ad\u30fc\u306e\u6e96\u5099<\/h3>\n<p>\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u306b\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3057\u305fAWS CLI\u3092\u5229\u7528\u3059\u308b\u70ba\u306b\u3001IAM\u306e\u30a2\u30af\u30bb\u30b9\u30ad\u30fc\u3092\u6e96\u5099\u3057\u307e\u3059\u3002<br \/>\nCloudFormation\u306e\u30c6\u30f3\u30d7\u30ec\u30fc\u30c8\u3092\u7528\u610f\u3057\u305f\u306e\u3067\u3054\u5229\u7528\u304f\u3060\u3055\u3044\u3002<\/p>\n<pre>AWSTemplateFormatVersion: \"2010-09-09\"\nDescription: \n  Sample CloudFormation Template for Use of SSM Session Manager.\n\nMetadata: \n  \"AWS::CloudFormation::Interface\": \n    ParameterGroups: \n      - Label: \n          default: \"EC2 Instance\"\n        Parameters: \n          - EC2InstanceId\n      - Label: \n          default: \"IAM Group\"\n        Parameters: \n          - NameOfIamGroup\n          - NameOfIamPolicyForSsmSession\n          - NameOfIamPolicyForRotatingAccessKey\n      - Label: \n          default: \"IAM User 01\"\n        Parameters: \n          - NameOfIamUser01\n      - Label: \n          default: \"IAM User 02\"\n        Parameters: \n          - CreateIamUser02\n          - NameOfIamUser02\n      - Label: \n          default: \"IAM User 03\"\n        Parameters: \n          - CreateIamUser03\n          - NameOfIamUser03\n      - Label: \n          default: \"IAM User 04\"\n        Parameters: \n          - CreateIamUser04\n          - NameOfIamUser04\n      - Label: \n          default: \"IAM User 05\"\n        Parameters: \n          - CreateIamUser05\n          - NameOfIamUser05\n\n    ParameterLabels: \n      EC2InstanceId: \n        default: \"EC2 Instance ID\"\n      NameOfIamGroup: \n        default: \"Name of IAM Group\"\n      NameOfIamPolicyForSsmSession: \n        default: \"Name of IAM Policy For Executiong SSM Session Manager\"\n      NameOfIamPolicyForRotatingAccessKey: \n        default: \"Name of IAM Policy For Rotating Access Key\"\n      NameOfIamUser01: \n        default: \"User Name\"\n      CreateIamUser02: \n        default: \"User Create\"\n      NameOfIamUser02: \n        default: \"User Name\"\n      CreateIamUser03: \n        default: \"User Create\"\n      NameOfIamUser03: \n        default: \"User Name\"\n      CreateIamUser04: \n        default: \"User Create\"\n      NameOfIamUser04: \n        default: \"User Name\"\n      CreateIamUser05: \n        default: \"User Create\"\n      NameOfIamUser05: \n        default: \"User Name\"\n\n# ------------------------------------------------------------#\n# Input Parameters\n# ------------------------------------------------------------# \nParameters:\n  EC2InstanceId:\n    Type: AWS::EC2::Instance::Id\n\n  NameOfIamGroup:\n    Type: String\n    Default: \"SSM-Session-Manager_Executors\"\n\n  NameOfIamPolicyForSsmSession:\n    Type: String\n    Default: \"Execute_SSM-Session-Manager_to_Specific-Instance\"\n\n  NameOfIamPolicyForRotatingAccessKey:\n    Type: String\n    Default: \"Rotate_Self-AccessKey\"\n\n  NameOfIamUser01:\n    Type: String\n    Default: \"IAM-User01\"\n\n  CreateIamUser02:\n    Type: String\n    Default: false\n    AllowedValues:\n      - true\n      - false\n\n  NameOfIamUser02:\n    Type: String\n    Default: \"IAM-User02\"\n\n  CreateIamUser03:\n    Type: String\n    Default: false\n    AllowedValues:\n      - true\n      - false\n\n  NameOfIamUser03:\n    Type: String\n    Default: \"IAM-User03\"\n\n  CreateIamUser04:\n    Type: String\n    Default: false\n    AllowedValues:\n      - true\n      - false\n\n  NameOfIamUser04:\n    Type: String\n    Default: \"IAM-User04\"\n\n  CreateIamUser05:\n    Type: String\n    Default: false\n    AllowedValues:\n      - true\n      - false\n\n  NameOfIamUser05:\n    Type: String\n    Default: \"IAM-User05\"\n\n# ------------------------------------------------------------#\n#  Conditions\n# ------------------------------------------------------------#\nConditions:\n# Create or Not: IAM Users\n  CreateIamUser02True: !Equals [ !Ref CreateIamUser02, true ]\n  CreateIamUser03True: !Equals [ !Ref CreateIamUser03, true ]\n  CreateIamUser04True: !Equals [ !Ref CreateIamUser04, true ]\n  CreateIamUser05True: !Equals [ !Ref CreateIamUser05, true ]\n\nResources: \n# ------------------------------------------------------------#\n# IAM Group\n# ------------------------------------------------------------#\n# IAM Group\n  IamGroup: \n    Type: AWS::IAM::Group\n    Properties:\n      GroupName: !Ref NameOfIamGroup\n\n# IAM Policy For Executing SSM Session Manager\n  IamPolicyForSsmSession:\n    Type: AWS::IAM::Policy\n    Properties:\n      PolicyName: !Ref NameOfIamPolicyForSsmSession\n      PolicyDocument:\n        Version: '2012-10-17'\n        Statement:\n        - Effect: Allow\n          Action:\n          - ssm:StartSession\n          Resource: \n              - !Sub \"arn:aws:ec2:${AWS::Region}:${AWS::AccountId}:instance\/${EC2InstanceId}\"\n              - !Sub \"arn:aws:ssm:${AWS::Region}::document\/AWS-StartPortForwardingSession\"\n        - Effect: Allow\n          Action:\n          - ssm:TerminateSession\n          Resource: arn:aws:ssm:*:*:session\/${aws:username}-*\n      Groups:\n      - !Ref IamGroup\n\n# IAM Policy For Rotating Access Key\n  IamPolicyForRotatingAccessKey:\n    Type: AWS::IAM::Policy\n    Properties:\n      PolicyName: !Ref NameOfIamPolicyForRotatingAccessKey\n      PolicyDocument:\n        Version: '2012-10-17'\n        Statement:\n        - Effect: Allow\n          Action:\n          - iam:CreateAccessKey\n          - iam:DeleteAccessKey\n          Resource: !Join\n            - ''\n            - - !Sub \"arn:aws:iam::${AWS::AccountId}:user\/\"\n              - ${aws:username}\n      Groups:\n      - !Ref IamGroup\n\n# ------------------------------------------------------------#\n# IAM Users\n# ------------------------------------------------------------#\n# IAM User 01\n  IamUser01: \n    Type: AWS::IAM::User\n    Properties: \n      UserName: !Ref NameOfIamUser01\n      Groups:\n        - !Ref IamGroup\n\n# Access Key 01\n  AccessKey01: \n    Type: AWS::IAM::AccessKey\n    Properties: \n      Status: Active\n      UserName: !Ref IamUser01\n\n# IAM User 02\n  IamUser02: \n    Type: AWS::IAM::User\n    Condition: CreateIamUser02True\n    Properties: \n      UserName: !Ref NameOfIamUser02\n      Groups:\n        - !Ref IamGroup\n\n# Access Key 02\n  AccessKey02: \n    Type: AWS::IAM::AccessKey\n    Condition: CreateIamUser02True\n    Properties: \n      Status: Active\n      UserName: !Ref IamUser02\n\n# IAM User 03\n  IamUser03: \n    Type: AWS::IAM::User\n    Condition: CreateIamUser03True\n    Properties: \n      UserName: !Ref NameOfIamUser03\n      Groups:\n        - !Ref IamGroup\n\n# Access Key 03\n  AccessKey03: \n    Type: AWS::IAM::AccessKey\n    Condition: CreateIamUser03True\n    Properties: \n      Status: Active\n      UserName: !Ref IamUser03\n\n# IAM User 04\n  IamUser04: \n    Type: AWS::IAM::User\n    Condition: CreateIamUser04True\n    Properties: \n      UserName: !Ref NameOfIamUser04\n      Groups:\n        - !Ref IamGroup\n\n# Access Key 04\n  AccessKey04: \n    Type: AWS::IAM::AccessKey\n    Condition: CreateIamUser04True\n    Properties: \n      Status: Active\n      UserName: !Ref IamUser04\n\n# IAM User 05\n  IamUser05: \n    Type: AWS::IAM::User\n    Condition: CreateIamUser05True\n    Properties: \n      UserName: !Ref NameOfIamUser05\n      Groups:\n        - !Ref IamGroup\n\n# Access Key 05\n  AccessKey05: \n    Type: AWS::IAM::AccessKey\n    Condition: CreateIamUser05True\n    Properties: \n      Status: Active\n      UserName: !Ref IamUser05\n\n# ------------------------------------------------------------#\n# OUTPUTS\n# ------------------------------------------------------------#\nOutputs:\n  01AccessKey:\n    Description: Access Key of IAM User 01\n    Value: !Ref AccessKey01\n\n  01SecretAccessKey:\n    Description: Secret Access Key of IAM User 01\n    Value: !GetAtt AccessKey01.SecretAccessKey\n\n  02AccessKey:\n    Description: Access Key of IAM User 02\n    Value: !Ref AccessKey02\n    Condition: CreateIamUser02True\n\n  02SecretAccessKey:\n    Description: Secret Access Key of IAM User 02\n    Value: !GetAtt AccessKey02.SecretAccessKey\n    Condition: CreateIamUser02True\n\n  03AccessKey:\n    Description: Access Key of IAM User 03\n    Value: !Ref AccessKey03\n    Condition: CreateIamUser03True\n\n  03SecretAccessKey:\n    Description: Secret Access Key of IAM User 03\n    Value: !GetAtt AccessKey03.SecretAccessKey\n    Condition: CreateIamUser03True\n\n  04AccessKey:\n    Description: Access Key of IAM User 04\n    Value: !Ref AccessKey04\n    Condition: CreateIamUser04True\n\n  04SecretAccessKey:\n    Description: Secret Access Key of IAM User 04\n    Value: !GetAtt AccessKey04.SecretAccessKey\n    Condition: CreateIamUser04True\n\n  05AccessKey:\n    Description: Access Key of IAM User 05\n    Value: !Ref AccessKey05\n    Condition: CreateIamUser05True\n\n  05SecretAccessKey:\n    Description: Secret Access Key of IAM User 05\n    Value: !GetAtt AccessKey05.SecretAccessKey\n    Condition: CreateIamUser05True\n<\/pre>\n<p>CloudFormation\u306e\u51fa\u529b\u306b\u8868\u793a\u3055\u308c\u305f\u30a2\u30af\u30bb\u30b9\u30ad\u30fc\u3068\u30b7\u30fc\u30af\u30ec\u30c3\u30c8\u30a2\u30af\u30bb\u30b9\u30ad\u30fc\u3092\u63a7\u3048\u3066\u304a\u3044\u3066\u304f\u3060\u3055\u3044\u3002<\/p>\n<a href=\"https:\/\/www.skyarch.net\/blog\/wp-content\/uploads\/2019\/10\/2019-10-02_17h52_36.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-17245\" src=\"https:\/\/www.skyarch.net\/blog\/wp-content\/uploads\/2019\/10\/2019-10-02_17h52_36-1024x324.png\" alt=\"\" width=\"728\" height=\"230\" srcset=\"https:\/\/www.skyarch.net\/blog\/wp-content\/uploads\/2019\/10\/2019-10-02_17h52_36-1024x324.png 1024w, https:\/\/www.skyarch.net\/blog\/wp-content\/uploads\/2019\/10\/2019-10-02_17h52_36-300x95.png 300w, https:\/\/www.skyarch.net\/blog\/wp-content\/uploads\/2019\/10\/2019-10-02_17h52_36-768x243.png 768w, https:\/\/www.skyarch.net\/blog\/wp-content\/uploads\/2019\/10\/2019-10-02_17h52_36-728x230.png 728w, https:\/\/www.skyarch.net\/blog\/wp-content\/uploads\/2019\/10\/2019-10-02_17h52_36.png 1239w\" sizes=\"auto, (max-width: 728px) 100vw, 728px\" \/><\/a>\n<h3>\u30dd\u30fc\u30c8\u30d5\u30a9\u30ef\u30fc\u30c7\u30a3\u30f3\u30b0\u6a5f\u80fd\u3092\u5229\u7528\u3057\u3066\u30ed\u30b0\u30a4\u30f3\u3057\u3066\u307f\u308b<\/h3>\n<p>\u30b3\u30de\u30f3\u30c9\u30d7\u30ed\u30f3\u30d7\u30c8\u3067\u3001AWS CLI\u7528\u306e\u30a2\u30af\u30bb\u30b9\u30ad\u30fc\u3092\u8a2d\u5b9a\u3057\u307e\u3059\u3002<\/p>\n<pre>C:\\&gt;set AWS_ACCESS_KEY_ID=AKIAxxxxxxxxxxxxxxxx\n\nC:\\&gt;set AWS_SECRET_ACCESS_KEY=+Xd0xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx\n<\/pre>\n<p>\u5fc5\u8981\u306b\u5fdc\u3058\u3066\u30c7\u30d5\u30a9\u30eb\u30c8\u30ea\u30fc\u30b8\u30e7\u30f3\u3068\u51fa\u529b\u5f62\u5f0f\u3082\u8a2d\u5b9a\u3057\u307e\u3059\u3002<\/p>\n<pre>C:\\&gt;set AWS_DEFAULT_REGION=ap-northeast-1\n\nC:\\&gt;set AWS_DEFAULT_OUTPUT=table\n<\/pre>\n<p>\u30a4\u30f3\u30b9\u30bf\u30f3\u30b9ID\u3068\u30dd\u30fc\u30c8\u756a\u53f7(\u4eca\u56de\u306fEC2\u30a4\u30f3\u30b9\u30bf\u30f3\u30b9\u304cLinux\u306a\u306e\u3067SSH=22)\u3092\u6307\u5b9a\u3057\u3066\u30dd\u30fc\u30c8\u30d5\u30a9\u30ef\u30fc\u30c7\u30a3\u30f3\u30b0\u6a5f\u80fd\u3092\u547c\u3073\u51fa\u3057\u307e\u3059\u3002<\/p>\n<pre>C:\\&gt;aws ssm start-session --target i-xxxxxxxxxxxxxxxxx ^\n--document-name AWS-StartPortForwardingSession ^\n--parameters \"{\\\"portNumber\\\":[\\\"22\\\"]}\"\n<\/pre>\n<p>start-session \u30b3\u30de\u30f3\u30c9\u5b9f\u884c\u5f8c\u3001\u30e9\u30f3\u30c0\u30e0\u306b\u5272\u308a\u5f53\u3066\u3089\u308c\u305f\u30ed\u30fc\u30ab\u30eb\u5074\u306e\u30dd\u30fc\u30c8\u756a\u53f7\u304c\u51fa\u529b\u3055\u308c\u307e\u3059\u3002<\/p>\n<pre>Starting session with SessionId: IAM-User01-xxxxxxxxxxxxxxxxx\nPort <span style=\"color: #ffff00;\">55394<\/span> opened for sessionId IAM-User01-xxxxxxxxxxxxxxxxx.\nConnection accepted for session IAM-User01-xxxxxxxxxxxxxxxxx.\n<\/pre>\n<p>\u5404\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u3067 <strong>127.0.0.1:[\u51fa\u529b\u3055\u308c\u305f\u30dd\u30fc\u30c8\u756a\u53f7]<\/strong> \u3092\u63a5\u7d9a\u5148\u306b\u6307\u5b9a\u3057\u3001\u30ed\u30b0\u30a4\u30f3\u3057\u307e\u3059\u3002<\/p>\n<a href=\"https:\/\/www.skyarch.net\/blog\/wp-content\/uploads\/2019\/10\/2019-10-02_16h07_31.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17240\" src=\"https:\/\/www.skyarch.net\/blog\/wp-content\/uploads\/2019\/10\/2019-10-02_16h07_31.png\" alt=\"\" width=\"659\" height=\"486\" srcset=\"https:\/\/www.skyarch.net\/blog\/wp-content\/uploads\/2019\/10\/2019-10-02_16h07_31.png 659w, https:\/\/www.skyarch.net\/blog\/wp-content\/uploads\/2019\/10\/2019-10-02_16h07_31-300x221.png 300w\" sizes=\"auto, (max-width: 659px) 100vw, 659px\" \/><\/a>\n<p>\u30ed\u30b0\u30a4\u30f3\u51fa\u6765\u307e\u3057\u305f\u3002<\/p>\n<a href=\"https:\/\/www.skyarch.net\/blog\/wp-content\/uploads\/2019\/10\/2019-10-02_16h14_20.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-17241\" src=\"https:\/\/www.skyarch.net\/blog\/wp-content\/uploads\/2019\/10\/2019-10-02_16h14_20.png\" alt=\"\" width=\"659\" height=\"486\" srcset=\"https:\/\/www.skyarch.net\/blog\/wp-content\/uploads\/2019\/10\/2019-10-02_16h14_20.png 659w, https:\/\/www.skyarch.net\/blog\/wp-content\/uploads\/2019\/10\/2019-10-02_16h14_20-300x221.png 300w\" sizes=\"auto, (max-width: 659px) 100vw, 659px\" \/><\/a>\n<p>\u3061\u306a\u307f\u306b\u3001\u30ed\u30fc\u30ab\u30eb\u306e\u30dd\u30fc\u30c8\u756a\u53f7\u3092\u6307\u5b9a\u3057\u305f\u3044\u5834\u5408\u306f\u4ee5\u4e0b\u306e\u3088\u3046\u306b\u3057\u307e\u3059\u3002<\/p>\n<pre>C:\\&gt;aws ssm start-session --target i-xxxxxxxxxxxxxxxxx ^\n--document-name AWS-StartPortForwardingSession ^\n--parameters \"{\\\"portNumber\\\":[\\\"22\\\"],\\\"localPortNumber\\\":[\\\"<span style=\"color: #ffff00;\">9999<\/span>\\\"]}\"\n<\/pre>\n<p>RDP\u306e\u5834\u5408<\/p>\n<pre>C:\\&gt;aws ssm start-session --target i-xxxxxxxxxxxxxxxxx ^\n--document-name AWS-StartPortForwardingSession ^\n--parameters \"{\\\"portNumber\\\":[\\\"3389\\\"]}\"\n<\/pre>\n<h3>\u30a2\u30af\u30bb\u30b9\u30ad\u30fc\u306e\u30ed\u30fc\u30c6\u30fc\u30b7\u30e7\u30f3<\/h3>\n<p>\u8a71\u304c\u305d\u308c\u307e\u3059\u304c\u3001CloudFormation\u3067\u4f5c\u6210\u3057\u305fIAM\u30e6\u30fc\u30b6\u306b\u306f\u81ea\u8eab\u306e\u30a2\u30af\u30bb\u30b9\u30ad\u30fc\u3092\u4f5c\u6210\u30fb\u524a\u9664\u3067\u304d\u308b\u6a29\u9650\u304c\u3042\u308a\u307e\u3059\u3002<br \/>\n\u9069\u5b9c\u30a2\u30af\u30bb\u30b9\u30ad\u30fc\u3092\u30ed\u30fc\u30c6\u30fc\u30c8\u3057\u307e\u3057\u3087\u3046\u3002<\/p>\n<pre># \u73fe\u5728\u5229\u7528\u3057\u3066\u3044\u308b\u30a2\u30af\u30bb\u30b9\u30ad\u30fc\u3092\u78ba\u8a8d\nC:\\&gt;echo %AWS_ACCESS_KEY_ID%\n<span style=\"color: #ffff00;\">AKIAxxxxxxxxxxxxxxxx<\/span>\n\n# \u65b0\u3057\u3044\u30a2\u30af\u30bb\u30b9\u30ad\u30fc\u3092\u4f5c\u6210\nC:\\&gt;aws iam create-access-key\n-------------------------------------------------------------------\n|                         CreateAccessKey                         |\n+-----------------------------------------------------------------+\n||                           AccessKey                           ||\n|+------------------+--------------------------------------------+|\n||  AccessKeyId     |  <span style=\"color: #ff0000;\">AKIAxxxxxxxxxxxxxxxx<\/span>                      ||\n||  CreateDate      |  2019-10-02T07:24:17Z                      ||\n||  SecretAccessKey |  <span style=\"color: #ff0000;\">iOTbxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx<\/span>  ||\n||  Status          |  Active                                    ||\n||  UserName        |  IAM-User01                                ||\n|+------------------+--------------------------------------------+|\n\n# \u65b0\u3057\u3044\u30a2\u30af\u30bb\u30b9\u30ad\u30fc\u3092CLI\u306b\u30bb\u30c3\u30c8\nC:\\&gt;set AWS_ACCESS_KEY_ID=<span style=\"color: #ff0000;\">AKIAxxxxxxxxxxxxxxxx<\/span>\n\nC:\\&gt;set AWS_SECRET_ACCESS_KEY=<span style=\"color: #ff0000;\">iOTbxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx<\/span>\n\n# \u53e4\u3044\u30a2\u30af\u30bb\u30b9\u30ad\u30fc\u306e\u524a\u9664\nC:\\&gt;aws iam delete-access-key --access-key-id <span style=\"color: #ffff00;\">AKIAxxxxxxxxxxxxxxxx\n<\/span><\/pre>\n","protected":false},"excerpt":{"rendered":"<p>AWS System Manager\u30bb\u30c3\u30b7\u30e7\u30f3\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u306b\u30dd\u30fc\u30c8\u30d5\u30a9\u30ef\u30fc\u30c7\u30a3\u30f3\u30b0\u6a5f\u80fd\u304c\u8ffd\u52a0\u3055\u308c\u307e\u3057\u305f\u3002 AWS System Manager Sessions Manager \u3092\u4f7f\u7528\u3057\u305f\u65b0\u3057\u3044\u6a5f\u80fd \u2013 Port For&#8230;<\/p>\n","protected":false},"author":60,"featured_media":17248,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_locale":"ja","_original_post":"17237","footnotes":""},"categories":[20,132],"tags":[],"class_list":{"0":"post-17237","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-aws","8":"category-aws-cli","9":"ja"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.skyarch.net\/blog\/wp-json\/wp\/v2\/posts\/17237","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.skyarch.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.skyarch.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.skyarch.net\/blog\/wp-json\/wp\/v2\/users\/60"}],"replies":[{"embeddable":true,"href":"https:\/\/www.skyarch.net\/blog\/wp-json\/wp\/v2\/comments?post=17237"}],"version-history":[{"count":8,"href":"https:\/\/www.skyarch.net\/blog\/wp-json\/wp\/v2\/posts\/17237\/revisions"}],"predecessor-version":[{"id":17283,"href":"https:\/\/www.skyarch.net\/blog\/wp-json\/wp\/v2\/posts\/17237\/revisions\/17283"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.skyarch.net\/blog\/wp-json\/wp\/v2\/media\/17248"}],"wp:attachment":[{"href":"https:\/\/www.skyarch.net\/blog\/wp-json\/wp\/v2\/media?parent=17237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.skyarch.net\/blog\/wp-json\/wp\/v2\/categories?post=17237"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.skyarch.net\/blog\/wp-json\/wp\/v2\/tags?post=17237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}