<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Ssm on The IT Hollow</title>
    <link>https://theithollow.com/tags/ssm/</link>
    <description>Recent content in Ssm on The IT Hollow</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Mon, 01 Oct 2018 14:05:01 +0000</lastBuildDate>
    <atom:link href="https://theithollow.com/tags/ssm/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>AWS Session Manager</title>
      <link>https://theithollow.com/2018/10/01/aws-session-manager/</link>
      <pubDate>Mon, 01 Oct 2018 14:05:01 +0000</pubDate>
      <guid>https://theithollow.com/2018/10/01/aws-session-manager/</guid>
      <description>&lt;p&gt;Amazon has released yet another &lt;a href=&#34;https://theithollow.com/2017/10/02/aws-ec2-simple-systems-manager-reference/&#34;&gt;Simple Systems Manager&lt;/a&gt; service to improve the management of EC2 instances. This time, it&amp;rsquo;s AWS Session Manager. Session Manager is a nifty little service that lets you assign permissions to users to access an instances&amp;rsquo;s shell. Now, you might be thinking, &amp;ldquo;Why would I need this? I can already add SSH keys to my instances at boot time to access my instances.&amp;rdquo; You&amp;rsquo;d be right of course, but think of how you might use Session Manager. Instead of having to deal with adding SSH keys, and managing access/distribution of the private keys, we can manage access through AWS Identity and Access Management permissions.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Manage vSphere Virtual Machines through AWS SSM</title>
      <link>https://theithollow.com/2017/11/06/manage-vsphere-virtual-machines-aws-ssm/</link>
      <pubDate>Mon, 06 Nov 2017 15:15:18 +0000</pubDate>
      <guid>https://theithollow.com/2017/11/06/manage-vsphere-virtual-machines-aws-ssm/</guid>
      <description>&lt;p&gt;Amazon Web Services has some great tools to help you operate your EC2 instances with their Simple Systems Manager services. These services include ensuring &lt;a href=&#34;https://theithollow.com/2017/07/24/patch-compliance-ec2-systems-manager/&#34;&gt;patches are deployed&lt;/a&gt; within maintenance windows specified by you, &lt;a href=&#34;https://theithollow.com/2017/09/26/aws-ec2-systems-manager-state-manager/&#34;&gt;automation routines&lt;/a&gt; that are used to ensure state and &lt;a href=&#34;https://theithollow.com/2017/07/17/run-commands-ec2-systems-manager/&#34;&gt;run commands&lt;/a&gt; on a fleet of servers through the AWS console. These tools are great but wouldn&amp;rsquo;t be be even better if I could use these tools to manage my VMware virtual machines too? Well, you&amp;rsquo;re in luck, because EC2 SSM can do just that and better yet, the service itself is free! Now, if you&amp;rsquo;ve followed along with the &amp;quot; &lt;a href=&#34;https://theithollow.com/2017/10/02/aws-ec2-simple-systems-manager-reference/&#34;&gt;AWS EC2 Simple Systems Manager Reference&lt;/a&gt;&amp;quot; guide you&amp;rsquo;ve probably already seen the goodies that we&amp;rsquo;ve got available, so this post is used to show you how you can use these same tools on your vSphere, Hyper-V or other on-premises platforms.&lt;/p&gt;</description>
    </item>
    <item>
      <title>AWS EC2 Simple Systems Manager Reference</title>
      <link>https://theithollow.com/2017/10/02/aws-ec2-simple-systems-manager-reference/</link>
      <pubDate>Mon, 02 Oct 2017 14:07:07 +0000</pubDate>
      <guid>https://theithollow.com/2017/10/02/aws-ec2-simple-systems-manager-reference/</guid>
      <description>&lt;p&gt;Please use this post as a landing page to get you started with using the EC2 Simple Systems Manager services from Amazon Web Services. Simple Systems Manager or (SSM) is a set of services used to manage EC2 instances as well as on-premises machines (known as managed instances) with the SSM agent installed on them. You can use these services to maintain state, run ad-hoc commands, and configure patch compliance among other things.&lt;/p&gt;</description>
    </item>
    <item>
      <title>AWS EC2 Systems Manager - State Manager</title>
      <link>https://theithollow.com/2017/09/26/aws-ec2-systems-manager-state-manager/</link>
      <pubDate>Tue, 26 Sep 2017 14:06:57 +0000</pubDate>
      <guid>https://theithollow.com/2017/09/26/aws-ec2-systems-manager-state-manager/</guid>
      <description>&lt;p&gt;Sometimes you need to ensure that things are always a certain way when you deploy AWS EC2 instances. This could be things like making sure your servers are always joined to a domain when being deployed, or making sure you run an Ansible playbook every hour. The point of the AWS EC2 SSM State Manager service is to define a consistent state for your EC2 instances.&lt;/p&gt;
&lt;p&gt;This post will use a fictional use case where I have a an EC2 instance or instances that are checking every thirty minutes to see if they should use a new image for their Apache website. The instance will check against the EC2 Simple Systems Manager Parameter Store, which we&amp;rsquo;ve discussed in a &lt;a href=&#34;https://theithollow.com/2017/09/11/ec2-systems-manager-parameter-store/&#34;&gt;previous post&lt;/a&gt;, and will download the image from the S3 location retrieved from that parameter.&lt;/p&gt;</description>
    </item>
    <item>
      <title>AWS EC2 Simple Systems Manager Documents</title>
      <link>https://theithollow.com/2017/09/18/aws-ec2-simple-systems-manager-documents/</link>
      <pubDate>Mon, 18 Sep 2017 14:32:16 +0000</pubDate>
      <guid>https://theithollow.com/2017/09/18/aws-ec2-simple-systems-manager-documents/</guid>
      <description>&lt;p&gt;Amazon Web Services uses Systems Manager Documents to define actions that should be taken on your instances. This could be a wide variety of actions including updating the operating system, copying files such as logs to another destination or re-configuring your applications. These documents are written in Javascript Object Notation (JSON) and are stored within AWS for use with theother Simple Systems Manager (SSM) services such as the Automation Service or Run command.&lt;/p&gt;</description>
    </item>
    <item>
      <title>EC2 Systems Manager Parameter Store</title>
      <link>https://theithollow.com/2017/09/11/ec2-systems-manager-parameter-store/</link>
      <pubDate>Mon, 11 Sep 2017 14:15:52 +0000</pubDate>
      <guid>https://theithollow.com/2017/09/11/ec2-systems-manager-parameter-store/</guid>
      <description>&lt;p&gt;Generally speaking, when you deploy infrastructure through code, or run deployment scripts you&amp;rsquo;ll need to have a certain amount of configuration data. Much of your code will have install routines but what about the configuration information that is specific to your environment? Things such as license keys, service accounts, passwords, or connection strings are commonly needed when connecting multiple services together. So how do you code that exactly? Do you pass the strings in at runtime as a parameter and then hope to remember those each time you execute code? Do you bake those strings into the code and then realize that you&amp;rsquo;ve got sensitive information stored in your deployment scripts?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Run Commands through EC2 Systems Manager</title>
      <link>https://theithollow.com/2017/07/17/run-commands-ec2-systems-manager/</link>
      <pubDate>Mon, 17 Jul 2017 14:05:12 +0000</pubDate>
      <guid>https://theithollow.com/2017/07/17/run-commands-ec2-systems-manager/</guid>
      <description>&lt;p&gt;In a previous post we covered the different capabilities and basic setup of EC2 Systems Manager, including the IAM roles that needed to be created and the installation of the SSM Agent. In this post we&amp;rsquo;ll focus on running some commands through the EC2 Systems Manager Console.&lt;/p&gt;
&lt;p&gt;We&amp;rsquo;ve already got an Amazon Linux instance deployed within our VPC. I&amp;rsquo;ve placed this instance in a public facing subnet and it is a member of a security group that allows HTTP traffic over port 80.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
