Amazon Inspector

sudo curl -L -o /etc/yum.repos.d/devel:kubic:libcontainers:stable.repo https://download.opensuse.org/repositories/devel:kubic:libcontainers:stable/CentOS_7/devel:kubic:libcontainers:stable.repo
sudo curl -L -o /etc/yum.repos.d/devel:kubic:libcontainers:stable:cri-o:${VERSION}.repo https://download.opensuse.org/repositories/devel:kubic:libcontainers:stable:cri-o:${VERSION}/CentOS_7/devel:kubic:libcontainers:stable:cri-o:${VERSION}.repo



aws s3 cp file2.txt s3://bucket1-077298724

aws s3 cp file2.txt s3://bucket2-077298724


aws s3 ls  s3://bucket1-077298724

aws s3 ls  s3://bucket2-077298724

ip link set cni0 down && ip link set flannel.1 down 
ip link delete cni0 && ip link delete flannel.1 
systemctl restart containerd && systemctl restart kubelet

ee8fedc3-a236-4280-9fab-93f30d9bf706

aws ssm list-command-invocations --details \
--query "CommandInvocations[*].[InstanceId,DocumentName,Status]" \
--command-id ee8fedc3-a236-4280-9fab-93f30d9bf706


aws inspector create-assessment-target \
--assessment-target-name GamesDevTargetGroupCLI \
--resource-group-arn arn:aws:inspector:us-east-1:261289530960:resourcegroup/0-e10qLHIm


[ssm-user@ip-10-96-10-150 ~] $ aws inspector create-assessment-target \
> --assessment-target-name GamesDevTargetGroupCLI \
> --resource-group-arn arn:aws:inspector:us-east-1:261289530960:resourcegroup/0-e10qLHIm

{
    "assessmentTargetArn": "arn:aws:inspector:us-east-1:261289530960:target/0-RRC8TidP"
}

[ssm-user@ip-10-96-10-150 ~] $


aws inspector describe-rules-packages --query rulesPackages[*].[name,description] --output text --rules-package-arns ”arn:aws:inspector:us-east-1:316112463485:rulespackage/0-PmNV0Tcd“

aws inspector describe-rules-packages --query rulesPackages[*].[name,description] --output text --rules-package-arns ”arn:aws:inspector:us-east-1:316112463485:rulespackage/0-R01qwB5Q“

aws inspector describe-rules-packages --query rulesPackages[*].[name,description] --output text --rules-package-arns ”arn:aws:inspector:us-east-1:316112463485:rulespackage/0-gEjTy7T7“

aws inspector describe-rules-packages --query rulesPackages[*].[name,description] --output text --rules-package-arns “arn:aws:inspector:us-east-1:316112463485:rulespackage/0-rExsr2X8”



aws ssm send-command --targets Key=tag:SecurityScan,Values=true \
--document-name "AmazonInspector-ManageAWSAgent" \
--query Command.CommandId \
--output-s3-bucket-name qls-5241349-96bc6c5a086b7a19-logbucket-12xk0yanx58c4


b2994ed2-b0d0-4808-8f3c-043f42e2fa02

ssm-user@ip-10-96-10-52 ~] $ aws ssm list-command-invocations --details \
> --query "CommandInvocations[*].[InstanceId,DocumentName,Status]" \
> --command-id b2994ed2-b0d0-4808-8f3c-043f42e2fa02

[
    [
        "i-0a6bd7b2c3f08a969",
        "AmazonInspector-ManageAWSAgent",
        "Success"
    ],
    [
        "i-0d42a24bd7f7619fb",
        "AmazonInspector-ManageAWSAgent",
        "Success"
    ]
]


[ssm-user@ip-10-96-10-52 ~] $ aws inspector create-resource-group --resource-group-tags key=SecurityScan,value=true

{
    "resourceGroupArn": "arn:aws:inspector:us-east-1:821036605433:resourcegroup/0-N5osqgQM"
}


[ssm-user@ip-10-96-10-52 ~] $ aws inspector create-assessment-target \
> --assessment-target-name GamesDevTargetGroupCLI \
> --resource-group-arn arn:aws:inspector:us-east-1:821036605433:resourcegroup/0-N5osqgQM

{
    "assessmentTargetArn": "arn:aws:inspector:us-east-1:821036605433:target/0-bN9wuvSn"
}



[ssm-user@ip-10-96-10-52 ~] $ aws inspector list-rules-packages

{
    "rulesPackageArns": [
        "arn:aws:inspector:us-east-1:316112463485:rulespackage/0-PmNV0Tcd",
        "arn:aws:inspector:us-east-1:316112463485:rulespackage/0-R01qwB5Q",
        "arn:aws:inspector:us-east-1:316112463485:rulespackage/0-gEjTy7T7",
        "arn:aws:inspector:us-east-1:316112463485:rulespackage/0-rExsr2X8"
    ]
}

aws inspector describe-rules-packages --query rulesPackages[*].[name,description] --output text --rules-package-arns "arn:aws:inspector:us-east-1:316112463485:rulespackage/0-PmNV0Tcd"


aws inspector describe-rules-packages --query rulesPackages[*].[name,description] --output text --rules-package-arns "arn:aws:inspector:us-east-1:316112463485:rulespackage/0-R01qwB5Q"

aws inspector describe-rules-packages --query rulesPackages[*].[name,description] --output text --rules-package-arns "arn:aws:inspector:us-east-1:316112463485:rulespackage/0-gEjTy7T7"

aws inspector describe-rules-packages --query rulesPackages[*].[name,description] --output text --rules-package-arns "arn:aws:inspector:us-east-1:316112463485:rulespackage/0-rExsr2X8"


"arn:aws:inspector:us-east-1:316112463485:rulespackage/0-R01qwB5Q",
"arn:aws:inspector:us-east-1:316112463485:rulespackage/0-gEjTy7T7",
"arn:aws:inspector:us-east-1:316112463485:rulespackage/0-rExsr2X8"


ssm-user@ip-10-96-10-52 ~] $ aws inspector help


[ssm-user@ip-10-96-10-52 ~] $ aws inspector list-assessment-templates

{
    "assessmentTemplateArns": [
        "arn:aws:inspector:us-east-1:821036605433:target/0-bN9wuvSn/template/0-XGd8JbdJ"
    ]
}

[ssm-user@ip-10-96-10-52 ~] $ aws inspector  delete-assessment-template --assessment-template-arn arn:aws:inspector:us-east-1:821036605433:target/0-bN9wuvSn/template/0-XGd8JbdJ



[ssm-user@ip-10-96-10-52 ~] $ aws inspector create-assessment-template \
> --assessment-target-arn arn:aws:inspector:us-east-1:821036605433:target/0-bN9wuvSn \
> --assessment-template-name CISCommonVulerBestPract-Short \
> --duration-in-seconds 900 --rules-package-arns arn:aws:inspector:us-east-1:316112463485:rulespackage/0-R01qwB5Q arn:aws:inspector:us-east-1:316112463485:rulespackage/0-gEjTy7T7 arn:aws:inspector:us-east-1:316112463485:rulespackage/0-rExsr2X8

{
    "assessmentTemplateArn": "arn:aws:inspector:us-east-1:821036605433:target/0-bN9wuvSn/template/0-1o8jFMlh"
}




ssm-user@ip-10-96-10-52 ~] $ aws inspector preview-agents --preview-agents-arn arn:aws:inspector:us-east-1:821036605433:target/0-bN9wuvSn

{
    "agentPreviews": [
        {
            "kernelVersion": "4.15.0-1044-aws",
            "ipv4Address": "52.87.190.219",
            "agentHealth": "HEALTHY",
            "hostname": "ec2-52-87-190-219.compute-1.amazonaws.com",
            "agentVersion": "1.1.1712.0",
            "agentId": "i-0a6bd7b2c3f08a969",
            "operatingSystem": "\"Ubuntu 18.04.2 LTS\""
        },
        {
            "kernelVersion": "4.14.252-195.483.amzn2.x86_64",
            "ipv4Address": "54.158.64.227",
            "agentHealth": "HEALTHY",
            "hostname": "ec2-54-158-64-227.compute-1.amazonaws.com",
            "agentVersion": "1.1.1712.0",
            "agentId": "i-0d42a24bd7f7619fb",
            "operatingSystem": "Amazon Linux release 2 (Karoo)"
        }
    ]
}

[ssm-user@ip-10-96-10-52 ~] $ aws inspector start-assessment-run \
> --assessment-run-name FirstAssessment \
> --assessment-template-arn arn:aws:inspector:us-east-1:821036605433:target/0-bN9wuvSn/template/0-1o8jFMlh

{
    "assessmentRunArn": "arn:aws:inspector:us-east-1:821036605433:target/0-bN9wuvSn/template/0-1o8jFMlh/run/0-sI9ODcpy"
}

ssm-user@ip-10-96-10-52 ~] $ aws inspector describe-assessment-runs --assessment-run-arn arn:aws:inspector:us-east-1:821036605433:target/0-bN9wuvSn/template/0-1o8jFMlh/run/0-sI9ODcpy

{
    "failedItems": {},
    "assessmentRuns": [
        {
            "dataCollected": false,
            "name": "FirstAssessment",
            "userAttributesForFindings": [],
            "stateChanges": [
                {
                    "state": "CREATED",
                    "stateChangedAt": 1640495971.991
                },
                {
                    "state": "START_DATA_COLLECTION_PENDING",
                    "stateChangedAt": 1640495972.077
                },
                {
                    "state": "COLLECTING_DATA",
                    "stateChangedAt": 1640495972.713
                }
            ],
            "createdAt": 1640495971.991,
            "notifications": [],
            "state": "COLLECTING_DATA",
            "stateChangedAt": 1640495972.713,
            "durationInSeconds": 900,
            "rulesPackageArns": [
                "arn:aws:inspector:us-east-1:316112463485:rulespackage/0-gEjTy7T7",
                "arn:aws:inspector:us-east-1:316112463485:rulespackage/0-rExsr2X8",
                "arn:aws:inspector:us-east-1:316112463485:rulespackage/0-R01qwB5Q"
            ],
            "startedAt": 1640495972.713,
            "assessmentTemplateArn": "arn:aws:inspector:us-east-1:821036605433:target/0-bN9wuvSn/template/0-1o8jFMlh",
            "arn": "arn:aws:inspector:us-east-1:821036605433:target/0-bN9wuvSn/template/0-1o8jFMlh/run/0-sI9ODcpy"
        }
    ]
}


ssm-user@ip-10-96-10-52 ~] $ aws inspector list-assessment-run-agents --assessment-run-arn arn:aws:inspector:us-east-1:821036605433:target/0-bN9wuvSn/template/0-1o8jFMlh/run/0-sI9ODcpy

{
    "assessmentRunAgents": [
        {
            "agentHealthCode": "RUNNING",
            "assessmentRunArn": "arn:aws:inspector:us-east-1:821036605433:target/0-bN9wuvSn/template/0-1o8jFMlh/run/0-sI9ODcpy",
            "agentId": "i-0a6bd7b2c3f08a969",
            "agentHealth": "HEALTHY",
            "telemetryMetadata": [
                {
                    "count": 456,
                    "dataSize": 245851,
                    "messageType": "Total"
                },
                {
                    "count": 1,
                    "dataSize": 0,
                    "messageType": "InspectorSplitMsgBegin"
                },
                {
                    "count": 1,
                    "dataSize": 85,
                    "messageType": "InspectorTimeEventMsg"
                },
                {
                    "count": 56,
                    "dataSize": 5098,
                    "messageType": "InspectorGroup"
                },
                {
                    "count": 1,
                    "dataSize": 713,
                    "messageType": "InspectorListeningProcess"
                },
                {
                    "count": 1,
                    "dataSize": 354,
                    "messageType": "InspectorOperatingSystem"
                },
                {
                    "count": 2,
                    "dataSize": 129984,
                    "messageType": "InspectorOvalCISMsg"
                },
                {
                    "count": 1,
                    "dataSize": 95,
                    "messageType": "InspectorMonitoringStart"
                },
                {
                    "count": 31,
                    "dataSize": 7096,
                    "messageType": "InspectorUser"
                },
                {
                    "count": 12,
                    "dataSize": 2742,
                    "messageType": "InspectorDirectoryInfoMsg"
                },
                {
                    "count": 2,
                    "dataSize": 294,
                    "messageType": "InspectorErrorMsg"
                },
                {
                    "count": 30,
                    "dataSize": 50783,
                    "messageType": "InspectorConfigurationInfo"
                },
                {
                    "count": 318,
                    "dataSize": 48607,
                    "messageType": "InspectorPackageInfo"
                }
            ]
        },
        {
            "agentHealthCode": "RUNNING",
            "assessmentRunArn": "arn:aws:inspector:us-east-1:821036605433:target/0-bN9wuvSn/template/0-1o8jFMlh/run/0-sI9ODcpy",
            "agentId": "i-0d42a24bd7f7619fb",
            "agentHealth": "HEALTHY",
            "telemetryMetadata": [
                {
                    "count": 390,
                    "dataSize": 126714,
                    "messageType": "Total"
                },
                {
                    "count": 1,
                    "dataSize": 85,
                    "messageType": "InspectorTimeEventMsg"
                },
                {
                    "count": 50,
                    "dataSize": 4578,
                    "messageType": "InspectorGroup"
                },
                {
                    "count": 1,
                    "dataSize": 64992,
                    "messageType": "InspectorOvalCISMsg"
                },
                {
                    "count": 1,
                    "dataSize": 378,
                    "messageType": "InspectorOperatingSystem"
                },
                {
                    "count": 1,
                    "dataSize": 95,
                    "messageType": "InspectorMonitoringStart"
                },
                {
                    "count": 28,
                    "dataSize": 5979,
                    "messageType": "InspectorUser"
                },
                {
                    "count": 307,
                    "dataSize": 50427,
                    "messageType": "InspectorPackageInfo"
                },
                {
                    "count": 1,
                    "dataSize": 180,
                    "messageType": "InspectorErrorMsg"
                }
            ]
        }
    ]
}




sh-4.2$ aws ssm describe-document --name "AWS-PatchInstanceWithRollback" --query "Document.[Name,Description,PlatformTypes]"
[
    "AWS-PatchInstanceWithRollback",
    "Brings EC2 Instance into compliance with standing Baseline; rolls back root Volume on failure.",
    [
        "Windows",
        "Linux",
        "MacOS"
    ]
]
sh-4.2$ aws ssm describe-instance-information  --query "InstanceInformationList[*]" --filters "Key=tag:SecurityScan,Values=true"
[
    {
        "IsLatestVersion": false,
        "ComputerName": "ip-10-96-10-124.ec2.internal",
        "PingStatus": "Online",
        "InstanceId": "i-0d42a24bd7f7619fb",
        "IPAddress": "10.96.10.124",
        "ResourceType": "EC2Instance",
        "AgentVersion": "3.0.1124.0",
        "PlatformVersion": "2",
        "PlatformName": "Amazon Linux",
        "PlatformType": "Linux",
        "LastPingDateTime": 1640497264.48
    },
    {
        "IsLatestVersion": false,
        "ComputerName": "ip-10-96-10-8.ec2.internal",
        "PingStatus": "Online",
        "InstanceId": "i-0a6bd7b2c3f08a969",
        "IPAddress": "10.96.10.8",
        "ResourceType": "EC2Instance",
        "AgentVersion": "2.3.662.0",
        "PlatformVersion": "18.04",
        "PlatformName": "Ubuntu",
        "PlatformType": "Linux",
        "LastPingDateTime": 1640497316.34
    }
]


sh-4.2$ aws ssm start-automation-execution \
>   --document-name "AWS-PatchInstanceWithRollback" \
>   --parameters "InstanceId=i-0d42a24bd7f7619fb,ReportS3Bucket=qls-5241349-96bc6c5a086b7a19-logbucket-12xk0yanx58c4,AutomationAssumeRole=arn:aws:iam::821036605433:role/qls-5241349-96bc6c5a086b7a19-SSMRole-R8NGF93CWJ71"
{
    "AutomationExecutionId": "e5c0abc3-708e-4a0c-96b9-0f0884ad1eec"
}
sh-4.2$

黑洞@heidsoft
Github:https://github.com/heidsoft
微博:http://weibo.com/liuganbin
热衷云计算和大数据
关注CloudStack,OpenStack,Linux c/c++/python/java
关注研究新技术
原文地址:https://www.cnblogs.com/heidsoft/p/15732791.html