正在尝试使用ansible从另一个AWS帐户获取机密。我们是否可以选择使用我是aws秘密账户的角色arn来获取参数。因为我们创建的每个实例都将与此秘密AWS帐户ARN链接。
IAMSECRETARN : arn:aws:iam::xxxxxxxx:role/service/xxx-xxxx-xxxxx-xxxxx-xxx-79392xx94110xxxx---
- name: Testing shared Roles
hosts: all
tasks:
- name: lookup a key which doesn't exist failing to store it in a fact
set_fact:
temp_secret: "{{ lookup('aws_ssm', '/xxx/xxx/xxx/ansible-tower/admin_password' region='us-east-1', aws_profile='xxx-xxx-xxx') }}"
ignore_errors: true
- name: SSM PARAMS
debug:
msg: "{{ temp_secret }}"而不是"profile“需要使用"arn”或任何其他没有密钥和访问密钥方法
发布于 2021-03-10 10:51:06
到目前为止,我使用了以下代码:
---
- name: ssm parameter
hosts: localhost
gather_facts: false
connection: local
tasks:
- sts_assume_role:
role_arn: "arn:aws:iam::xxxxxxx:role/xxxxx/xxxxxx"
role_session_name: "ssm"
region: us-east-1
register: assumed_role
no_log: true
- name: lookup ssm parameter
debug: msg="{{ lookup('aws_ssm', '/xxx/xxx/xxx/xxxx/database_password', region='us-east-1', aws_access_key=assumed_role.sts_creds.access_key, aws_secret_key=assumed_role.sts_creds.secret_key, aws_security_token=assumed_role.sts_creds.session_token ) }}"https://stackoverflow.com/questions/66541980
复制相似问题