Closed ph-One closed 1 year ago
You can use these commands to list out all certificates and keys in parameter store. This should give you a jumping off point for which entries to tag
aws ssm describe-parameters --query "Parameters[].Name" \ [15:36:39]
| jq -r '.[]' \
| xargs -I{} aws ssm get-parameter --with-decrypt --name {} \
| tee -a ~/bingo/ps-`date +%Y%m%d%s`.certs.json \
| jq -r '.Parameter | select(.Value | match("--BEGIN CERTIFICATE--")) | .Name '
aws ssm describe-parameters --query "Parameters[].Name" \ [15:36:39]
| jq -r '.[]' \
| xargs -I{} aws ssm get-parameter --with-decrypt --name {} \
| tee -a ~/bingo/ps-`date +%Y%m%d%s`.keys.json \
| jq -r '.Parameter | select(.Value | match("--BEGIN RSA PRIVATE KEY--")) | .Name '
pulling into sprint now that i have permissions for aws
Rolling over into next sprint due to some unexpected PTO and a large # of support requests/cert renewals
@barbarello Let's break this up into two separate tasks -- one for certificates, and one for keys
Certificates that are stored in AWS Parameter Store should be tagged for easy retrieval and scanning.
Tasks
purpose: certificate