<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Renan Pessoa</title>
    <description>The latest articles on DEV Community by Renan Pessoa (@renanpessoa).</description>
    <link>https://dev.to/renanpessoa</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F173881%2F07a8d29c-b778-4306-89d4-78ed05c554cc.jpeg</url>
      <title>DEV Community: Renan Pessoa</title>
      <link>https://dev.to/renanpessoa</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/renanpessoa"/>
    <language>en</language>
    <item>
      <title>Executando AWS cli em múltiplas contas de maneira fácil</title>
      <dc:creator>Renan Pessoa</dc:creator>
      <pubDate>Fri, 29 Jan 2021 21:00:56 +0000</pubDate>
      <link>https://dev.to/renanpessoa/executando-aws-cli-em-multiplas-contas-de-maneira-facil-2e0g</link>
      <guid>https://dev.to/renanpessoa/executando-aws-cli-em-multiplas-contas-de-maneira-facil-2e0g</guid>
      <description>&lt;p&gt;&lt;a href="https://www.linkedin.com/pulse/executando-aws-cli-em-m%25C3%25BAltiplas-contas-de-maneira-f%25C3%25A1cil-renan-pessoa/?trackingId=RNWux74FT7uV9TR5%2FcMV4Q%3D%3D"&gt;Postado originalmente aqui.&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Sobre
&lt;/h2&gt;

&lt;p&gt;Nesse artigo vou te passar um script bem simples para você utilizar para executar o CLI da AWS em múltiplas contas sem precisar ter uma conta IAM nelas.&lt;/p&gt;

&lt;p&gt;Se você usa mais de uma conta na AWS em algum momento você vai precisar usar o cli, como por exemplo criar uma conta IAM para o Terraform subir a sua infraestrutura, ou listar todos os buckets de todas as contas.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Nota&lt;/strong&gt;: Existe outras formas de fazer esse acesso, como por exemplo usando o &lt;a href="https://aws.amazon.com/pt/blogs/security/how-to-use-a-single-iam-user-to-easily-access-all-your-accounts-by-using-the-aws-cli/"&gt;named profile&lt;/a&gt;, porém para acessos pontuais acredito que essa maneira que vou te apresentar é mais fácil de usar.&lt;/p&gt;

&lt;h2&gt;
  
  
  Requisitos
&lt;/h2&gt;

&lt;p&gt;O único requisito é que as contas da AWS devem ter sido criadas através do AWS Organizations ou AWS Control Tower, pois vamos utilizar uma role que é adicionado nas contas de maneira automática após a criação por esses serviços.&lt;/p&gt;

&lt;p&gt;Ah e uma conta IAM ou credencial temporária com essa &lt;a href="https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_access.html"&gt;permissão&lt;/a&gt; (não é recomendado, mas a permissão Administrador também funciona.) na conta Master da AWS(A conta que você usou para criar as contas da AWS).&lt;/p&gt;

&lt;h2&gt;
  
  
  Como funciona
&lt;/h2&gt;

&lt;p&gt;O funcionamento é bem simples, vamos gerar uma credencial temporária em cada conta da AWS utilizando a role &lt;a href="https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_access.html"&gt;OrganizationAccountAccessRole&lt;/a&gt; e com essa credencial vamos executar o cli da AWS. Lembrando que essa role é adicionada de maneira automática pelo Organizations quando uma conta é criada.&lt;/p&gt;

&lt;h2&gt;
  
  
  Pegando ID das contas
&lt;/h2&gt;

&lt;p&gt;Primeiro precisamos dos ID's das contas para gerar a credencial temporária, para conseguir essa informação execute o comando abaixo para adicionar os ids das contas no arquivo 'accounts.txt', esse arquivo pode ser usado no futuro caso precise executar novamente.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="c"&gt;#Adicione suas credenciais da conta master nessas variaveis abaixo&lt;/span&gt;
&lt;span class="nv"&gt;AWS_ACCESS_KEY_ID&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;"S"&lt;/span&gt; &lt;span class="se"&gt;\&lt;/span&gt;
&lt;span class="nv"&gt;AWS_SECRET_ACCESS_KEY&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;""&lt;/span&gt; &lt;span class="se"&gt;\&lt;/span&gt;
&lt;span class="nv"&gt;AWS_SESSION_TOKEN&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;""&lt;/span&gt;
&lt;span class="c"&gt;#OBS: Se você estiver utilizando conta IAM você pode remover a variavel 'AWS_SESSION_TOKEN'&lt;/span&gt;
&lt;span class="c"&gt;######&lt;/span&gt;

&lt;span class="c"&gt;#Esse comando vai pegar o ID de todas as contas e adicionar no arquivo accounts.txt&lt;/span&gt;

aws organizations list-accounts &lt;span class="nt"&gt;--output&lt;/span&gt; text &lt;span class="nt"&gt;--query&lt;/span&gt; &lt;span class="s1"&gt;'Accounts[].[JoinedTimestamp,Status,Id,Email,Name]'&lt;/span&gt; | &lt;span class="nb"&gt;grep&lt;/span&gt; &lt;span class="nt"&gt;-i&lt;/span&gt; active | &lt;span class="nb"&gt;sort&lt;/span&gt; | &lt;span class="nb"&gt;cut&lt;/span&gt; &lt;span class="nt"&gt;-f3&lt;/span&gt; &lt;span class="o"&gt;&amp;gt;&lt;/span&gt; accounts.txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Remova o ID da conta Master do arquivo accounts.txt, pois a conta principal não possui a role que iremos utilizar e &lt;strong&gt;vai gerar um erro&lt;/strong&gt;, normalmente o ID da master é o primeiro da lista, na dúvida execute o comando acima até a parte do &lt;code&gt;grep -i active&lt;/code&gt; para vê o nome das contas.&lt;/p&gt;

&lt;h2&gt;
  
  
  Mão na massa
&lt;/h2&gt;

&lt;p&gt;Agora que temos os ID's das contas crie um arquivo chamado run.sh e coloque o conteúdo que está neste repositório: &lt;a href="https://github.com/renanpessoa/aws-cli-multiaccount/blob/main/run.sh"&gt;https://github.com/renanpessoa/aws-cli-multiaccount/blob/main/run.sh&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Você vai colocar o comando que deseja executar na contas, na linha 14 do script, no exemplo está esse comando:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;aws s3 &lt;span class="nb"&gt;ls&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Em seguida você vai adicionar as credenciais da sua conta (a mesma que foi utilizada para pegar os IDs das contas) nas linhas 27,28,29 do script, basta alterar onde estiver &lt;code&gt;'ADD-YOUR-MASTER-CREDENCIAL'&lt;/code&gt;.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;    &lt;span class="nv"&gt;ASSUME_ROLE&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="si"&gt;$(&lt;/span&gt;&lt;span class="nv"&gt;AWS_ACCESS_KEY_ID&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;"ADD-YOUR-MASTER-CREDENCIAL"&lt;/span&gt; &lt;span class="se"&gt;\&lt;/span&gt;
        &lt;span class="nv"&gt;AWS_SECRET_ACCESS_KEY&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;"ADD-YOUR-MASTER-CREDENCIAL"&lt;/span&gt; &lt;span class="se"&gt;\&lt;/span&gt;
        &lt;span class="nv"&gt;AWS_SESSION_TOKEN&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="s2"&gt;"ADD-YOUR-MASTER-CREDENCIAL"&lt;/span&gt; &lt;span class="se"&gt;\&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Em seguida de permissão de execução ao script e execute:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;chmod&lt;/span&gt; +x run.sh &lt;span class="p"&gt;;&lt;/span&gt; ./run.sh
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Pronto! será executado o comando em todas as contas.&lt;/p&gt;

&lt;p&gt;Exemplo de output, nesse caso foi executado em duas contas o comando aws s3 ls.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;Account: 123456789
&lt;span class="o"&gt;{&lt;/span&gt;
    &lt;span class="s2"&gt;"UserId"&lt;/span&gt;: &lt;span class="s2"&gt;"ABACAXI:local_28-01-2021@20-40"&lt;/span&gt;,
    &lt;span class="s2"&gt;"Account"&lt;/span&gt;: &lt;span class="s2"&gt;"123456789"&lt;/span&gt;,
    &lt;span class="s2"&gt;"Arn"&lt;/span&gt;: &lt;span class="s2"&gt;"arn:aws:sts::123456789:assumed-role/AWSControlTowerExecution/local_28-01-2021@20-40"&lt;/span&gt;
&lt;span class="o"&gt;}&lt;/span&gt;
2020-08-02 01:20:10 meu-bucket-de-teste

Account: 1011121314
&lt;span class="o"&gt;{&lt;/span&gt;
    &lt;span class="s2"&gt;"UserId"&lt;/span&gt;: &lt;span class="s2"&gt;"LARANJA:local_28-01-2021@20-41"&lt;/span&gt;,
    &lt;span class="s2"&gt;"Account"&lt;/span&gt;: &lt;span class="s2"&gt;"1011121314"&lt;/span&gt;,
    &lt;span class="s2"&gt;"Arn"&lt;/span&gt;: &lt;span class="s2"&gt;"arn:aws:sts::1011121314:assumed-role/AWSControlTowerExecution/local_28-01-2021@20-41"&lt;/span&gt;
&lt;span class="o"&gt;}&lt;/span&gt;
2020-08-02 01:25:10 meu-outro-bucket-de-teste
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Referências
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_access.html"&gt;https://docs.aws.amazon.com/organizations/latest/userguide/orgs_manage_accounts_access.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://aws.amazon.com/pt/organizations/"&gt;https://aws.amazon.com/pt/organizations/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://alestic.com/2017/09/aws-organizations-cli/"&gt;https://alestic.com/2017/09/aws-organizations-cli/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.aws.amazon.com/controltower/latest/userguide/how-control-tower-works.html"&gt;https://docs.aws.amazon.com/controltower/latest/userguide/how-control-tower-works.html&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>aws</category>
      <category>awscli</category>
      <category>devops</category>
      <category>sre</category>
    </item>
    <item>
      <title>Blocking external connections to Docker</title>
      <dc:creator>Renan Pessoa</dc:creator>
      <pubDate>Sat, 22 Jun 2019 14:45:58 +0000</pubDate>
      <link>https://dev.to/renanpessoa/blocking-external-connections-to-docker-4h7c</link>
      <guid>https://dev.to/renanpessoa/blocking-external-connections-to-docker-4h7c</guid>
      <description>&lt;p&gt;On Linux, Docker manipulates iptables rules to provide network isolation, by default, &lt;strong&gt;all external source IPs are allowed to connect to the Docker daemon&lt;/strong&gt; :/&lt;/p&gt;

&lt;p&gt;To allow only a specific IP or network to access the containers insert the rules below in iptables file &lt;strong&gt;&lt;code&gt;/etc/sysconfig/iptables&lt;/code&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In this case we will block all connections on port 80 and allow only the Office IP.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nt"&gt;-N&lt;/span&gt; DOCKER-USER
&lt;span class="nt"&gt;-I&lt;/span&gt; DOCKER-USER &lt;span class="nt"&gt;-p&lt;/span&gt; tcp &lt;span class="nt"&gt;--dport&lt;/span&gt; 80  &lt;span class="nt"&gt;-j&lt;/span&gt; DROP
&lt;span class="nt"&gt;-I&lt;/span&gt; DOCKER-USER &lt;span class="nt"&gt;-p&lt;/span&gt; tcp &lt;span class="nt"&gt;--dport&lt;/span&gt; 80 &lt;span class="nt"&gt;-s&lt;/span&gt; 185.2.46.131 &lt;span class="nt"&gt;-m&lt;/span&gt; comment &lt;span class="nt"&gt;--comment&lt;/span&gt; &lt;span class="s2"&gt;"My Office"&lt;/span&gt; &lt;span class="nt"&gt;-j&lt;/span&gt; ACCEPT
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;After add the rules restart iptables and Docker, after it check the access.&lt;/p&gt;

&lt;h3&gt;
  
  
  What we are doing here
&lt;/h3&gt;

&lt;p&gt;&lt;code&gt;-N DOCKER-USER&lt;/code&gt; —  The first rule create the chain used by Docker&lt;br&gt;
&lt;code&gt;-I DOCKER-USER -p tcp --dport 80  -j DROP&lt;/code&gt; —  All connections in port 80 are blocked&lt;br&gt;
&lt;code&gt;-I DOCKER-USER -p tcp --dport 80 -s 185.2.46.131 -m comment --comment "My Office" -j ACCEPT&lt;/code&gt; —  Allow Office IP&lt;/p&gt;

&lt;p&gt;Use &lt;code&gt;iptables -nL DOCKER-USER&lt;/code&gt; to check the rules:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="o"&gt;[&lt;/span&gt;root@server ~]# iptables &lt;span class="nt"&gt;-nL&lt;/span&gt; DOCKER-USER
Chain DOCKER-USER &lt;span class="o"&gt;(&lt;/span&gt;1 references&lt;span class="o"&gt;)&lt;/span&gt;
target     prot opt &lt;span class="nb"&gt;source               &lt;/span&gt;destination        
ACCEPT     tcp  &lt;span class="nt"&gt;--&lt;/span&gt;  185.2.46.131    0.0.0.0/0            tcp dpt:80 /&lt;span class="k"&gt;*&lt;/span&gt; My Office &lt;span class="k"&gt;*&lt;/span&gt;/
DROP       tcp  &lt;span class="nt"&gt;--&lt;/span&gt;  0.0.0.0/0            0.0.0.0/0            tcp dpt:80
RETURN     all  &lt;span class="nt"&gt;--&lt;/span&gt;  0.0.0.0/0            0.0.0.0/0          
&lt;span class="o"&gt;[&lt;/span&gt;root@server ~]#
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Now all external connections on port 80 are blocked&lt;br&gt;
&lt;a href="https://i.giphy.com/media/D6WuLOKOpR2fK/giphy.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://i.giphy.com/media/D6WuLOKOpR2fK/giphy.gif" alt="Ok" width="320" height="240"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>docker</category>
      <category>iptables</category>
      <category>firewall</category>
      <category>devops</category>
    </item>
  </channel>
</rss>
