システムにパラメータを追加します。 詳細は次のリンクを参照してください。 https://docs.aws.amazon.com/ja_jp/cli/latest/reference/ssm/put-parameter.html
aws ssm put-parameter --name build_ssh_key --type String --value |
Go, private repositories and AWS CodeBuild – Adrian Hesketh : http://adrianhesketh.com/2018/05/02/go-private-repositories-and-aws-codebuild/ |
aws ssm put-parameter --name "/univrs/data/url" --type "String" --value "univrs.io" |
AWS : http://ardeshir.org/ssm |
aws ssm put-parameter --region |
IT Tips and Memory Joggers!: Parameter Store in AWS : http://awhite.blogspot.com/2018/02/parameter-store-in-aws.html |
aws ssm put-parameter --name "/example/ |
Jumpbox Security Part#2 : http://blog.rubiconred.com/removing-ssh-pem-files-from-jump-boxes-in-aws-part-2-getting-it-working/ |
aws ssm put-parameter --name |
Configure your CloudFormation managed infrastructure with Parameter Store and CodePipeline | cloudonaut : http://cloudonaut.io/configure-your-cloudformation-managed-infrastructure-with-parameter-store-and-codepipeline/ |
aws ssm put-parameter --name sls.deploymentBucket --type String --value your-bucket-name |
serverless frameworkでpublic repositoryに含めるべきではないデプロイ情報を扱う - Logic Dice : http://d.hatena.ne.jp/a-hisame/20180720/1532068081 |
aws ssm put-parameter \ |
EC2 Systems ManagerのParameter Storeがバージョニングをサポートしました | Developers.IO : http://dev.classmethod.jp/cloud/aws/amazon-ec2-systems-manager-parameter-store-adds-versioning-support/ |
aws ssm put-parameter \ |
クライアント認証とPath Based Routingが必要なサーバをAWSで構築(後編:App層) - Medley Developer Blog : http://developer.medley.jp/entry/2017/08/24/120000_02 |
aws ssm put-parameter --name "db.password" --type "SecureString" --value "insecure" |
wcurrie/aws-ssm-demo Spike pulling a db password from AWS EC2 Parameter Store by @wcurrie - Repository | DevHub.io : http://devhub.io/repos/wcurrie-aws-ssm-demo |
aws ssm put-parameter --name 'password' --type "SecureString" --value 'a value |
put-parameter — AWS CLI 1.16.13 Command Reference : http://docs.aws.amazon.com/cli/latest/reference/ssm/put-parameter.html |
aws ssm put-parameter --name /datomic-shared/prod/deploy-monitor/bot-token --value |
Ions Reference | Datomic : http://docs.datomic.com/cloud/ions/ions-reference.html |
aws ssm put-parameter --name "/api/qa/THE_MIGHTY_QUEUE" --value " |
ssm put-parameter fetches external URLs if value is URL 揃 Issue #3076 揃 aws/aws-cli 揃 GitHub : http://github.com/aws/aws-cli/issues/2507 |
aws ssm put-parameter --name MY_API_MONGODB_URL --type SecureString --value |
: http://hackernoon.com/tdd-means-zen-along-with-serverless-means-nirvana-a39a76ee8e63 |
aws ssm put-parameter --name CBBDriveLicense \ |
Automating installation and removal of Cloudberry Drive for AWS EC2 AutoScaling groups | Knowledge base : http://kb.cloudberrylab.com/kb1080/ |
aws ssm put-parameter \ |
psenv 0.4.0 on Rubygems - Libraries.io : http://libraries.io/rubygems/psenv |
aws ssm put-parameter --cli-input-json ' |
AWS Lambda environment variables → AWS SSM parameters in one (long) bash line : http://madhead.me/post/oneliners-1/ |
aws ssm put-parameter --name |
SSM Parameter Store for keeping secrets in a structured way : http://medium.com/@tdi/ssm-parameter-store-for-keeping-secrets-in-a-structured-way-53a25d48166a |
aws ssm put-parameter --name general.license-code --value |
Managing Secrets for Amazon ECS Applications Using Parameter Store and IAM Roles for Tasks | Noise : http://noise.getoto.net/2017/01/31/managing-secrets-for-amazon-ecs-applications-using-parameter-store-and-iam-roles-for-tasks/ |
aws ssm put-parameter --name '/application/message' --value 'Hello AWS-SSM World |
Package - aws-ssm-inject-params : http://npm.taobao.org/package/aws-ssm-inject-params |
aws ssm put-parameter --name "/dev/app/secret" --value "dev_secret" --type SecureString |
ssm-parameter-store 揃 PyPI : http://pypi.org/project/ssm-parameter-store/ |
aws ssm put-parameter --name "/key/name" --value "text1 |
AWS Systems Manager(SSM) パラメータストアに改行コードを含むデータを保存するときの方法 : http://qiita.com/pdsyun/items/ca31834e864a09cd828f |
aws ssm put-parameter --name IAMRole --type String --value xxxxx |
parameter storeで環境変数管理したら便利だった - selmertsxの素振り日記 : http://selmertsx.hatenablog.com/entry/2017/12/25/200119 |
aws ssm put-parameter --type SecureString --key-id alias/your-well-known-iam-kms-alias --name "/project/mail/EmailPassword" --value |
amazon cloudformation - Referring to an existing resource in CF Template - Server Fault : http://serverfault.com/questions/839723/referring-to-an-existing-resource-in-cf-template |
aws ssm put-parameter --name /bar/foo --value foo --type String |
Serverless v1.22 - CLI-based plugin discovery, encrypted variables support and new provider SpotInst : http://serverless.com/blog/serverless-v1.22.0/ |
aws ssm put-parameter --name |
Lookups — stacker 1.4.1 documentation : http://stacker.readthedocs.io/en/latest/lookups.html |
aws ssm put-parameter --key-id |
terraform - (リモート)状態ファイルのテラフォームとクリアテキストのパスワード : http://stackoverrun.com/ja/q/11576334 |
aws ssm put-parameter --name "HostedZoneName" --type "String" --value "stelligent.com." |
Using Parameter Store with AWS CodePipeline – Stelligent : http://stelligent.com/2017/03/09/using-parameter-store-with-aws-codepipeline/ |
aws ssm put-parameter --name /prod/redash/REDASH_DATABASE_URL --value |
AWS上のパスワードちゃんと管理できてますか?AWSパラメータストアで秘密情報を安全に管理する方法 · カウル Tech Blog : http://techblog.housmart.co.jp/2018/03/22/managing-secrets-with-parameter-store/ |
aws ssm put-parameter --name |
Clare Liguoriさんのツイート: "Yay! This means you can now store your secrets in Secrets Manager, and use them in services that already integrated with Parameter Store (hi CodeBuild, CloudFormation, and others!)… https://t.co/2GmGlPwBNP" : http://twitter.com/clare_liguori/status/1023966300840714241 |
aws ssm put-parameter \ |
typicalrunt.me » Storing Secrets with AWS ParameterStore : http://typicalrunt.me/2017/04/07/storing-secrets-with-aws-parameterstore/ |
aws ssm put-parameter --cli-input-json ' |
Aero meets SSM : http://www.1729.org.uk/posts/aero-ssm/ |
aws ssm put-parameter --name |
AWS Automation Documents » ADMIN Magazine : http://www.admin-magazine.com/Archive/2018/45/AWS-Automation-Documents/(offset)/12 |
aws ssm put-parameter --name 'common.base_ami' --value 'ami-c7ee5ca8' --type String --region eu-central-1 |
Digging into DevOps with AWS and Terraform - Cloudreach France : http://www.cloudreach.com/fr/blog/digging-into-devops-with-aws-and-terraform/ |
aws ssm put-parameter --name "/dynatrace/lambda/sample/DT_LAMBDA_OPTIONS" \ |
Deploying and Monitoring a Lambda Function in less than 8 Minutes | Dynatrace blog : http://www.dynatrace.com/news/blog/deploying-your-lambda-function-and-dynatrace-in-8-minutes/ |
aws ssm put-parameter --name |
Python Script AWS Parameter Store | Amazon Web Services | Python | Software Architecture : http://www.freelancer.com/projects/software-architecture/python-script-aws-parameter-store/ |
aws ssm put-parameter --name |
AWS Systems Manager Parameter Store – IT From All Angles : http://www.itfromallangles.com/2018/07/aws-systems-manager-parameter-store/ |
aws ssm put-parameter \ |
ECS Parameter Store Synchroniser | LinkedIn : http://www.linkedin.com/pulse/ecs-parameter-store-synchroniser-niall-creech |
aws ssm put-parameter --name '/myapp/production/RDS_PASSWORD' \ |
AWS Parameter Storeから取得したパラメータを環境変数に設定するgemを作った - エムスリーテックブログ : http://www.m3tech.blog/entry/aws-ssm-env-gem |
aws ssm put-parameter --name |
Advanced AWS Lambda Python Function Deployment with Serverless – MyDatahack : http://www.mydatahack.com/advanced-aws-lambda-python-function-deployment-with-serverless/ |
aws ssm put-parameter performs an HTTP GET request when the value param is an url |
What are some poor design decisions made by Amazon Web Services? - Quora : http://www.quora.com/What-are-some-poor-design-decisions-made-by-Amazon-Web-Services |
aws ssm put-parameter --name /MySystem/Prod/DB/User --type String --value myuser |
20180725 AWS Black Belt Online Seminar AWS Systems Manager : http://www.slideshare.net/AmazonWebServicesJapan/20180723-aws-black-belt-online-seminar-aws-systems-manager |
aws ssm put-parameter \ |
Secure credentials for ECS tasks using the EC2 Parameter Store : http://www.whaletech.co/2017/08/01/Secure-Credentials-for-ECS-Tasks.html |