# SSM get-parameter Reference: https://medium.com/@haha1811/aws-%E6%9C%AC%E5%9C%B0%E7%AB%AF-pem-key-%E6%89%BE%E4%B8%8D%E5%88%B0-%E8%A9%B2%E6%80%8E%E9%BA%BC%E8%BE%A6-c59f4ebd085e 此方法僅適用於Cloudformation建立的Key 存放於System Manager的Parameter Store 開啟Cloud Shell輸入此指令: ``` aws ssm get-parameter --name /ec2/keypair/<key-ID> --with-decryption --query Parameter.Value --output text > fiona-test-key.pem ``` 即可Redownload EC2 Key Pair # AWSSupport-ResetAccess SSM Automation執行ResetAccess Runbook Create new key到Parameter Store中 Reference: https://docs.aws.amazon.com/zh_tw/systems-manager-automation-runbooks/latest/userguide/automation-awssupport-resetaccess.html 運行此自動化 ![image](https://hackmd.io/_uploads/rk7O-7QrT.png) 成功建立new key(openssh) 存放於SSM Parameter Store ![image](https://hackmd.io/_uploads/B17HuMXBp.png) 內容: ![image](https://hackmd.io/_uploads/H14pYG7Sp.png) Cost: https://aws.amazon.com/tw/systems-manager/pricing/ ![image](https://hackmd.io/_uploads/r1wsLmXHp.png) ![image](https://hackmd.io/_uploads/ryklP7QST.png) # Backup EC2 Key Pair to Parameter Store 可將Key上傳至SSM Parameter Store中做備份避免Key遺失的情況無法挽救 ### Upload 進入Systems Manager>Parameter Store ![image](https://hackmd.io/_uploads/r1mLHbHK6.png) Create Parameter 輸入名稱並將Private Key內容填入Value ![image](https://hackmd.io/_uploads/SJ-AB-SFp.png) ### Download 進入Parameter Store後可以直接點選備份好的Parameter查看內容 並可直接將Private Key Value複製下來存成.pem ![image](https://hackmd.io/_uploads/r148LWBtT.png) 或是開啟Cloud Shell使用指令查看Parameter Value並輸出檔案 ``` #查看Parameter Detail aws ssm get-parameter --name fiona-key-backup --with-decryption #Query Paramter Value aws ssm get-parameter --name fiona-key-backup --with-decryption --query "Parameter.Value" #Output Parameter Value aws ssm get-parameter --name fiona-key-backup --with-decryption --query "Parameter.Value" --output text > fiona-test.pem ``` 查看Parameter Detail ![image](https://hackmd.io/_uploads/HJ1dzJHFa.png) Query Paramter Value ![image](https://hackmd.io/_uploads/S1c8M1BKT.png) Output Parameter Value ![image](https://hackmd.io/_uploads/HkA_MkHKa.png) 點選Download file並輸入檔名即可下載輸出的.pem ![image](https://hackmd.io/_uploads/rJHYDWBt6.png) ![image](https://hackmd.io/_uploads/BkB3DbBt6.png)