Search through multiple AWS accounts for instance IP addresses
ip2instance iterates through multiple AWS accounts, assuming IAM Roles in each account using the STS AssumeRole function and fetches information about instances in those accounts.
Instructions on setting up these roles can be found here : https://github.com/mozilla/security/tree/master/operations/aws-security-auditor
The ip2instance configuration file is located at /etc/ip2instance.yaml . To configure ip2instance create this file and populate it with your role_session_name and roles
The role_session_name is an “identifier for the assumed role session. The session name is included as part of the AssumedRoleUser” according to the AWS Documentation
The roles is a list of ARNs of all IAM Roles in foreign AWS accounts which ip2instance should assume when searching for instances.
Here is an example configuration for two foreign AWS accounts
role_session_name: ip2instance roles: - arn:aws:iam::123456789012:role/security-audit-role-SecurityAuditRole-12XHTR13TAWGH # 293989542403 Finance - arn:aws:iam::345678901234:role/security-audit-role-SecurityAuditRole-FLGUX9CF36X6 # 345678901234 Client Frontend Development Team
ip2instance > instance-list.txt
Here’s how to build this into an RPM on a RHEL 6 derivative
sudo yum install http://ftp.linux.ncsu.edu/pub/epel/6/i386/epel-release-6-8.noarch.rpm sudo yum install rubygems ruby-devel gcc python-setuptools rpm-build sudo easy_install pip sudo gem install fpm git clone https://github.com/gene1wood/ip2instance.git cd ip2instance # This is required fpm -s python -t rpm --workdir ../ ./setup.py
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
|File Name & Checksum SHA256 Checksum Help||Version||File Type||Upload Date|
|ip2instance-1.2.2-py2-none-any.whl (6.8 kB) Copy SHA256 Checksum SHA256||py2||Wheel||Oct 30, 2015|
|ip2instance-1.2.2.tar.gz (5.0 kB) Copy SHA256 Checksum SHA256||–||Source||Oct 30, 2015|