{"id":70396,"date":"2019-01-29T06:47:57","date_gmt":"2019-01-29T06:47:57","guid":{"rendered":"https:\/\/www.whizlabs.com\/blog\/?p=69977"},"modified":"2022-06-03T04:25:02","modified_gmt":"2022-06-03T09:55:02","slug":"using-aws-systems-manager","status":"publish","type":"post","link":"https:\/\/www.whizlabs.com\/blog\/using-aws-systems-manager\/","title":{"rendered":"How to Use AWS Systems Manager to Run Commands on EC2 Instances?"},"content":{"rendered":"<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Hello AWS aspirants, hope you are doing well with your <a href=\"https:\/\/www.whizlabs.com\/blog\/prepare-aws-certified-security-specialty-exam\/\" target=\"_blank\" rel=\"noopener noreferrer\">AWS Certified Security Specialty exam preparation<\/a>. To help you with your preparation, here we bring another topic \u201cHow to use AWS Systems Manager to Run Commands on EC2 Instances\u201d with simple use case scenario. This topic addresses <\/span><i><span style=\"font-weight: 400;\">Infrastructure Security<\/span><\/i><span style=\"font-weight: 400;\"> domain highlighted in the blueprint of the AWS Certified Security Specialty exam guide. Infrastructure domain has the maximum weight i.e. 26% in the AWS Security Specialty certification exam. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">So, let\u2019s get started with a problem statement and understand the solution.<\/span><\/p>\n<blockquote>\n<p style=\"text-align: justify;\">Try Now: <a href=\"https:\/\/www.whizlabs.com\/aws-certified-security-specialty\/free-test\/\" target=\"_blank\" rel=\"noopener noreferrer\">AWS Certified Security Specialty Free Tests<\/a><\/p>\n<\/blockquote>\n<h2 style=\"text-align: justify;\">Problem Statement<\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Let\u2019s consider the following simple architecture that is adopted for hosting applications on the AWS Cloud.<\/span><\/p>\n<p style=\"text-align: justify;\"><img decoding=\"async\" class=\"wp-image-69978 size-full aligncenter\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/aws-architecture.png\" alt=\"aws architecture\" width=\"730\" height=\"306\" \/><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">So here we have the following<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">An EC2 instance running a web server in the private subnet in a VPC<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">A bastion host running in the public subnet in a VPC<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The IT Administrators normally uses the bastion host to connect and administer the web server in the private subnet.<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">But sometimes, the IT Security department could also see the bastion host as a threat and possible area of attack. So how can we reduce the surface of attack on the above architecture? <\/span><\/p>\n<h3 style=\"text-align: justify;\">Solution:\u00a0Using AWS Systems Manager to Run Commands on EC2 Instances<\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">AWS gives us the ability to use the AWS Systems Manager for this. In AWS Systems Manager, we have the Run command. So, let\u2019s look at how we can use the AWS Systems Manager to run commands to install Nginx which is a web server on a Linux EC2 Instance.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\"><strong>Step 1)<\/strong> First ensure that the AWS Systems Manager agent is running on the EC2 Instance. You can do this by attaching a boot script to install the agent when the instance is first launched. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">The agent is required to communicate with the AWS Systems Manager. Once the agent is in place, when you go to the Systems Manager, you will actually see the instance as a managed instance in the inventory in AWS Systems Manager.<\/span><\/p>\n<p style=\"text-align: justify;\"><img decoding=\"async\" class=\"aligncenter wp-image-69979 size-full\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/AWS-System-Manager-1.png\" alt=\"AWS Systems Manager \" width=\"797\" height=\"373\" \/><span style=\"font-weight: 400;\"><strong>Step 2)<\/strong> To run a command, go to the \u201cRun Command\u201d section and click on Run Command<\/span><\/p>\n<p style=\"text-align: justify;\"><img decoding=\"async\" class=\"aligncenter wp-image-69980 size-full\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/AWS-System-Manager-2.png\" alt=\"AWS Systems Manager\" width=\"797\" height=\"315\" \/><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\"><strong>Step 3)<\/strong> Next, we need to choose the type of document that needs to be run on the system<\/span><\/p>\n<p style=\"text-align: justify;\"><img decoding=\"async\" class=\"aligncenter wp-image-69981 size-full\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/AWS-System-Manager-3.png\" alt=\"AWS Systems Manager\" width=\"785\" height=\"315\" \/><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">For installing or running commands on a Linux based system, we can use the AWS-RunShellScript document<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\"><strong>Step 4)<\/strong> Next, ensure to select your target Linux machine. This is where you want to run the command<\/span><\/p>\n<p style=\"text-align: justify;\"><img decoding=\"async\" class=\"aligncenter wp-image-69982 size-full\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/AWS-Systems-Manager-4-.png\" alt=\"AWS Systems Manager\" width=\"813\" height=\"299\" \/><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\"><strong>Step 5)<\/strong> Next, in the Command parameters, specify the commands that need to be run. So here we are installing nginx which is a web server on the Linux based machine.<\/span><\/p>\n<p style=\"text-align: justify;\"><img decoding=\"async\" class=\"aligncenter wp-image-69983 size-full\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/AWS-Systems-Manager-5.png\" alt=\"AWS Systems Manager\" width=\"778\" height=\"386\" \/><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\"><strong>Step 6)<\/strong> You can then specify a timeout for the command and then run the command<\/span><\/p>\n<p style=\"text-align: justify;\"><img decoding=\"async\" class=\"aligncenter wp-image-69984 size-full\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/AWS-Systems-Manager-6.png\" alt=\"AWS Systems Manager\" width=\"781\" height=\"425\" \/>\u00a0 \u00a0<span style=\"font-weight: 400;\">Once the Run command is sent, you will get the relevant notification<\/span><\/p>\n<p style=\"text-align: justify;\"><img decoding=\"async\" class=\"aligncenter wp-image-69985 size-full\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/AWS-Systems-Manager-7.png\" alt=\"AWS Systems Manager\" width=\"787\" height=\"308\" \/><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Once the command has run successfully you will get a Success overall status<\/span><\/p>\n<p style=\"text-align: justify;\"><img decoding=\"async\" class=\"aligncenter wp-image-69986 size-full\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/AWS-Systems-Manager-8.png\" alt=\"AWS Systems Manager\" width=\"781\" height=\"275\" \/><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Once you go to the server, you will now see the web server installed.<\/span><\/p>\n<h4 style=\"text-align: justify;\"><img decoding=\"async\" class=\"aligncenter wp-image-69987 size-full\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/AWS-Systems-Manager-9.png\" alt=\"AWS Systems Manager\" width=\"809\" height=\"245\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/AWS-Systems-Manager-9.png 809w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/AWS-Systems-Manager-9-300x91.png 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/AWS-Systems-Manager-9-768x233.png 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/AWS-Systems-Manager-9-640x194.png 640w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/AWS-Systems-Manager-9-681x206.png 681w\" sizes=\"(max-width: 809px) 100vw, 809px\" \/><\/h4>\n<blockquote>\n<p style=\"text-align: justify;\">Other Helpful Resources<br \/>\n<a class=\"in-cell-link\" href=\"https:\/\/www.whizlabs.com\/blog\/using-central-cloudtrail-s3-bucket-for-multiple-aws-accounts\/\" target=\"_blank\" rel=\"noopener noreferrer\">How to Use a Central CloudTrail S3 Bucket for Multiple AWS Accounts?<\/a><br \/>\n<span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;How to Set Right Inbound &amp; Outbound Rules for Security Groups and NACLs?&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:268734,&quot;4&quot;:[null,2,16777215],&quot;5&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;6&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;7&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;8&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;10&quot;:2,&quot;11&quot;:4,&quot;14&quot;:[null,2,1136076],&quot;15&quot;:&quot;Arial&quot;,&quot;21&quot;:1}\" data-sheets-formula=\"=HYPERLINK(&quot;https:\/\/www.whizlabs.com\/blog\/set-right-rules-for-security-groups-and-nacls\/&quot;,&quot;How to Set Right Inbound &amp; Outbound Rules for Security Groups and NACLs?&quot;)\"><a class=\"in-cell-link\" href=\"https:\/\/www.whizlabs.com\/blog\/set-right-rules-for-security-groups-and-nacls\/\" target=\"_blank\" rel=\"noopener noreferrer\">How to Set Right Inbound &amp; Outbound Rules for Security Groups and NACLs?<\/a><\/span><br \/>\n<span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Working With IAM and Bucket Policies&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:268476,&quot;5&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;6&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;7&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;8&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;10&quot;:2,&quot;14&quot;:[null,2,1136076],&quot;15&quot;:&quot;arial,sans,sans-serif&quot;,&quot;21&quot;:1}\" data-sheets-formula=\"=HYPERLINK(&quot;https:\/\/www.whizlabs.com\/blog\/iam-and-bucket-policies\/&quot;,&quot;Working With IAM and Bucket Policies&quot;)\"><a class=\"in-cell-link\" href=\"https:\/\/www.whizlabs.com\/blog\/iam-and-bucket-policies\/\" target=\"_blank\" rel=\"noopener noreferrer\">Working With IAM and Bucket Policies<\/a><\/span><br \/>\n<span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;How to Grant Access to AWS Resources to the Third Party via Roles &amp; External Id?&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:268734,&quot;4&quot;:[null,2,16777215],&quot;5&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;6&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;7&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;8&quot;:{&quot;1&quot;:[{&quot;1&quot;:2,&quot;2&quot;:0,&quot;5&quot;:[null,2,0]},{&quot;1&quot;:0,&quot;2&quot;:0,&quot;3&quot;:3},{&quot;1&quot;:1,&quot;2&quot;:0,&quot;4&quot;:1}]},&quot;10&quot;:2,&quot;11&quot;:4,&quot;14&quot;:[null,2,1136076],&quot;15&quot;:&quot;Arial&quot;,&quot;21&quot;:1}\" data-sheets-formula=\"=HYPERLINK(&quot;https:\/\/www.whizlabs.com\/blog\/granting-access-to-aws-resources-to-third-party\/&quot;,&quot;How to Grant Access to AWS Resources to the Third Party via Roles &amp; External Id?&quot;)\"><a class=\"in-cell-link\" href=\"https:\/\/www.whizlabs.com\/blog\/granting-access-to-aws-resources-to-third-party\/\" target=\"_blank\" rel=\"noopener noreferrer\">How to Grant Access to AWS Resources to the Third Party via Roles &amp; External Id?<\/a><\/span><\/p>\n<\/blockquote>\n<h4 style=\"text-align: justify;\">Summary<\/h4>\n<ul style=\"text-align: justify;\">\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The AWS Systems Manager service can be used to run commands on EC2 Instances<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Consider this rather than using the bastion host to work with EC2 Instances and opening ports which can make your architecture vulnerable to attacks<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">You need to ensure the SSM agent is installed on the machine for allowing the Run command to work.<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Hope this problem statement has helped you understand how to use AWS systems manager to run commands on EC2 instances. It is important to cover this topic for your AWS Certified Security Specialty exam preparation. Understanding this topic will help you cover a big weight of the exam objectives and thus will pass the exam with good scores. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Whizlabs blog, as one of the <a href=\"https:\/\/blog.feedspot.com\/aws_blogs\/\" target=\"_blank\" rel=\"noopener noreferrer\">top AWS blogs<\/a>, is dedicated to helping AWS professionals in their certification exam preparation. If you are stuck with any topic, just mention in the comment box, we\u2019ll cover that for you.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Also, our practice tests and online courses are considered one of the best in the industry. If you think you are done with your preparation, just try <a href=\"https:\/\/www.whizlabs.com\/aws-certified-security-specialty\/practice-test\/\" target=\"_blank\" rel=\"noopener noreferrer\">AWS Security Specialty practice tests<\/a> and check your preparation level. <\/span><\/p>\n<p style=\"text-align: justify;\"><i><span style=\"font-weight: 400;\">Having any query in your AWS Security Specialty exam preparation? Write in <a href=\"http:\/\/ask.whizlabs.com\/c\/aws\" target=\"_blank\" rel=\"noopener noreferrer\">Whizlabs Forum<\/a>, and get it resolved by the certified experts. <\/span><\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hello AWS aspirants, hope you are doing well with your AWS Certified Security Specialty exam preparation. To help you with your preparation, here we bring another topic \u201cHow to use AWS Systems Manager to Run Commands on EC2 Instances\u201d with simple use case scenario. This topic addresses Infrastructure Security domain highlighted in the blueprint of the AWS Certified Security Specialty exam guide. Infrastructure domain has the maximum weight i.e. 26% in the AWS Security Specialty certification exam. So, let\u2019s get started with a problem statement and understand the solution. Try Now: AWS Certified Security Specialty Free Tests Problem Statement Let\u2019s [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":69991,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4],"tags":[230,234,1679,1749],"class_list":["post-70396","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-aws-certifications","tag-aws-certified-security-specialty","tag-aws-certified-security-specialty-exam-preparation","tag-aws-systems-manager-to-run-commands","tag-run-commands-on-ec2-instances"],"uagb_featured_image_src":{"full":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/using-aws-systems-manager.png",600,315,false],"thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/using-aws-systems-manager-150x150.png",150,150,true],"medium":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/using-aws-systems-manager-300x158.png",300,158,true],"medium_large":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/using-aws-systems-manager.png",600,315,false],"large":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/using-aws-systems-manager.png",600,315,false],"1536x1536":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/using-aws-systems-manager.png",600,315,false],"2048x2048":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/using-aws-systems-manager.png",600,315,false],"profile_24":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/using-aws-systems-manager.png",24,13,false],"profile_48":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/using-aws-systems-manager.png",48,25,false],"profile_96":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/using-aws-systems-manager.png",96,50,false],"profile_150":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/using-aws-systems-manager.png",150,79,false],"profile_300":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/using-aws-systems-manager.png",300,158,false],"tptn_thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/using-aws-systems-manager-250x250.png",250,250,true],"web-stories-poster-portrait":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/using-aws-systems-manager.png",600,315,false],"web-stories-publisher-logo":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/using-aws-systems-manager.png",96,50,false],"web-stories-thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2019\/01\/using-aws-systems-manager.png",150,79,false]},"uagb_author_info":{"display_name":"Pavan Gumaste","author_link":"https:\/\/www.whizlabs.com\/blog\/author\/pavan\/"},"uagb_comment_info":2,"uagb_excerpt":"Hello AWS aspirants, hope you are doing well with your AWS Certified Security Specialty exam preparation. To help you with your preparation, here we bring another topic \u201cHow to use AWS Systems Manager to Run Commands on EC2 Instances\u201d with simple use case scenario. This topic addresses Infrastructure Security domain highlighted in the blueprint of&hellip;","_links":{"self":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/70396","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/comments?post=70396"}],"version-history":[{"count":3,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/70396\/revisions"}],"predecessor-version":[{"id":82544,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/70396\/revisions\/82544"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media\/69991"}],"wp:attachment":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media?parent=70396"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/categories?post=70396"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/tags?post=70396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}