Skip to content

Instantly share code, notes, and snippets.

@niraj-shah
Last active February 13, 2023 23:52
Show Gist options
  • Save niraj-shah/567da4146fe2912bb6b4626bc71471ea to your computer and use it in GitHub Desktop.
Save niraj-shah/567da4146fe2912bb6b4626bc71471ea to your computer and use it in GitHub Desktop.
Shell Script to update AWS EC2 Security Groups with Fixed and Current IPs for a given Port, using `aws ec2` command line
#!/bin/bash
# Shell Script to Update AWS EC2 Security Groups
# Note that existing IP rules will be deleted
# CONFIG - Only edit the below lines to setup the script
# ===============================
# AWS Profile Name
profile="name1"
# Groups, separated with spaces
group_ids="sg-xxx sg-yyy"
# Fixed IPs, separated with spaces
fixed_ips="1.1.1.1/32 2.2.2.2/32";
# Port
port=22;
# DO NOT EDIT BELOW THIS LINE UNLESS YOU KNOW WHAT YOU ARE DOING
# ===============================
# Loop through groups
for group_id in $group_ids
do
# Display group name
echo -e "\033[34m\nModifying Group: ${group_id}\033[0m";
# Get existing IP rules for group
ips=$(aws ec2 --profile=$profile describe-security-groups --filters Name=ip-permission.to-port,Values=$port Name=ip-permission.from-port,Values=$port Name=ip-permission.protocol,Values=tcp --group-ids $group_id --output text --query 'SecurityGroups[*].{IP:IpPermissions[?ToPort==`'$port'`].IpRanges}' | sed 's/IP //g');
# Loop through IPs
for ip in $ips
do
echo -e "\033[31mRemoving IP: $ip\033[0m"
# Delete IP rules matching port
aws ec2 revoke-security-group-ingress --profile=$profile --group-id $group_id --protocol tcp --port $port --cidr $ip
done
# Get current public IP address
myip=$(curl -s https://api.ipify.org);
echo -e "\033[32mSetting Current IP: ${myip}\033[0m"
# Add current IP as new rule
aws ec2 authorize-security-group-ingress --profile=$profile --protocol tcp --port $port --cidr ${myip}/32 --group-id $group_id
# Loop through fixed IPs
for ip in $fixed_ips
do
echo -e "\033[32mSetting Fixed IP: ${ip}\033[0m"
# Add fixed IP rules
aws ec2 authorize-security-group-ingress --profile=$profile --protocol tcp --port $port --cidr ${ip} --group-id $group_id
done
done
@piraka9011
Copy link

With the AWS CLI v2, you might need to redirect the output of the aws commands so that it doesn't open a less page for the results. (ex. for ignoring all output >/dev/null 2>&1)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment