Blog

03/06/2019

How to create AWS ec2 key using Ansible



I wanted to create Amazon EC2 Key pair using Ansible tool. I do not want to use AWS CLI. Is it possible to create AWS ec2 key using Ansible?

You need to use ec2_key module of Ansible. This module has a dependency on python-boto version 2.5 or above. boto is nothing but a python interface to Amazon Web Services using API. You can use boto for services like Amazon S3, Amazon EC2 and others. In short, you need ansible installed along with boto module. Let us see how to install boto and use it with Ansbile.

Step 1 – Install latest version of Ansible on Ubuntu Linux

You must configure the PPA on your system to install the latest version of ansible. To manage the repositories that you install software from various PPA (Personal Package Archives). It allow you to upload Ubuntu source packages to be built and published as an apt repository by Launchpad. Type the following apt-get command or apt command:
$ sudo apt update
$ sudo apt upgrade
$ sudo apt install software-properties-common

Next add ppa:ansible/ansible to your system’s Software Source:
$ sudo apt-add-repository ppa:ansible/ansible
Update your repos and install ansible:
$ sudo apt update
$ sudo apt install ansible

Install boto:
$ pip3 install boto3

A note about installing Ansible on CentOS/RHEL 7.x

You need to setup EPEL repo on a CentOS and RHEL 7.x along with the yum command:
$ cd /tmp
$ wget https://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm
$ ls *.rpm
$ sudo yum install epel-release-latest-7.noarch.rpm
$ sudo yum install ansible

Install boto:
$ pip install boto3

Step 2 – Configure boto

You need to setup AWS credentials/API keys. See “AWS Security Credentials” documents on how to create a programmatic API key. Create a directory called ~/.aws using the mkdir command and setup API keys:
$ mkdir -pv ~/.aws/
$ vi ~/.aws/credentials

[default]
aws_access_key_id = YOUR-ACCESS-KEY-HERE
aws_secret_access_key = YOUR-SECRET-ACCESS-KEY-HERE

[default] aws_access_key_id = YOUR-ACCESS-KEY-HERE aws_secret_access_key = YOUR-SECRET-ACCESS-KEY-HERE

Also setup default AWS region:
$ vi ~/.aws/config
Sample outputs:

[default]
region = us-west-1

[default] region = us-west-1

Test your boto setup with API by creating a simple python program named test-boto.py:

#!/usr/bin/python3
# A simple program to test boto and print s3 bucket names
import boto3
t = boto3.resource('s3')
for b in t.buckets.all():
    print(b.name)

#!/usr/bin/python3 # A simple program to test boto and print s3 bucket names import boto3 t = boto3.resource(‘s3’) for b in t.buckets.all(): print(b.name)

Run it as follows:
$ python3 test-boto.py
Sample outputs:

nixcraft-images
nixcraft-backups-cbz
nixcraft-backups-forum

The output confirmed that Python-boto working correctly using AWS API.

Step 3 – Create AWS ec2 key using Ansible

Create a playbook named ec2.key.yml as follows:

---
- hosts: local
  connection: local
  gather_facts: no
  tasks:
 
      - name: Create a new EC2 key
        ec2_key:
            name: nixcraft-key
            region: us-west-1
        register: ec2_key_result
 
      - name: Save private key
        copy: content="{{ ec2_key_result.key.private_key }}" dest="./aws.nixcraft.pem" mode=0600
        when: ec2_key_result.changed

— – hosts: local connection: local gather_facts: no tasks: – name: Create a new EC2 key ec2_key: name: nixcraft-key region: us-west-1 register: ec2_key_result – name: Save private key copy: content="{{ ec2_key_result.key.private_key }}" dest="./aws.nixcraft.pem" mode=0600 when: ec2_key_result.changed

kbd { display: inline-block; margin: 0 .1em; padding: .1em .6em; font-family: Arial,”Helvetica Neue”,Helvetica,sans-serif; font-size: 11px; line-height: 1.4; color: #242729; text-shadow: 0 1px 0 #FFF; background-color: #e1e3e5; border: 1px solid #adb3b9; border-radius: 3px; box-shadow: 0 1px 0 rgba(12,13,14,0.2), 0 0 0 2px #FFF inset; white-space: nowrap;}

Where,

  • ec2_key: – Maintains ec2 key pair.
  • name: nixcraft_key – Name of the key pair.
  • region: us-west-1The AWS region to use.
  • register: ec2_key_result : Save result of generated key to ec2_key_result variable.
  • copy: content="{{ ec2_key_result.key.private_key }}" dest="./aws.nixcraft.pem" mode=0600 : Sets the contents of ec2_key_result.key.private_key to a file named aws.nixcraft.pem in the current directory. Set mode of the file to 0600 (unix file permissions).
  • when: ec2_key_result.changed : Only save when ec2_key_result changed is set to true. We don’t want to overwrite our key file.

You must create hosts file as follows too:

[local]
localhost

Run your playbook as follows:
$ ansible-playbook -i hosts ec2.key.yml

At the end you should have a private key named aws.nixcraft.pem that you can use with AWS EC2. To view your key use the cat command:
$ cat aws.nixcraft.pem
If you have EC2 VM, use it as follows:
$ ssh -i aws.nixcraft.pem user@ec2-vm-dns-name

Finding out info about python data structure variable names such as ec2_key_result.changed and ec2_key_result.key.private_key

You must be wondering how come I am using variable names such as ec2_key_result.changed and ec2_key_result.key.private_key. Are they defined somewhere? Values are returned from API calls. Simply run the ansible-playbook command with the -v option to see such info:
$ ansible-playbook -v -i hosts ec2.key.yml

How do I delete a key?

Use the following ec2-key-delete.yml:

---
- hosts: local
  connection: local
  gather_facts: no
  tasks:
 
      - name: Delete a EC2 key
        ec2_key:
            name: nixcraft-key
            region: us-west-1
#  absent means delete keypair
            state: absent

— – hosts: local connection: local gather_facts: no tasks: – name: Delete a EC2 key ec2_key: name: nixcraft-key region: us-west-1 # absent means delete keypair state: absent

Run it as follows:
$ ansible-playbook -i hosts ec2-key-delete.yml

References:

(adsbygoogle = window.adsbygoogle || []).push({});

Posted by: SXI ADMIN

The author is the creator of nixCraft and a seasoned sysadmin, DevOps engineer, and a trainer for the Linux operating system/Unix shell scripting. Get the latest tutorials on SysAdmin, Linux/Unix and open source topics via RSS/XML feed or weekly email newsletter.

14/08/2019

How to KVM, QEMU start or stop virtual machine from command line (CLI)

KVM or Kernel Based Virtual Machine is a popular virtualization technology. It allows you to run virtual guest machines over a host machine. To start...
14/08/2019

How to Docker backup Saving and restoring your volumes

Running a Docker volume backup First, we spin up a temporary container, and we mount the backup folder and the target Docker volume to this container....
12/08/2019

How to Start and Enable Firewalld on CentOS 7

In this article, we discuss how to start and enable firewalld. It is highly recommended that you have a firewall protecting your server.Pre-Flight CheckThese...