Get Consultation Now!

Edit Template

Installing and Configuring the AWS CLI on a Red Hat Linux EC2 Instance

Overview

The AWS Command Line Interface (AWS CLI) is a powerful tool that lets you manage AWS services directly from your terminal, offering a fast, scriptable alternative to the AWS Management Console. In this guide, you’ll set up the AWS CLI on a Red Hat Linux Amazon EC2 instance, configure it with IAM credentials, and use it to interact with AWS Identity and Access Management (IAM). This setup is perfect for automating tasks, managing cloud resources, or learning AWS administration.

By following this step-by-step process, you’ll gain hands-on experience with SSH, CLI installation, and IAM interaction—skills essential for DevOps, system administration, and cloud engineering roles.

Prerequisites

Before you begin, ensure you have:

  • An AWS Account: Sign up at aws.amazon.com if needed.
  • EC2 Instance: A running Red Hat Linux EC2 instance (provided by your lab or created manually).
  • Tools:
    • Terminal (macOS/Linux) or PuTTY (Windows).
    • A PEM/PPK key file for SSH access.
  • Permissions: Ability to launch EC2 instances and manage IAM in your AWS account.
  • AWS Services Used: EC2, IAM, VPC.

Step-by-Step Guide

Step 1: Launch or Access a Red Hat Linux EC2 Instance

Why: Red Hat Linux doesn’t come with the AWS CLI pre-installed, making it a great learning environment.

  1. Via AWS Console:
    • Go to EC2 > Instances in the AWS Management Console.
    • Launch a new instance if needed:
      • AMI: Search for “Red Hat Enterprise Linux” (e.g., RHEL 8).
      • Instance Type: t2.micro (Free Tier eligible).
      • Key Pair: Create or use an existing key pair (e.g., labsuser.pem).
      • Security Group: Allow SSH (port 22) from your IP.
    • Note the Public IP (e.g., 54.123.45.67).
  2. Lab Provided Instance:
    • If using a lab, locate the Public IP and download the PEM/PPK file from the “Details” section.

Step 2: Connect to the EC2 Instance via SSH

Why: SSH provides secure access to your instance for CLI installation and configuration.

  • macOS/Linux: bashCollapseWrapCopychmod 400 labsuser.pem ssh -i labsuser.pem ec2-user@54.123.45.67
    • Type yes to accept the host key if prompted.
  • Windows (PuTTY):
    • Open PuTTY.
    • Load labsuser.ppk under Connection > SSH > Auth > Credentials.
    • Enter the Public IP in Host Name and connect.

Step 3: Install the AWS CLI on Red Hat Linux

Why: Installing the CLI enables command-line control of AWS services.

  1. Download the AWS CLI: bashCollapseWrapCopycurl "https://awscli.amazonaws.com/awscli-exe-linux-x86_64.zip" -o "awscliv2.zip"
  2. Unzip the Package: bashCollapseWrapCopyunzip -u awscliv2.zip
    • If unzip isn’t installed: bashCollapseWrapCopysudo yum install unzip -y
  3. Install the CLI: bashCollapseWrapCopysudo ./aws/install
  4. Verify Installation: bashCollapseWrapCopyaws --version
    • Expected output: aws-cli/2.x.x Python/3.x.x Linux/….
    • Test help: aws help (press q to exit).

Terraform Option: To automate EC2 setup with AWS CLI pre-installed:

hclCollapseWrapCopy

resource "aws_instance" "redhat" { ami = "ami-0xxxxxx" # Replace with RHEL AMI ID instance_type = "t2.micro" key_name = "labsuser" user_data = <<-EOF #!/bin/bash curl "https://awscli.amazonaws.com/awscli-exe-linux-x86_64.zip" -o "awscliv2.zip" unzip -u awscliv2.zip sudo ./aws/install EOF }

Step 4: Configure the AWS CLI with IAM Credentials

Why: Credentials link the CLI to your AWS account for secure access.

  1. Obtain IAM Credentials:
    • In the AWS Console, go to IAM > Users.
    • Select or create a user (e.g., awsstudent).
    • Under Security credentials, create an access key. Note the Access Key ID and Secret Access Key.
  2. Run Configuration: bashCollapseWrapCopyaws configure
    • Enter:
      • AWS Access Key ID: (e.g., AKIA…).
      • AWS Secret Access Key: (e.g., xxxx…).
      • Default region name: us-west-2 (or your lab’s region).
      • Default output format: json.
  3. Verify Configuration: bashCollapseWrapCopyaws iam list-users
    • A JSON list of IAM users confirms success.

Step 5: Interact with IAM Using the AWS CLI

Why: Testing CLI commands builds confidence in managing AWS resources.

  1. List Policies: bashCollapseWrapCopyaws iam list-policies --scope Local
    • Filters for customer-managed policies like lab_policy.
  2. Retrieve a Policy Document:
    • Find the policy ARN and version (e.g., from list-policies output).
    • Example: bashCollapseWrapCopyaws iam get-policy-version --policy-arn arn:aws:iam::038946776283:policy/lab_policy --version-id v1 > lab_policy.json
  3. View the File: bashCollapseWrapCopycat lab_policy.json

Real-World Use Cases

  • Automation: Script EC2 instance launches or S3 backups using the CLI in CI/CD pipelines (e.g., Jenkins, GitHub Actions).
  • Security Management: Audit IAM policies or rotate access keys programmatically for compliance.
  • Multi-Account Management: Use CLI profiles (aws configure –profile dev) to manage multiple AWS accounts.

Extending the Setup:

  • Integrate with AWS Systems Manager for centralized instance management.
  • Use the CLI with CloudFormation to deploy infrastructure as code.
  • Automate CLI commands via cron jobs for scheduled tasks.

Troubleshooting

Issue 1: “Command Not Found” After Installation

  • Cause: Installation path issue.
  • Solution: Run /usr/local/bin/aws –version to check. If missing, reinstall with sudo ./aws/install –bin-dir /usr/local/bin –install-dir /usr/local/aws-cli.

Issue 2: “Unable to Connect to AWS”

  • Cause: Incorrect credentials or region.
  • Solution: Verify ~/.aws/credentials and ~/.aws/config files. Re-run aws configure.

Issue 3: SSH Connection Refused

  • Cause: Security group or key file issue.
  • Solution: Ensure port 22 is open in the EC2 security group. Check chmod 400 labsuser.pem.

Issue 4: “Permission Denied” on CLI Commands

  • Cause: IAM user lacks permissions.
  • Solution: Attach a policy (e.g., IAMReadOnlyAccess) via the IAM Console.

Debugging Tip: Use –debug with CLI commands (e.g., aws iam list-users –debug) for detailed logs.

Conclusion & Best Practices

You’ve installed and configured the AWS CLI on a Red Hat Linux EC2 instance, connected it to your AWS account, and used it to manage IAM—all key skills for cloud administration. To optimize:

  • Store credentials securely using AWS Secrets Manager instead of plaintext.
  • Regularly update the CLI (awscli –update) for new features.
  • Use IAM roles with EC2 instances instead of access keys for production.

With this setup, you’re equipped to automate and manage AWS resources efficiently—ready to tackle real-world cloud challenges!

Leave a Reply

Your email address will not be published. Required fields are marked *

Transform Your Business Today

Stay ahead of the curve! Subscribe for the latest updates, exclusive offers, and industry insights delivered straight to your inbox.
You have been successfully Subscribed! Ops! Something went wrong, please try again.
Stay ahead of the curve! Subscribe for the latest updates, exclusive.

Quick Links

Home

Features

Pricing

About Us

Blog

Contact Us

Solutions

Consulting Services

Financial Planning

Digital Transformation

Marketing Strategy

Project Management

HR Solutions

Resources

Financial Management

Human Resources

Project Management

Legal Resources

Marketing Tools

Business Analytics

Legal

Privacy Policy

Terms of Service

Cookie Policy

GDPR Compliance

Accessibility Statement

© 2024 Created with Royal Elementor Addons