Introduction to AWS Command-Line-Interface (CLI)

By: (plus.google.com) +David Herron; Date: April 7, 2018

Tags: Amazon Web Services

The AWS CLI is a tool you install on your laptop making it easier to access Amazon Web Services infrastructure. With the AWS CLI Tool you have command-line access to every AWS service.

AWS CLI is a pip package, and you must already have Python and pip installed.

Installing pip if needed

See: (packaging.python.org) https://packaging.python.org/tutorials/installing-packages/

You may already have it installed, which can be checked as so:

$ pip --version

If this fails you need to install it. If you have Python installed, you may be able to bootstrap pip install this way:

$ python -m ensurepip --default-pip

If that still fails, download (bootstrap.pypa.io) https://bootstrap.pypa.io/get-pip.py and execute

$ python get-pip.py

Installing AWS CLI

For the installation overview, see: (docs.aws.amazon.com) https://docs.aws.amazon.com/cli/latest/userguide/installing.html

$ pip install awscli --upgrade --user

The --upgrade option tells pip to upgrade any requirements that are already installed. The --user option tells pip to install the program to a subdirectory of your user directory to avoid modifying libraries used by your operating system.

OS specific instructions are at:

Configuring credentials so AWS CLI can access your AWS account

Accessing your AWS account with the CLI tool requires getting IAM credentials. You then put those credentials in a hidden file in your home directory.

Head to (aws.amazon.com) https://aws.amazon.com/ to sign up for an AWS account. Next head to https://console.aws.amazon.com/iam/ to create IAM user credentials.

  • In the left-hand pane, click on Users, then Add User
  • Enter a login name, and other settings for this user, when done click on Next: Permissions
  • We’re going to add this user to a Group, so click on Add User to Group and then Create Group
  • Enter a group name. Then using the filtering dropdown, filter the policies by Job Function and select Administrator Access. Click on Create Group.
  • The new group will be shown in a list of groups. Click on Next: Review
  • Look over the settings, and if you agree click on Create User

After that the IAM console will give you a URL like https://aws_account_number.signin.aws.amazon.com/console/ with which to sign in. Log out of the AWS console, then log-in using this new URL and user name and password you just setup.

Another important task in the IAM console is to set up access keys to the IAM user. Access keys are used for authentication, with the AWS Command-Line tool and other services. While viewing the summary page for an IAM user, click on the Security Credentials tab. On this page is a section labeled Access Keys and a button marked Create Access Key. Click on the button, and a pair of keys will be generated. You must record the keys in a safe place, and this is the only time AWS will ever in, the history of this or any other universe, show you those keys.

For details, see: (docs.aws.amazon.com) https://docs.aws.amazon.com/cli/latest/userguide/cli-chap-getting-started.html

« Apple's Mac Mini Pro: What it should be The SunFounder smart Video Car kit for Raspberry Pi »
2016 Election Acer C720 Ad block AkashaCMS Amazon Amazon Kindle Amazon Web Services America Amiga Android Anti-Fascism AntiVirus Software Apple Apple Hardware History Apple iPhone Apple iPhone Hardware April 1st Arduino ARM Compilation Artificial Intelligence Astronomy Astrophotography Asynchronous Programming Authoritarianism Automated Social Posting AWS DynamoDB AWS Lambda Ayo.JS Bells Law Big Brother Big Finish Bitcoin Mining Black Holes Blade Runner Blockchain Blogger Blogging Books Botnet Botnets Cassette Tapes Cellphones China China Manufacturing Christopher Eccleston Chrome Chrome Apps Chromebook Chromebox ChromeOS CIA CitiCards Citizen Journalism Civil Liberties Clinton Cluster Computing Command Line Tools Comment Systems Computer Accessories Computer Hardware Computer Repair Computers Cross Compilation Crouton Cryptocurrency Curiosity Rover Currencies Cyber Security Cybermen Daleks Darth Vader Data backup Data Storage Database Database Backup Databases David Tenant DDoS Botnet Detect Adblocker Developers Editors Digital Photography Diskless Booting Disqus DIY DIY Repair DNP3 Do it yourself Docker Docker MAMP Docker Swarm Doctor Who Doctor Who Paradox Doctor Who Review Drobo Drupal Drupal Themes DVD E-Books E-Readers Early Computers Election Hacks Electric Bicycles Electric Vehicles Electron Emdebian Encabulators Energy Efficiency Enterprise Node EPUB ESP8266 Ethical Curation Eurovision Event Driven Asynchronous Express Face Recognition Facebook Fake News Fedora VirtualBox File transfer without iTunes FireFly Flickr Fraud Freedom of Speech Gallifrey git Github GitKraken Gitlab GMAIL Google Google Chrome Google Gnome Google+ Government Spying Great Britain Heat Loss Hibernate Hoax Science Home Automation HTTP Security HTTPS Human ID I2C Protocol Image Analysis Image Conversion Image Processing ImageMagick In-memory Computing InfluxDB Infrared Thermometers Insulation Internet Internet Advertising Internet Law Internet of Things Internet Policy Internet Privacy iOS Devices iPad iPhone iPhone hacking Iron Man iTunes Java JavaScript JavaScript Injection JDBC John Simms Journalism Joyent Kaspersky Labs Kindle Kindle Marketplace Lets Encrypt LibreOffice Linux Linux Hints Linux Single Board Computers Logging Mac Mini Mac OS Mac OS X Machine Learning Machine Readable ID macOS MacOS X setup Make Money Online March For Our Lives MariaDB Mars Mass Violence Matt Lucas MEADS Anti-Missile Mercurial MERN Stack Michele Gomez Micro Apartments Microsoft Military AI Military Hardware Minification Minimized CSS Minimized HTML Minimized JavaScript Missy Mobile Applications Mobile Computers MODBUS Mondas Monetary System MongoDB Mongoose Monty Python MQTT Music Player Music Streaming MySQL NanoPi Nardole NASA Net Neutrality Node Web Development Node.js Node.js Database Node.js Testing Node.JS Web Development Node.x North Korea npm NVIDIA NY Times Online advertising Online Community Online Fraud Online Journalism Online Photography Online Video Open Media Vault Open Source Open Source Governance Open Source Licenses Open Source Software OpenAPI OpenVPN Palmtop PDA Paywalls Personal Flight Peter Capaldi Phishing Photography PHP Plex Plex Media Server Political Protest Postal Service Power Control Privacy Production use Public Violence Raspberry Pi Raspberry Pi 3 Raspberry Pi Zero ReactJS Recaptcha Recycling Refurbished Computers Remote Desktop Removable Storage Republicans Retro Computing Retro-Technology Reviews RFID Right to Repair River Song Robotics Rocket Ships RSS News Readers rsync Russia Russia Troll Factory Russian Hacking Rust SCADA Scheme Science Fiction SD Cards Search Engine Ranking Season 1 Season 10 Season 11 Security Security Cameras Server-side JavaScript Serverless Framework Servers Shell Scripts Silence Simsimi Skype SmugMug Social Media Social Media Warfare Social Networks Software Development Space Flight Space Ship Reuse Space Ships SpaceX Spear Phishing Spring Spring Boot Spy Satellites SQLite3 SSD Drives SSD upgrade SSH SSH Key SSL Stand For Truth Strange Parts Swagger Synchronizing Files Telescopes Terrorism The Cybermen The Daleks The Master Time-Series Database Tom Baker Torchwood Total Information Awareness Trump Trump Administration Trump Campaign Ubuntu Udemy UDOO US Department of Defense Virtual Private Networks VirtualBox VLC VNC VOIP Vue.js Web Applications Web Developer Resources Web Development Web Development Tools Web Marketing Website Advertising Weeping Angels WhatsApp William Hartnell Window Insulation Windows Windows Alternatives Wordpress World Wide Web Yahoo YouTube YouTube Monetization