Configure the AWS and ECS CLIs.

AWS CLI

‚ÄčConfigure the AWS CLI. (The main steps are reproduced below for your convenience.)

First, you will need to generate access keys. Best practices dictate that you create an IAM Admin User and Group rather than creating root access keys.

To create an IAM user, sign into Identity and Access Management in your AWS console using your root user credentials.

Navigate to My Account and enable access to billing data for IAM users.

Select Users in the left sidebar and click Add user.

Set username as Administrator and click Next: Permissions.

Under the Add user to group tab, select Create group. Call the group name Administrators and check the AdministratorAccess job function in the list of policies. Then click Create group to continue.

Click through the Tags page, review your setings and click Create user. Download the CSV with login information.

Return to the Users page and select the Security credentials tab for the Administrator user you just created.

Under Access keys, click Create access keys. Download the CSV with the Access Key ID and Secret Access Key for later reference.

Run aws configure, pasting your Access Key ID and Secret Access key as needed.

Note: When configuring AWS, be sure to specify us-east-1 as your default region name and json as your default output format.

The output should look like this.

$ aws configure
AWS Access Key ID [None]: AKIAIOSFODNN7EXAMPLE
AWS Secret Access Key [None]: wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY
Default region name [None]: us-east-1
Default output format [None]: json

ECS CLI

There's no need follow the steps on the ECS CLI 'configuration' page. The Pushkin CLI will handle this for you.

Note: In configuring the ECS CLI, you'll need the AWS profile name you are using, as well as the related Access Key ID and Secret Access Key. If you can't remember the name of your profile, you can get a list of active profiles on your computer using:

$ aws configure list-profiles

To see the Access Key ID and Secret Access Key for a given profile, run the following, where [profile] is replaced with the name of the profile you want to use:

$ aws configure get aws_access_key_id --profile [profile]
$ aws configure get aws_secret_access_key --profile [profile]