Configure the AWS CLI. (The main steps are reproduced below for your convenience.)
First, you will need to generate access keys. Best practices dictate that you create an IAM Admin User and Group rather than creating root access keys.
To create an IAM user, sign into Identity and Access Management in your AWS console using your root user credentials.
Navigate to My Account and enable access to billing data for IAM users.
Select Users in the left sidebar and click Add user.
Set username as
Administrator and click Next: Permissions.
Under the Add user to group tab, select Create group. Call the group name
Administrators and check the AdministratorAccess job function in the list of policies. Then click Create group to continue.
Click through the Tags page, review your setings and click Create user. Download the CSV with login information.
Return to the Users page and select the Security credentials tab for the
Administrator user you just created.
Under Access keys, click Create access keys. Download the CSV with the Access Key ID and Secret Access Key for later reference.
aws configure, pasting your Access Key ID and Secret Access key as needed.
Note: When configuring AWS, be sure to specify
us-east-1 as your default region name and
json as your default output format.
The output should look like this.
$ aws configureAWS Access Key ID [None]: AKIAIOSFODNN7EXAMPLEAWS Secret Access Key [None]: wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEYDefault region name [None]: us-east-1Default output format [None]: json
There's no need follow the steps on the ECS CLI 'configuration' page. The Pushkin CLI will handle this for you.
Note: In configuring the ECS CLI, you'll need the AWS profile name you are using, as well as the related Access Key ID and Secret Access Key. If you can't remember the name of your profile, you can get a list of active profiles on your computer using:
$ aws configure list-profiles
To see the Access Key ID and Secret Access Key for a given profile, run the following, where
[profile] is replaced with the name of the profile you want to use:
$ aws configure get aws_access_key_id --profile [profile]$ aws configure get aws_secret_access_key --profile [profile]