In this hands-on lab, you will learn about the IAM role necessary for configuring an EC2 instance with the AWS Systems Manager service. We’ll create and attach a role to an EC2 instance via the AWS Management Console (GUI) and confirm that it is configured with the SSM service by checking in the Systems Manager console as a managed instance.
Successfully complete this lab by achieving the following learning objectives:
- Create an EC2 IAM Role with the Systems Manager Policy for EC2
- Access the IAM console, and create a role.
- Attach the AmazonEC2RoleforSSM policy to the role during creation.
- Name your role MySSMRole.
Note: When working via the GUI, AWS auto-creates an IAM instance profile when you create a role for EC2; whereas, when working in the CLI, one has to create and attach an IAM instance profile to the IAM role themselves.
- Launch an EC2 Instance
- Once you’re on the AMI selection screen, select the latest Amazon Linux 2 AMI (it has the SSM Agent installed).
- On the Configure Instance Details page, select the IAM role you created earlier. Leave all other configuration details of the instance at their default.
- Select an existing security group for this instance — it should already be created and named SG.
- Add a tag key called Name, with a value of MySSMInstance. You can tag it with whatever value you prefer. You’ll be using the instance tag to identify that SSM can see and communicate with the instance later on.
- You don’t need to generate a key pair for this EC2 instance since you won’t be logging in to it, so you can click Proceed without a keypair, and launch the instance.
- Verify the EC2 Instance Is Properly Configured with Systems Manager
Navigate to Systems Manager > Fleet Manager to view the EC2 instance.