I wanted to create Amazon EC2 Key pair using Ansible tool. I do not want to use AWS CLI. Is it possible to create AWS ec2 key using Ansible?

You need to use ec2_key module of Ansible. This module has a dependency on python-boto version 2.5 or above. boto is nothing but a python interface to Amazon Web Services using API. You can use boto for services like Amazon S3, Amazon EC2 and others. In short, you need ansible installed along with boto module. Let us see how to install boto and use it with Ansbile.ADVERTISEMENT

Step 1 – Install latest version of Ansible on Ubuntu Linux

You must configure the PPA on your system to install the latest version of ansible. To manage the repositories that you install software from various PPA (Personal Package Archives). It allow you to upload Ubuntu source packages to be built and published as an apt repository by Launchpad. Type the following apt-get command or apt command:
$ sudo apt update
$ sudo apt upgrade
$ sudo apt install software-properties-common

Next add ppa:ansible/ansible to your system’s Software Source:
$ sudo apt-add-repository ppa:ansible/ansible
Update your repos and install ansible:
$ sudo apt update
$ sudo apt install ansible

Install boto:
$ pip3 install boto3

A note about installing Ansible on CentOS/RHEL 7.x

You need to setup EPEL repo on a CentOS and RHEL 7.x along with the yum command:
$ cd /tmp
$ wget https://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm
$ ls *.rpm
$ sudo yum install epel-release-latest-7.noarch.rpm
$ sudo yum install ansible

Install boto:
$ pip install boto3

Step 2 – Configure boto

You need to setup AWS credentials/API keys. See “AWS Security Credentials” documents on how to create a programmatic API key. Create a directory called ~/.aws using the mkdir command and setup API keys:
$ mkdir -pv ~/.aws/
$ vi ~/.aws/credentials

Also setup default AWS region:
$ vi ~/.aws/config
Sample outputs:

Test your boto setup with API by creating a simple python program named test-boto.py:

Run it as follows:
$ python3 test-boto.py
Sample outputs:

The output confirmed that Python-boto working correctly using AWS API.

Step 3 – Create AWS ec2 key using Ansible

Create a playbook named ec2.key.yml as follows:


  • ec2_key: – Maintains ec2 key pair.
  • name: nixcraft_key – Name of the key pair.
  • region: us-west-1
  • register: ec2_key_result : Save result of generated key to ec2_key_result variable.
  • copy: content="{{ ec2_key_result.key.private_key }}" dest="./aws.nixcraft.pem" mode=0600 : Sets the contents of ec2_key_result.key.private_key to a file named aws.nixcraft.pem in the current directory. Set mode of the file to 0600 (unix file permissions).
  • when: ec2_key_result.changed : Only save when ec2_key_result changed is set to true. We don’t want to overwrite our key file.

You must create hosts file as follows too:

Run your playbook as follows:
$ ansible-playbook -i hosts ec2.key.yml

At the end you should have a private key named aws.nixcraft.pem that you can use with AWS EC2. To view your key use the cat command:
$ cat aws.nixcraft.pem
If you have EC2 VM, use it as follows:
$ ssh -i aws.nixcraft.pem user@ec2-vm-dns-name

Finding out info about python data structure variable names such as ec2_key_result.changed and ec2_key_result.key.private_key

You must be wondering how come I am using variable names such as ec2_key_result.changed and ec2_key_result.key.private_key. Are they defined somewhere? Values are returned from API calls. Simply run the ansible-playbook command with the -v option to see such info:
$ ansible-playbook -v -i hosts ec2.key.yml

How do I delete a key?

Use the following ec2-key-delete.yml:

Run it as follows:
$ ansible-playbook -i hosts ec2-key-delete.yml