We will learn how to create Ansible Playbook for provisioning a new EC2 instance in AWS cloud. Please follow the below steps in the machine where you have installed Ansible.

Watch here for YouTube Video:
Pre-requistes:
Ansible is installed and Boto is also installed on Ubuntu EC2 instance
Make sure you create an IAM role with AmazonEC2FullAccess policy and attach the role to EC2 instance.
Steps to create EC2 instance using Ansible:
Login to EC2 instance using Git bash or ITerm/putty where you installed Ansible. Execute the below command:
Login to EC2 instance using Git bash or ITerm/putty where you installed Ansible. Execute the below command:
Edit Ansible hosts or inventory file
sudo vi /etc/ansible/hosts
Add the below two lines in the end of the file:
[localhost]
local
Add the below two lines in the end of the file:
[localhost]
local
cd playbooks
Create Ansible playbook
sudo vi create_ec2.yml
(copy the below content in green color)
(copy the below content in green color)
edit the create_jenkins_ec2.yml to make sure you update the key which is red marked below:
---
- name: provisioning EC2 instances using Ansible
hosts: localhost
connection: local
gather_facts: False
tags: provisioning
vars:
keypair: MyEC2Key
instance_type: t2.small
image: ami-020db2c14939a8efb
wait: yes
group: webserver
count: 1
region: us-east-2
security_group: my-jenkins-security-grp
tasks:
- name: Task # 1 - Create my security group
local_action:
module: ec2_group
name: "{{ security_group }}"
description: Security Group for webserver Servers
region: "{{ region }}"
rules:
- proto: tcp
from_port: 22
to_port: 22
cidr_ip: 0.0.0.0/0
- proto: tcp
from_port: 8080
to_port: 8080
cidr_ip: 0.0.0.0/0
- proto: tcp
from_port: 80
to_port: 80
cidr_ip: 0.0.0.0/0
rules_egress:
- proto: all
cidr_ip: 0.0.0.0/0
register: basic_firewall
- name: Task # 2 Launch the new EC2 Instance
local_action: ec2
group={{ security_group }}
instance_type={{ instance_type}}
image={{ image }}
wait=true
region={{ region }}
keypair={{ keypair }}
count={{count}}
register: ec2
- name: Task # 3 Add Tagging to EC2 instance
local_action: ec2_tag resource={{ item.id }} region={{ region }} state=present
with_items: "{{ ec2.instances }}"
args:
tags:
Name: MyTargetEc2Instance
An exception occurred during task execution. To see the full traceback, use -vvv. The error was: botocore.exceptions.NoCre
ReplyDeletedentialsError: Unable to locate credentials
fatal: [local -> localhost]: FAILED! => {"boto3_version": "1.20.30", "botocore_version": "1.23.30", "changed": false, "msg
": "Error in describe_security_groups: Unable to locate credentials"}
Getting this error while use yoyr above script
Did you attach your IAM role to Ansible machine ?
DeleteTASK [Task] *******************************************************************************************************************************************
ReplyDeletefatal: [localhost]: FAILED! => {"msg": "The module ec2\n was not found in configured module paths"}