When first creating a new AWS account, you will initially create a new user. This example validate you have an accessible IAM User that has AdministratorAccess
level access for the various examples in this tutorial.
# Verify Administrator User Setup
export AWS_PROFILE=administrator
export AWS_PAGER=cat
aws sts get-caller-identity
aws ec2 describe-availability-zones --output text --query 'AvailabilityZones[0].[RegionName]'
aws iam list-attached-user-policies --user-name $(aws sts get-caller-identity --query 'Arn' --output text | cut -d'/' -f2)
These commands work provided you have:
-
Setup an IAM user with
AdministratorAccess
. See Creating an IAM user in your AWS account -
The access credentials for this IAM user. See Configuration and credential file settings
$ cat ~/.aws/credentials [administrator] aws_access_key_id=XXXXXXXXXXXXXXXXX aws_secret_access_key=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx region=us-east-2 output=json cli_pager=cat
{
"UserId": "AIDAWA6FBRN6XP5AWG4HU",
"Account": "999999999999",
"Arn": "arn:aws:iam::999999999999:user/administrator"
}
us-east-2
{
"AttachedPolicies": [
{
"PolicyName": "AdministratorAccess",
"PolicyArn": "arn:aws:iam::aws:policy/AdministratorAccess"
}
]
}