Amazon ECS Managed Instances instance profile
An instance profile is an IAM container that holds exactly one IAM role and allows Amazon ECS Managed Instances to assume that role securely. The instance profile contains an instance role that the ECS agent assumes to register instances with clusters and communicate with the ECS service.
Important
If you are using Amazon ECS Managed Instances with the Amazon-managed Infrastructure policy, the instance profile must be named ecsInstanceRole. If you are using a custom policy for the Infrastructure role, the instance profile can have an alternative name.
Create the instance profile using the Amazon CLI
After creating the role, create the instance profile using the Amazon CLI:
aws iam create-instance-profile --instance-profile-name ecsInstanceRole
Add the role to the instance profile:
aws iam add-role-to-instance-profile \ --instance-profile-name ecsInstanceRole \ --role-name ecsInstanceRole
Verify the profile was created successfully:
aws iam get-instance-profile --instance-profile-name ecsInstanceRole
Create the role with the trust policy
Replace all user input
with your own
information.
-
Create a file named
ecsInstanceRole-trust-policy.json
that contains the trust policy to use for the IAM role. The file should contain the following: -
Use the following Amazon CLI command to create a role named
ecsInstanceRole
by using the trust policy that you created in the previous step.aws iam create-role \ --role-name
ecsInstanceRole
\ --assume-role-policy-document file://ecsInstanceRole-trust-policy.json
-
Attach the Amazon managed
AmazonECSInstanceRolePolicyForManagedInstances
policy to theecsInstanceRole
role.aws iam attach-role-policy \ --role-name
ecsInstanceRole
\ --policy-arn arn:aws-cn:iam::aws:policy/AmazonECSInstanceRolePolicyForManagedInstances
You can also use the IAM console's Custom trust policy workflow to create the role. For more information, see Creating a role using custom trust policies (console) in the IAM User Guide.
After you create the file, you must grant your user permission to pass the role to Amazon ECS.