**1. To create the default IAM role for EC2** - Command:: aws emr create-default-roles - Output:: If the role already exists then the command returns nothing. If the role does not exist then the output will be: [ { "RolePolicy": { "Version": "2012-10-17", "Statement": [ { "Action": [ "cloudwatch:*", "dynamodb:*", "ec2:Describe*", "elasticmapreduce:Describe*", "elasticmapreduce:ListBootstrapActions", "elasticmapreduce:ListClusters", "elasticmapreduce:ListInstanceGroups", "elasticmapreduce:ListInstances", "elasticmapreduce:ListSteps", "kinesis:CreateStream", "kinesis:DeleteStream", "kinesis:DescribeStream", "kinesis:GetRecords", "kinesis:GetShardIterator", "kinesis:MergeShards", "kinesis:PutRecord", "kinesis:SplitShard", "rds:Describe*", "s3:*", "sdb:*", "sns:*", "sqs:*" ], "Resource": "*", "Effect": "Allow" } ] }, "Role": { "AssumeRolePolicyDocument": { "Version": "2008-10-17", "Statement": [ { "Action": "sts:AssumeRole", "Sid": "", "Effect": "Allow", "Principal": { "Service": "ec2.amazonaws.com" } } ] }, "RoleId": "AROAIQ5SIQUGL5KMYBJX6", "CreateDate": "2015-06-09T17:09:04.602Z", "RoleName": "EMR_EC2_DefaultRole", "Path": "/", "Arn": "arn:aws:iam::176430881729:role/EMR_EC2_DefaultRole" } }, { "RolePolicy": { "Version": "2012-10-17", "Statement": [ { "Action": [ "ec2:AuthorizeSecurityGroupIngress", "ec2:CancelSpotInstanceRequests", "ec2:CreateSecurityGroup", "ec2:CreateTags", "ec2:DeleteTags", "ec2:DescribeAvailabilityZones", "ec2:DescribeAccountAttributes", "ec2:DescribeInstances", "ec2:DescribeInstanceStatus", "ec2:DescribeKeyPairs", "ec2:DescribePrefixLists", "ec2:DescribeRouteTables", "ec2:DescribeSecurityGroups", "ec2:DescribeSpotInstanceRequests", "ec2:DescribeSpotPriceHistory", "ec2:DescribeSubnets", "ec2:DescribeVpcAttribute", "ec2:DescribeVpcEndpoints", "ec2:DescribeVpcEndpointServices", "ec2:DescribeVpcs", "ec2:ModifyImageAttribute", "ec2:ModifyInstanceAttribute", "ec2:RequestSpotInstances", "ec2:RunInstances", "ec2:TerminateInstances", "iam:GetRole", "iam:GetRolePolicy", "iam:ListInstanceProfiles", "iam:ListRolePolicies", "iam:PassRole", "s3:CreateBucket", "s3:Get*", "s3:List*", "sdb:BatchPutAttributes", "sdb:Select", "sqs:CreateQueue", "sqs:Delete*", "sqs:GetQueue*", "sqs:ReceiveMessage" ], "Resource": "*", "Effect": "Allow" } ] }, "Role": { "AssumeRolePolicyDocument": { "Version": "2008-10-17", "Statement": [ { "Action": "sts:AssumeRole", "Sid": "", "Effect": "Allow", "Principal": { "Service": "elasticmapreduce.amazonaws.com" } } ] }, "RoleId": "AROAI3SRVPPVSRDLARBPY", "CreateDate": "2015-06-09T17:09:10.401Z", "RoleName": "EMR_DefaultRole", "Path": "/", "Arn": "arn:aws:iam::176430881729:role/EMR_DefaultRole" } } ]
Name | Type | Size | Permission | Actions |
---|---|---|---|---|
add-instance-fleet.rst | File | 521 B | 0644 |
|
add-steps.rst | File | 4.37 KB | 0644 |
|
add-tags.rst | File | 648 B | 0644 |
|
create-cluster-examples.rst | File | 29.94 KB | 0644 |
|
create-cluster-synopsis.txt | File | 1.17 KB | 0644 |
|
create-default-roles.rst | File | 5.55 KB | 0644 |
|
create-security-configuration.rst | File | 3.91 KB | 0644 |
|
delete-security-configuration.rst | File | 173 B | 0644 |
|
describe-cluster.rst | File | 9.37 KB | 0644 |
|
describe-step.rst | File | 1.12 KB | 0644 |
|
get.rst | File | 258 B | 0644 |
|
list-clusters.rst | File | 670 B | 0644 |
|
list-instance-fleets.rst | File | 1.98 KB | 0644 |
|
list-instances.rst | File | 3.19 KB | 0644 |
|
list-security-configurations.rst | File | 437 B | 0644 |
|
list-steps.rst | File | 151 B | 0644 |
|
modify-cluster-attributes.rst | File | 196 B | 0644 |
|
modify-instance-fleet.rst | File | 333 B | 0644 |
|
put.rst | File | 287 B | 0644 |
|
remove-tags.rst | File | 184 B | 0644 |
|
schedule-hbase-backup.rst | File | 678 B | 0644 |
|
socks.rst | File | 273 B | 0644 |
|
ssh.rst | File | 1.43 KB | 0644 |
|
wait.rst | File | 165 B | 0644 |
|