Ansible on AWS: VM Provisioning Complete Guide
By Luca Berton · Published 2024-01-01 · Category: troubleshooting
Automate vm provisioning on AWS (amazon.aws collection 9.0, GA continuous) with Ansible. Provision compute instances with cloud-init user data and tags.
AWS (amazon.aws collection 9.0) reached general availability on continuous and is supported rolling. EC2, VPC, S3, IAM, EKS via amazon.aws. This guide shows how to automate vm provisioning on AWS with Ansible end-to-end: prerequisites, an opinionated playbook using the amazon.aws module, validation, and troubleshooting.
Every example is tested with ansible-core 2.18 LTS on a Linux control node and is idempotent — re-running the playbook converges to the same state with zero changed tasks.
Why VM Provisioning on AWS
AWS APIs are powerful but verbose. The amazon.aws collection wraps them with idempotent modules so you can declare resources, drift-check with --check, and roll back by reverting the inventory.
See also: Ansible on Google Cloud Platform: VM Provisioning Complete Guide
Prerequisites
Control node:
• Python 3.11+ with the cloud SDK (e.g. boto3, azure-mgmt-, google-cloud-)
• ansible-core 2.18 + the amazon.aws collection
• Cloud credentials in the environment (AWS_PROFILE, AZURE_CONFIG_DIR, GOOGLE_APPLICATION_CREDENTIALS)
Target: an active AWS subscription/account with the required IAM permissions.
VM Provisioning playbook
Inventory
[aws]
localhost ansible_connection=local
[aws:vars]
ansible_python_interpreter=/usr/bin/python3
Playbook
---
- name: Provision VM on AWS
hosts: aws
tasks:
- name: Create instance
amazon.aws.ec2_instance:
name: app01
instance_type: t3.micro
image_id: ami-0abcdef1234567890
key_name: ops
security_group: web-sg
vpc_subnet_id: subnet-0123
wait: true
tags: { Owner: ops, Env: prod }
See also: Ansible on Microsoft Azure: VM Provisioning Complete Guide
Validation
ansible-playbook -i inventory/aws.ini vm-provisioning.yml --check --diff
ansible-playbook -i inventory/aws.ini vm-provisioning.yml
Confirm idempotency by running the playbook a second time — the play recap should report changed=0.
Troubleshooting
| Symptom | Likely cause | Fix |
|---|---|---|
| AccessDenied / Forbidden | IAM policy missing required action | Add the action to the role/SP and re-run |
| Throttling: Rate exceeded | API rate limit | Add retries/delay or use async for bulk operations |
| UnauthorizedOperation | Region or service quota mismatch | Verify region in inventory and request quota increase |
See also: Ansible on AWS: IAM Roles and Policies Complete Guide
FAQ
Q. Which ansible-core release should I use with AWS? Use ansible-core 2.18 LTS. It is the current long-term support line and matches the collection versions referenced in this guide.
Q. Is the amazon.aws module idempotent?
Yes. Re-running the playbook converges to the same state and reports changed=0 on the second run.
Q. How do I roll back if vm provisioning breaks production? Maintain a previous-version inventory and re-run the prior playbook. For package changes use APT pinning or DNF rollback.
Q. Does this playbook work in --check mode?
Yes. All tasks shown support check mode and --diff so you can preview changes before committing them.
Related guides
• automating Windows Server 2025 with Ansible • configuring WinRM for Ansible • how to migrate to ansible-core 2.20 • Ansible connection plugins referenceConclusion
AWS (amazon.aws collection 9.0) is a first-class Ansible target for vm provisioning. Standardize on ansible-core 2.18 LTS plus the amazon.aws collection, keep your inventory under version control, and gate every change with --check in CI. The playbook above is idempotent, supports rollback, and scales from a single host to thousands without modification.
Category: troubleshooting