Jenkins : AWS SAM Plugin


The AWS Serverless Application Model (SAM) is an open-source framework you can use to build serverless applications on AWS.

This plugin helps you automate the deployments of your applications that are defined using SAM.


  • Custom build step
  • Deploy SAM projects to AWS
  • Package SAM projects to a S3
    • Use specific or auto-generated S3 bucket (if not given, a bucket will be automatically generated in your account for you)
  • Template parameter support
  • Template tags support
  • Deploy to specific region
  • Use an S3 prefix for packaged artifacts to have fine-grained control of where artifacts are uploaded
  • Use a specific KMS key for encrypting packaged artifacts at rest in S3
  • Configurable deployment role


AWS Account

In order to deploy to AWS you must have an AWS account. Visit if you do not have one.

AWS Credential Configuration

Before you can start building, you must have your AWS credentials set up in Jenkins.
To do this:

  1. From the main page of your jenkins server go to "Credentials" > "System" and then click on "Global Credentials."

  2. Click "Add Credentials."

  3. Select from the "Kind" dropdown "AWS Credentials."
  4. Finish the form with your AWS access keys and click "OK."

Project Configuration

There are a few steps to configuring your build.

  1. In your project configuration, scroll down to build steps.
  2. Add the "AWS SAM deploy application" build step.

Configuring the Build Step

  1. Select your AWS Credentials from the dropdown.
  2. Select the target region to deploy to.
  3. Give the build step a stack name.
  4. OPTIONAL: Enter an S3 bucket name to package the artifacts to.
    1. If you leave this blank, the S3 bucket will be auto-generated.
  5. Give the path to the SAM template file.

  6. Optional: If your template has parameters, add parameters where necessary.
  7. Optional: Add any tags to the stack you'd like.

  8. Optional: Finish the "Advanced" configuration
    1. Give an S3 prefix to package the artifacts in the bucket under.
    2. Give a KMS Key ID to encrypt the packaged artifacts.
    3. Give a Role Arn that will be assumed by CloudFormation when executing the changeset.
  9. Select an output template file for the package step to output to.