github.com/askholme/packer@v0.7.2-0.20140924152349-70d9566a6852/website/source/docs/builders/amazon-instance.html.markdown (about) 1 --- 2 layout: "docs" 3 page_title: "Amazon AMI Builder (instance-store)" 4 --- 5 6 # AMI Builder (instance-store) 7 8 Type: `amazon-instance` 9 10 The `amazon-instance` builder is able to create Amazon AMIs backed by 11 instance storage as the root device. For more information on the difference 12 between instance storage and EBS-backed instances, see the 13 ["storage for the root device" section in the EC2 documentation](http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ComponentsAMIs.html#storage-for-the-root-device). 14 15 This builder builds an AMI by launching an EC2 instance from an existing 16 instance-storage backed AMI, provisioning that running machine, and then 17 bundling and creating a new AMI from that machine. 18 This is all done in your own AWS account. The builder will create temporary 19 keypairs, security group rules, etc. that provide it temporary access to 20 the instance while the image is being created. This simplifies configuration 21 quite a bit. 22 23 The builder does _not_ manage AMIs. Once it creates an AMI and stores it 24 in your account, it is up to you to use, delete, etc. the AMI. 25 26 <div class="alert alert-block alert-info"> 27 <strong>Note:</strong> This builder requires that the 28 <a href="http://aws.amazon.com/developertools/368">Amazon EC2 AMI Tools</a> 29 are installed onto the machine. This can be done within a provisioner, but 30 must be done before the builder finishes running. 31 </div> 32 33 ## Configuration Reference 34 35 There are many configuration options available for the builder. They are 36 segmented below into two categories: required and optional parameters. Within 37 each category, the available configuration keys are alphabetized. 38 39 ### Required: 40 41 * `access_key` (string) - The access key used to communicate with AWS. 42 If not specified, Packer will use the environment variables 43 `AWS_ACCESS_KEY_ID` or `AWS_ACCESS_KEY` (in that order), if set. 44 45 * `account_id` (string) - Your AWS account ID. This is required for bundling 46 the AMI. This is _not the same_ as the access key. You can find your 47 account ID in the security credentials page of your AWS account. 48 49 * `ami_name` (string) - The name of the resulting AMI that will appear 50 when managing AMIs in the AWS console or via APIs. This must be unique. 51 To help make this unique, use a function like `timestamp` (see 52 [configuration templates](/docs/templates/configuration-templates.html) for more info) 53 54 * `instance_type` (string) - The EC2 instance type to use while building 55 the AMI, such as "m1.small". 56 57 * `region` (string) - The name of the region, such as "us-east-1", in which 58 to launch the EC2 instance to create the AMI. 59 60 * `s3_bucket` (string) - The name of the S3 bucket to upload the AMI. 61 This bucket will be created if it doesn't exist. 62 63 * `secret_key` (string) - The secret key used to communicate with AWS. 64 If not specified, Packer will use the environment variables 65 `AWS_SECRET_ACCESS_KEY` or `AWS_SECRET_KEY` (in that order), if set. 66 67 * `source_ami` (string) - The initial AMI used as a base for the newly 68 created machine. 69 70 * `ssh_username` (string) - The username to use in order to communicate 71 over SSH to the running machine. 72 73 * `x509_cert_path` (string) - The local path to a valid X509 certificate for 74 your AWS account. This is used for bundling the AMI. This X509 certificate 75 must be registered with your account from the security credentials page 76 in the AWS console. 77 78 * `x509_key_path` (string) - The local path to the private key for the X509 79 certificate specified by `x509_cert_path`. This is used for bundling the AMI. 80 81 ### Optional: 82 83 * `ami_block_device_mappings` (array of block device mappings) - Add the block 84 device mappings to the AMI. The block device mappings allow for keys: 85 "device\_name" (string), "virtual\_name" (string), "snapshot\_id" (string), 86 "volume\_type" (string), "volume\_size" (integer), "delete\_on\_termination" 87 (boolean), "encrypted" (boolean), "no\_device" (boolean), and "iops" (integer). 88 See [amazon-ebs](/docs/builders/amazon-ebs.html) for an example template. 89 90 * `ami_description` (string) - The description to set for the resulting 91 AMI(s). By default this description is empty. 92 93 * `ami_groups` (array of strings) - A list of groups that have access 94 to launch the resulting AMI(s). By default no groups have permission 95 to launch the AMI. `all` will make the AMI publicly accessible. 96 97 * `ami_product_codes` (array of strings) - A list of product codes to 98 associate with the AMI. By default no product codes are associated with 99 the AMI. 100 101 * `ami_regions` (array of strings) - A list of regions to copy the AMI to. 102 Tags and attributes are copied along with the AMI. AMI copying takes time 103 depending on the size of the AMI, but will generally take many minutes. 104 105 * `ami_users` (array of strings) - A list of account IDs that have access 106 to launch the resulting AMI(s). By default no additional users other than the user 107 creating the AMI has permissions to launch it. 108 109 * `ami_virtualization_type` (string) - The type of virtualization for the AMI 110 you are building. This option is required to register HVM images. Can be 111 "paravirtual" (default) or "hvm". 112 113 * `associate_public_ip_address` (boolean) - If using a non-default VPC, public 114 IP addresses are not provided by default. If this is toggled, your new 115 instance will get a Public IP. 116 117 * `availability_zone` (string) - Destination availability zone to launch instance in. 118 Leave this empty to allow Amazon to auto-assign. 119 120 * `bundle_destination` (string) - The directory on the running instance 121 where the bundled AMI will be saved prior to uploading. By default this is 122 "/tmp". This directory must exist and be writable. 123 124 * `bundle_prefix` (string) - The prefix for files created from bundling 125 the root volume. By default this is "image-{{timestamp}}". The `timestamp` 126 variable should be used to make sure this is unique, otherwise it can 127 collide with other created AMIs by Packer in your account. 128 129 * `bundle_upload_command` (string) - The command to use to upload the 130 bundled volume. See the "custom bundle commands" section below for more 131 information. 132 133 * `bundle_vol_command` (string) - The command to use to bundle the volume. 134 See the "custom bundle commands" section below for more information. 135 136 * `enhanced_networking` (boolean) - Enable enhanced networking (SriovNetSupport) on 137 HVM-compatible AMIs. 138 139 * `iam_instance_profile` (string) - The name of an 140 [IAM instance profile](http://docs.aws.amazon.com/IAM/latest/UserGuide/instance-profiles.html) 141 to launch the EC2 instance with. 142 143 * `launch_block_device_mappings` (array of block device mappings) - Add the 144 block device mappings to the launch instance. The block device mappings are 145 the same as `ami_block_device_mappings` above. 146 147 * `run_tags` (object of key/value strings) - Tags to apply to the instance 148 that is _launched_ to create the AMI. These tags are _not_ applied to 149 the resulting AMI unless they're duplicated in `tags`. 150 151 * `security_group_id` (string) - The ID (_not_ the name) of the security 152 group to assign to the instance. By default this is not set and Packer 153 will automatically create a new temporary security group to allow SSH 154 access. Note that if this is specified, you must be sure the security 155 group allows access to the `ssh_port` given below. 156 157 * `security_group_ids` (array of strings) - A list of security groups as 158 described above. Note that if this is specified, you must omit the 159 `security_group_id`. 160 161 * `spot_price` (string) - The maximum hourly price to launch a spot instance 162 to create the AMI. It is a type of instances that EC2 starts when the maximum 163 price that you specify exceeds the current spot price. Spot price will be 164 updated based on available spot instance capacity and current spot Instance 165 requests. It may save you some costs. You can set this to "auto" for 166 Packer to automatically discover the best spot price. 167 168 * `spot_price_auto_product` (string) - Required if `spot_price` is set to 169 "auto". This tells Packer what sort of AMI you're launching to find the best 170 spot price. This must be one of: `Linux/UNIX`, `SUSE Linux`, `Windows`, 171 `Linux/UNIX (Amazon VPC)`, `SUSE Linux (Amazon VPC)`, `Windows (Amazon VPC)` 172 173 * `ssh_port` (integer) - The port that SSH will be available on. This defaults 174 to port 22. 175 176 * `ssh_private_key_file` (string) - Use this ssh private key file instead of 177 a generated ssh key pair for connecting to the instance. 178 179 * `ssh_private_ip` (bool) - If true, then SSH will always use the private 180 IP if available. 181 182 * `ssh_timeout` (string) - The time to wait for SSH to become available 183 before timing out. The format of this value is a duration such as "5s" 184 or "5m". The default SSH timeout is "5m", or five minutes. 185 186 * `subnet_id` (string) - If using VPC, the ID of the subnet, such as 187 "subnet-12345def", where Packer will launch the EC2 instance. 188 189 * `tags` (object of key/value strings) - Tags applied to the AMI. 190 191 * `temporary_key_pair_name` (string) - The name of the temporary keypair 192 to generate. By default, Packer generates a name with a UUID. 193 194 * `user_data` (string) - User data to apply when launching the instance. 195 Note that you need to be careful about escaping characters due to the 196 templates being JSON. It is often more convenient to use `user_data_file`, 197 instead. 198 199 * `user_data_file` (string) - Path to a file that will be used for the 200 user data when launching the instance. 201 202 * `vpc_id` (string) - If launching into a VPC subnet, Packer needs the 203 VPC ID in order to create a temporary security group within the VPC. 204 205 * `x509_upload_path` (string) - The path on the remote machine where the 206 X509 certificate will be uploaded. This path must already exist and be 207 writable. X509 certificates are uploaded after provisioning is run, so 208 it is perfectly okay to create this directory as part of the provisioning 209 process. 210 211 ## Basic Example 212 213 Here is a basic example. It is completely valid except for the access keys: 214 215 <pre class="prettyprint"> 216 { 217 "type": "amazon-instance", 218 "access_key": "YOUR KEY HERE", 219 "secret_key": "YOUR SECRET KEY HERE", 220 "region": "us-east-1", 221 "source_ami": "ami-d9d6a6b0", 222 "instance_type": "m1.small", 223 "ssh_username": "ubuntu", 224 225 "account_id": "0123-4567-0890", 226 "s3_bucket": "packer-images", 227 "x509_cert_path": "x509.cert", 228 "x509_key_path": "x509.key", 229 "x509_upload_path": "/tmp", 230 231 "ami_name": "packer-quick-start {{timestamp}}" 232 } 233 </pre> 234 235 <div class="alert alert-block alert-info"> 236 <strong>Note:</strong> Packer can also read the access key and secret 237 access key from environmental variables. See the configuration reference in 238 the section above for more information on what environmental variables Packer 239 will look for. 240 </div> 241 242 ## Accessing the Instance to Debug 243 244 If you need to access the instance to debug for some reason, run the builder 245 with the `-debug` flag. In debug mode, the Amazon builder will save the 246 private key in the current directory and will output the DNS or IP information 247 as well. You can use this information to access the instance as it is 248 running. 249 250 ## Custom Bundle Commands 251 252 A lot of the process required for creating an instance-store backed AMI 253 involves commands being run on the actual source instance. Specifically, the 254 `ec2-bundle-vol` and `ec2-upload-bundle` commands must be used to bundle 255 the root filesystem and upload it, respectively. 256 257 Each of these commands have a lot of available flags. Instead of exposing each 258 possible flag as a template configuration option, the instance-store AMI 259 builder for Packer lets you customize the entire command used to bundle 260 and upload the AMI. 261 262 These are configured with `bundle_vol_command` and `bundle_upload_command`. 263 Both of these configurations are 264 [configuration templates](/docs/templates/configuration-templates.html) 265 and have support for their own set of template variables. 266 267 ### Bundle Volume Command 268 269 The default value for `bundle_vol_command` is shown below. It is split 270 across multiple lines for convenience of reading. The bundle volume command 271 is responsible for executing `ec2-bundle-vol` in order to store and image 272 of the root filesystem to use to create the AMI. 273 274 ``` 275 sudo -n ec2-bundle-vol \ 276 -k {{.KeyPath}} \ 277 -u {{.AccountId}} \ 278 -c {{.CertPath}} \ 279 -r {{.Architecture}} \ 280 -e {{.PrivatePath}}/* \ 281 -d {{.Destination}} \ 282 -p {{.Prefix}} \ 283 --batch \ 284 --no-filter 285 ``` 286 287 The available template variables should be self-explanatory based on the 288 parameters they're used to satisfy the `ec2-bundle-vol` command. 289 290 <div class="alert alert-block"> 291 <strong>Warning!</strong> Some versions of ec2-bundle-vol silently 292 ignore all .pem and .gpg files during the bundling of the AMI, which can 293 cause problems on some systems, such as Ubuntu. You may want to 294 customize the bundle volume command to include those files (see the 295 <code>--no-filter</code> option of ec2-bundle-vol). 296 </div> 297 298 ### Bundle Upload Command 299 300 The default value for `bundle_upload_command` is shown below. It is split 301 across multiple lines for convenience of reading. The bundle upload command 302 is responsible for taking the bundled volume and uploading it to S3. 303 304 ``` 305 sudo -n ec2-upload-bundle \ 306 -b {{.BucketName}} \ 307 -m {{.ManifestPath}} \ 308 -a {{.AccessKey}} \ 309 -s {{.SecretKey}} \ 310 -d {{.BundleDirectory}} \ 311 --batch \ 312 --url {{.S3Endpoint}} \ 313 --retry 314 ``` 315 316 The available template variables should be self-explanatory based on the 317 parameters they're used to satisfy the `ec2-upload-bundle` command.