github.com/kikitux/packer@v0.10.1-0.20160322154024-6237df566f9f/website/source/docs/builders/amazon-instance.html.md (about) 1 --- 2 description: | 3 The `amazon-instance` Packer builder is able to create Amazon AMIs backed by 4 instance storage as the root device. For more information on the difference 5 between instance storage and EBS-backed instances, see the storage for the root 6 device section in the EC2 documentation. 7 layout: docs 8 page_title: 'Amazon AMI Builder (instance-store)' 9 ... 10 11 # AMI Builder (instance-store) 12 13 Type: `amazon-instance` 14 15 The `amazon-instance` Packer builder is able to create Amazon AMIs backed by 16 instance storage as the root device. For more information on the difference 17 between instance storage and EBS-backed instances, see the ["storage for the 18 root device" section in the EC2 19 documentation](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ComponentsAMIs.html#storage-for-the-root-device). 20 21 This builder builds an AMI by launching an EC2 instance from an existing 22 instance-storage backed AMI, provisioning that running machine, and then 23 bundling and creating a new AMI from that machine. This is all done in your own 24 AWS account. The builder will create temporary keypairs, security group rules, 25 etc. that provide it temporary access to the instance while the image is being 26 created. This simplifies configuration quite a bit. 27 28 The builder does *not* manage AMIs. Once it creates an AMI and stores it in your 29 account, it is up to you to use, delete, etc. the AMI. 30 31 -> **Note** This builder requires that the [Amazon EC2 AMI 32 Tools](https://aws.amazon.com/developertools/368) are installed onto the machine. 33 This can be done within a provisioner, but must be done before the builder 34 finishes running. 35 36 ## Configuration Reference 37 38 There are many configuration options available for the builder. They are 39 segmented below into two categories: required and optional parameters. Within 40 each category, the available configuration keys are alphabetized. 41 42 In addition to the options listed here, a 43 [communicator](/docs/templates/communicator.html) can be configured for this 44 builder. 45 46 ### Required: 47 48 - `access_key` (string) - The access key used to communicate with AWS. [Learn 49 how to set this.](/docs/builders/amazon.html#specifying-amazon-credentials) 50 51 - `account_id` (string) - Your AWS account ID. This is required for bundling 52 the AMI. This is *not the same* as the access key. You can find your account 53 ID in the security credentials page of your AWS account. 54 55 - `ami_name` (string) - The name of the resulting AMI that will appear when 56 managing AMIs in the AWS console or via APIs. This must be unique. To help 57 make this unique, use a function like `timestamp` (see [configuration 58 templates](/docs/templates/configuration-templates.html) for more info) 59 60 - `instance_type` (string) - The EC2 instance type to use while building the 61 AMI, such as "m1.small". 62 63 - `region` (string) - The name of the region, such as "us-east-1", in which to 64 launch the EC2 instance to create the AMI. 65 66 - `s3_bucket` (string) - The name of the S3 bucket to upload the AMI. This 67 bucket will be created if it doesn't exist. 68 69 - `secret_key` (string) - The secret key used to communicate with AWS. [Learn 70 how to set this.](/docs/builders/amazon.html#specifying-amazon-credentials) 71 72 - `source_ami` (string) - The initial AMI used as a base for the newly 73 created machine. 74 75 - `ssh_username` (string) - The username to use in order to communicate over 76 SSH to the running machine. 77 78 - `x509_cert_path` (string) - The local path to a valid X509 certificate for 79 your AWS account. This is used for bundling the AMI. This X509 certificate 80 must be registered with your account from the security credentials page in 81 the AWS console. 82 83 - `x509_key_path` (string) - The local path to the private key for the X509 84 certificate specified by `x509_cert_path`. This is used for bundling 85 the AMI. 86 87 ### Optional: 88 89 - `ami_block_device_mappings` (array of block device mappings) - Add the block 90 device mappings to the AMI. The block device mappings allow for keys: 91 - `delete_on_termination` (boolean) - Indicates whether the EBS volume is 92 deleted on instance termination 93 - `device_name` (string) - The device name exposed to the instance (for 94 example, "/dev/sdh" or "xvdh"). Required when specifying `volume_size`. 95 - `encrypted` (boolean) - Indicates whether to encrypt the volume or not 96 - `iops` (integer) - The number of I/O operations per second (IOPS) that the 97 volume supports. See the documentation on 98 [IOPs](https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_EbsBlockDevice.html) 99 for more information 100 - `no_device` (boolean) - Suppresses the specified device included in the 101 block device mapping of the AMI 102 - `snapshot_id` (string) - The ID of the snapshot 103 - `virtual_name` (string) - The virtual device name. See the documentation on 104 [Block Device 105 Mapping](https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_BlockDeviceMapping.html) 106 for more information 107 - `volume_size` (integer) - The size of the volume, in GiB. Required if not 108 specifying a `snapshot_id` 109 - `volume_type` (string) - The volume type. gp2 for General Purpose (SSD) 110 volumes, io1 for Provisioned IOPS (SSD) volumes, and standard for Magnetic 111 volumes 112 - `ami_description` (string) - The description to set for the 113 resulting AMI(s). By default this description is empty. 114 115 - `ami_groups` (array of strings) - A list of groups that have access to 116 launch the resulting AMI(s). By default no groups have permission to launch 117 the AMI. `all` will make the AMI publicly accessible. AWS currently doesn't 118 accept any value other than "all". 119 120 - `ami_product_codes` (array of strings) - A list of product codes to 121 associate with the AMI. By default no product codes are associated with 122 the AMI. 123 124 - `ami_regions` (array of strings) - A list of regions to copy the AMI to. 125 Tags and attributes are copied along with the AMI. AMI copying takes time 126 depending on the size of the AMI, but will generally take many minutes. 127 128 - `ami_users` (array of strings) - A list of account IDs that have access to 129 launch the resulting AMI(s). By default no additional users other than the 130 user creating the AMI has permissions to launch it. 131 132 - `ami_virtualization_type` (string) - The type of virtualization for the AMI 133 you are building. This option is required to register HVM images. Can be 134 "paravirtual" (default) or "hvm". 135 136 - `associate_public_ip_address` (boolean) - If using a non-default VPC, public 137 IP addresses are not provided by default. If this is toggled, your new 138 instance will get a Public IP. 139 140 - `availability_zone` (string) - Destination availability zone to launch 141 instance in. Leave this empty to allow Amazon to auto-assign. 142 143 - `bundle_destination` (string) - The directory on the running instance where 144 the bundled AMI will be saved prior to uploading. By default this is "/tmp". 145 This directory must exist and be writable. 146 147 - `bundle_prefix` (string) - The prefix for files created from bundling the 148 root volume. By default this is "image-{{timestamp}}". The `timestamp` 149 variable should be used to make sure this is unique, otherwise it can 150 collide with other created AMIs by Packer in your account. 151 152 - `bundle_upload_command` (string) - The command to use to upload the 153 bundled volume. See the "custom bundle commands" section below for 154 more information. 155 156 - `bundle_vol_command` (string) - The command to use to bundle the volume. See 157 the "custom bundle commands" section below for more information. 158 159 - `ebs_optimized` (boolean) - Mark instance as [EBS 160 Optimized](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSOptimized.html). 161 Default `false`. 162 163 - `enhanced_networking` (boolean) - Enable enhanced 164 networking (SriovNetSupport) on HVM-compatible AMIs. If true, add 165 `ec2:ModifyInstanceAttribute` to your AWS IAM policy. 166 167 - `force_deregister` (boolean) - Force Packer to first deregister an existing 168 AMI if one with the same name already exists. Default `false`. 169 170 - `iam_instance_profile` (string) - The name of an [IAM instance 171 profile](https://docs.aws.amazon.com/IAM/latest/UserGuide/instance-profiles.html) 172 to launch the EC2 instance with. 173 174 - `launch_block_device_mappings` (array of block device mappings) - Add the 175 block device mappings to the launch instance. The block device mappings are 176 the same as `ami_block_device_mappings` above. 177 178 - `run_tags` (object of key/value strings) - Tags to apply to the instance 179 that is *launched* to create the AMI. These tags are *not* applied to the 180 resulting AMI unless they're duplicated in `tags`. 181 182 - `security_group_id` (string) - The ID (*not* the name) of the security group 183 to assign to the instance. By default this is not set and Packer will 184 automatically create a new temporary security group to allow SSH access. 185 Note that if this is specified, you must be sure the security group allows 186 access to the `ssh_port` given below. 187 188 - `security_group_ids` (array of strings) - A list of security groups as 189 described above. Note that if this is specified, you must omit the 190 `security_group_id`. 191 192 - `spot_price` (string) - The maximum hourly price to launch a spot instance 193 to create the AMI. It is a type of instances that EC2 starts when the 194 maximum price that you specify exceeds the current spot price. Spot price 195 will be updated based on available spot instance capacity and current spot 196 Instance requests. It may save you some costs. You can set this to "auto" 197 for Packer to automatically discover the best spot price or to "0" to use 198 an on demand instance (default). 199 200 - `spot_price_auto_product` (string) - Required if `spot_price` is set 201 to "auto". This tells Packer what sort of AMI you're launching to find the 202 best spot price. This must be one of: `Linux/UNIX`, `SUSE Linux`, `Windows`, 203 `Linux/UNIX (Amazon VPC)`, `SUSE Linux (Amazon VPC)`, `Windows (Amazon VPC)` 204 205 - `ssh_keypair_name` (string) - If specified, this is the key that will be 206 used for SSH with the machine. The key must match a key pair name loaded 207 up into Amazon EC2. By default, this is blank, and Packer will 208 generate a temporary keypair. 209 [`ssh_private_key_file`](/docs/templates/communicator.html#ssh_private_key_file) 210 must be specified when `ssh_keypair_name` is utilized. 211 212 - `ssh_private_ip` (boolean) - If true, then SSH will always use the private 213 IP if available. 214 215 - `subnet_id` (string) - If using VPC, the ID of the subnet, such as 216 "subnet-12345def", where Packer will launch the EC2 instance. This field is 217 required if you are using an non-default VPC. 218 219 - `tags` (object of key/value strings) - Tags applied to the AMI. 220 221 - `temporary_key_pair_name` (string) - The name of the temporary keypair 222 to generate. By default, Packer generates a name with a UUID. 223 224 - `user_data` (string) - User data to apply when launching the instance. Note 225 that you need to be careful about escaping characters due to the templates 226 being JSON. It is often more convenient to use `user_data_file`, instead. 227 228 - `user_data_file` (string) - Path to a file that will be used for the user 229 data when launching the instance. 230 231 - `vpc_id` (string) - If launching into a VPC subnet, Packer needs the VPC ID 232 in order to create a temporary security group within the VPC. 233 234 - `x509_upload_path` (string) - The path on the remote machine where the X509 235 certificate will be uploaded. This path must already exist and be writable. 236 X509 certificates are uploaded after provisioning is run, so it is perfectly 237 okay to create this directory as part of the provisioning process. 238 239 - `windows_password_timeout` (string) - The timeout for waiting for a Windows 240 password for Windows instances. Defaults to 20 minutes. Example value: "10m" 241 242 ## Basic Example 243 244 Here is a basic example. It is completely valid except for the access keys: 245 246 ``` {.javascript} 247 { 248 "type": "amazon-instance", 249 "access_key": "YOUR KEY HERE", 250 "secret_key": "YOUR SECRET KEY HERE", 251 "region": "us-east-1", 252 "source_ami": "ami-d9d6a6b0", 253 "instance_type": "m1.small", 254 "ssh_username": "ubuntu", 255 256 "account_id": "0123-4567-0890", 257 "s3_bucket": "packer-images", 258 "x509_cert_path": "x509.cert", 259 "x509_key_path": "x509.key", 260 "x509_upload_path": "/tmp", 261 262 "ami_name": "packer-quick-start {{timestamp}}" 263 } 264 ``` 265 266 -> **Note:** Packer can also read the access key and secret access key from 267 environmental variables. See the configuration reference in the section above 268 for more information on what environmental variables Packer will look for. 269 270 ## Accessing the Instance to Debug 271 272 If you need to access the instance to debug for some reason, run the builder 273 with the `-debug` flag. In debug mode, the Amazon builder will save the private 274 key in the current directory and will output the DNS or IP information as well. 275 You can use this information to access the instance as it is running. 276 277 ## Custom Bundle Commands 278 279 A lot of the process required for creating an instance-store backed AMI involves 280 commands being run on the actual source instance. Specifically, the 281 `ec2-bundle-vol` and `ec2-upload-bundle` commands must be used to bundle the 282 root filesystem and upload it, respectively. 283 284 Each of these commands have a lot of available flags. Instead of exposing each 285 possible flag as a template configuration option, the instance-store AMI builder 286 for Packer lets you customize the entire command used to bundle and upload the 287 AMI. 288 289 These are configured with `bundle_vol_command` and `bundle_upload_command`. Both 290 of these configurations are [configuration 291 templates](/docs/templates/configuration-templates.html) and have support for 292 their own set of template variables. 293 294 ### Bundle Volume Command 295 296 The default value for `bundle_vol_command` is shown below. It is split across 297 multiple lines for convenience of reading. The bundle volume command is 298 responsible for executing `ec2-bundle-vol` in order to store and image of the 299 root filesystem to use to create the AMI. 300 301 ``` {.text} 302 sudo -i -n ec2-bundle-vol \ 303 -k {{.KeyPath}} \ 304 -u {{.AccountId}} \ 305 -c {{.CertPath}} \ 306 -r {{.Architecture}} \ 307 -e {{.PrivatePath}}/* \ 308 -d {{.Destination}} \ 309 -p {{.Prefix}} \ 310 --batch \ 311 --no-filter 312 ``` 313 314 The available template variables should be self-explanatory based on the 315 parameters they're used to satisfy the `ec2-bundle-vol` command. 316 317 \~> **Warning!** Some versions of ec2-bundle-vol silently ignore all .pem and 318 .gpg files during the bundling of the AMI, which can cause problems on some 319 systems, such as Ubuntu. You may want to customize the bundle volume command to 320 include those files (see the `--no-filter` option of ec2-bundle-vol). 321 322 ### Bundle Upload Command 323 324 The default value for `bundle_upload_command` is shown below. It is split across 325 multiple lines for convenience of reading. The bundle upload command is 326 responsible for taking the bundled volume and uploading it to S3. 327 328 ``` {.text} 329 sudo -i -n ec2-upload-bundle \ 330 -b {{.BucketName}} \ 331 -m {{.ManifestPath}} \ 332 -a {{.AccessKey}} \ 333 -s {{.SecretKey}} \ 334 -d {{.BundleDirectory}} \ 335 --batch \ 336 --region {{.Region}} \ 337 --retry 338 ``` 339 340 The available template variables should be self-explanatory based on the 341 parameters they're used to satisfy the `ec2-upload-bundle` command.