github.com/phobos182/packer@v0.2.3-0.20130819023704-c84d2aeffc68/website/source/docs/builders/amazon-instance.html.markdown (about)

     1  ---
     2  layout: "docs"
     3  page_title: "Amazon AMI Builder (instance-store)"
     4  ---
     5  
     6  # AMI Builder (instance-store)
     7  
     8  Type: `amazon-instance`
     9  
    10  The `amazon-instance` builder is able to create Amazon AMIs backed by
    11  instance storage as the root device. For more information on the difference
    12  between instance storage and EBS-backed instances, see the
    13  ["storage for the root device" section in the EC2 documentation](http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ComponentsAMIs.html#storage-for-the-root-device).
    14  
    15  This builder builds an AMI by launching an EC2 instance from an existing
    16  instance-storage backed AMI, provisioning that running machine, and then
    17  bundling and creating a new AMI from that machine.
    18  This is all done in your own AWS account. The builder will create temporary
    19  keypairs, security group rules, etc. that provide it temporary access to
    20  the instance while the image is being created. This simplifies configuration
    21  quite a bit.
    22  
    23  The builder does _not_ manage AMIs. Once it creates an AMI and stores it
    24  in your account, it is up to you to use, delete, etc. the AMI.
    25  
    26  ## Configuration Reference
    27  
    28  There are many configuration options available for the builder. They are
    29  segmented below into two categories: required and optional parameters. Within
    30  each category, the available configuration keys are alphabetized.
    31  
    32  Required:
    33  
    34  * `access_key` (string) - The access key used to communicate with AWS.
    35    If not specified, Packer will attempt to read this from environmental
    36    variables `AWS_ACCESS_KEY_ID` or `AWS_ACCESS_KEY` (in that order).
    37  
    38  * `account_id` (string) - Your AWS account ID. This is required for bundling
    39    the AMI. This is _not the same_ as the access key. You can find your
    40    account ID in the security credentials page of your AWS account.
    41  
    42  * `ami_name` (string) - The name of the resulting AMI that will appear
    43    when managing AMIs in the AWS console or via APIs. This must be unique.
    44    To help make this unique, use a function like `timestamp` (see
    45    [configuration templates](/docs/templates/configuration-templates.html) for more info)
    46  
    47  * `instance_type` (string) - The EC2 instance type to use while building
    48    the AMI, such as "m1.small".
    49  
    50  * `region` (string) - The name of the region, such as "us-east-1", in which
    51    to launch the EC2 instance to create the AMI.
    52  
    53  * `s3_bucket` (string) - The name of the S3 bucket to upload the AMI.
    54    This bucket will be created if it doesn't exist.
    55  
    56  * `secret_key` (string) - The secret key used to communicate with AWS.
    57    If not specified, Packer will attempt to read this from environmental
    58    variables `AWS_SECRET_ACCESS_KEY` or `AWS_SECRET_KEY` (in that order).
    59  
    60  * `source_ami` (string) - The initial AMI used as a base for the newly
    61    created machine.
    62  
    63  * `ssh_username` (string) - The username to use in order to communicate
    64    over SSH to the running machine.
    65  
    66  * `x509_cert_path` (string) - The local path to a valid X509 certificate for
    67    your AWS account. This is used for bundling the AMI. This X509 certificate
    68    must be registered with your account from the security credentials page
    69    in the AWS console.
    70  
    71  * `x509_key_path` (string) - The local path to the private key for the X509
    72    certificate specified by `x509_cert_path`. This is used for bundling the AMI.
    73  
    74  Optional:
    75  
    76  * `ami_block_device_mappings` (array of block device mappings) - Add the block
    77    device mappings to the AMI. The block device mappings allow for keys:
    78    "device_name" (string), "virtual_name" (string), "snapshot_id" (string),
    79    "volume_type" (string), "volume_size" (int), "delete_on_termination" (bool),
    80    and "iops" (int). See [amazon-ebs](/docs/builders/amazon-ebs.html) for an
    81    example template.
    82  
    83  * `ami_description` (string) - The description to set for the resulting
    84    AMI(s). By default this description is empty.
    85  
    86  * `ami_groups` (array of string) - A list of groups that have access
    87    to launch the resulting AMI(s). By default no groups have permission
    88    to launch the AMI.
    89  
    90  * `ami_product_codes` (array of string) - A list of product codes to
    91    associate with the AMI. By default no product codes are associated with
    92    the AMI.
    93  
    94  * `ami_users` (array of string) - A list of account IDs that have access
    95    to launch the resulting AMI(s). By default no additional users other than the user
    96    creating the AMI has permissions to launch it.
    97  
    98  * `bundle_destination` (string) - The directory on the running instance
    99    where the bundled AMI will be saved prior to uploading. By default this is
   100    "/tmp". This directory must exist and be writable.
   101  
   102  * `bundle_prefix` (string) - The prefix for files created from bundling
   103    the root volume. By default this is "image-{{timestamp}}". The `timestamp`
   104    variable should be used to make sure this is unique, otherwise it can
   105    collide with other created AMIs by Packer in your account.
   106  
   107  * `bundle_upload_command` (string) - The command to use to upload the
   108    bundled volume. See the "custom bundle commands" section below for more
   109    information.
   110  
   111  * `bundle_vol_command` (string) - The command to use to bundle the volume.
   112    See the "custom bundle commands" section below for more information.
   113  
   114  * `iam_instance_profile` (string) - The name of an
   115    [IAM instance profile](http://docs.aws.amazon.com/IAM/latest/UserGuide/instance-profiles.html)
   116    to launch the EC2 instance with.
   117  
   118  * `launch_block_device_mappings` (array of block device mappings) - Add the
   119    block device mappings to the launch instance. The block device mappings are
   120    the same as `ami_block_device_mappings` above.
   121  
   122  * `security_group_id` (string) - The ID (_not_ the name) of the security
   123    group to assign to the instance. By default this is not set and Packer
   124    will automatically create a new temporary security group to allow SSH
   125    access. Note that if this is specified, you must be sure the security
   126    group allows access to the `ssh_port` given below.
   127  
   128  * `ssh_port` (int) - The port that SSH will be available on. This defaults
   129    to port 22.
   130  
   131  * `ssh_timeout` (string) - The time to wait for SSH to become available
   132    before timing out. The format of this value is a duration such as "5s"
   133    or "5m". The default SSH timeout is "1m", or one minute.
   134  
   135  * `subnet_id` (string) - If using VPC, the ID of the subnet, such as
   136    "subnet-12345def", where Packer will launch the EC2 instance.
   137  
   138  * `tags` (object of key/value strings) - Tags applied to the AMI.
   139  
   140  * `user_data` (string) - User data to apply when launching the instance.
   141    Note that you need to be careful about escaping characters due to the
   142    templates being JSON. It is often more convenient to use `user_data_file`,
   143    instead.
   144  
   145  * `user_data_file` (string) - Path to a file that will be used for the
   146    user data when launching the instance.
   147  
   148  * `vpc_id` (string) - If launching into a VPC subnet, Packer needs the
   149    VPC ID in order to create a temporary security group within the VPC.
   150  
   151  * `x509_upload_path` (string) - The path on the remote machine where the
   152    X509 certificate will be uploaded. This path must already exist and be
   153    writable. X509 certificates are uploaded after provisioning is run, so
   154    it is perfectly okay to create this directory as part of the provisioning
   155    process.
   156  
   157  ## Basic Example
   158  
   159  Here is a basic example. It is completely valid except for the access keys:
   160  
   161  <pre class="prettyprint">
   162  {
   163    "type": "amazon-instance",
   164    "access_key": "YOUR KEY HERE",
   165    "secret_key": "YOUR SECRET KEY HERE",
   166    "region": "us-east-1",
   167    "source_ami": "ami-d9d6a6b0",
   168    "instance_type": "m1.small",
   169    "ssh_username": "ubuntu",
   170  
   171    "account_id": "0123-4567-0890",
   172    "s3_bucket": "packer-images",
   173    "x509_cert_path": "x509.cert",
   174    "x509_key_path": "x509.key",
   175    "x509_upload_path": "/tmp",
   176  
   177    "ami_name": "packer-quick-start {{timestamp}}"
   178  }
   179  </pre>
   180  
   181  <div class="alert alert-block alert-info">
   182  <strong>Note:</strong> Packer can also read the access key and secret
   183  access key from environmental variables. See the configuration reference in
   184  the section above for more information on what environmental variables Packer
   185  will look for.
   186  </div>
   187  
   188  ## Custom Bundle Commands
   189  
   190  A lot of the process required for creating an instance-store backed AMI
   191  involves commands being run on the actual source instance. Specifically, the
   192  `ec2-bundle-vol` and `ec2-upload-bundle` commands must be used to bundle
   193  the root filesystem and upload it, respectively.
   194  
   195  Each of these commands have a lot of available flags. Instead of exposing each
   196  possible flag as a template configuration option, the instance-store AMI
   197  builder for Packer lets you customize the entire command used to bundle
   198  and upload the AMI.
   199  
   200  These are configured with `bundle_vol_command` and `bundle_upload_command`.
   201  Both of these configurations are
   202  [configuration templates](/docs/templates/configuration-templates.html)
   203  and have support for their own set of template variables.
   204  
   205  ### Bundle Volume Command
   206  
   207  The default value for `bundle_vol_command` is shown below. It is split
   208  across multiple lines for convenience of reading. The bundle volume command
   209  is responsible for executing `ec2-bundle-vol` in order to store and image
   210  of the root filesystem to use to create the AMI.
   211  
   212  ```
   213  sudo -n ec2-bundle-vol \
   214  	-k {{.KeyPath}}  \
   215  	-u {{.AccountId}} \
   216  	-c {{.CertPath}} \
   217  	-r {{.Architecture}} \
   218  	-e {{.PrivatePath}} \
   219  	-d {{.Destination}} \
   220  	-p {{.Prefix}} \
   221  	--batch
   222  ```
   223  
   224  The available template variables should be self-explanatory based on the
   225  parameters they're used to satisfy the `ec2-bundle-vol` command.
   226  
   227  <div class="alert alert-block">
   228    <strong>Warning!</strong> Some versions of ec2-bundle-vol silently
   229  ignore all .pem and .gpg files during the bundling of the AMI, which can
   230  cause problems on some systems, such as Ubuntu. You may want to
   231  customize the bundle volume command to include those files (see the
   232  <code>--no-filter</code> option of ec2-bundle-vol).
   233  </div>
   234  
   235  ### Bundle Upload Command
   236  
   237  The default value for `bundle_upload_command` is shown below. It is split
   238  across multiple lines for convenience of reading. The bundle upload command
   239  is responsible for taking the bundled volume and uploading it to S3.
   240  
   241  ```
   242  sudo -n ec2-upload-bundle \
   243  	-b {{.BucketName}} \
   244  	-m {{.ManifestPath}} \
   245  	-a {{.AccessKey}} \
   246  	-s {{.SecretKey}} \
   247  	-d {{.BundleDirectory}} \
   248  	--batch \
   249  	--retry
   250  ```
   251  
   252  The available template variables should be self-explanatory based on the
   253  parameters they're used to satisfy the `ec2-upload-bundle` command.