github.com/phobos182/packer@v0.2.3-0.20130819023704-c84d2aeffc68/website/source/docs/builders/amazon-instance.html.markdown (about) 1 --- 2 layout: "docs" 3 page_title: "Amazon AMI Builder (instance-store)" 4 --- 5 6 # AMI Builder (instance-store) 7 8 Type: `amazon-instance` 9 10 The `amazon-instance` builder is able to create Amazon AMIs backed by 11 instance storage as the root device. For more information on the difference 12 between instance storage and EBS-backed instances, see the 13 ["storage for the root device" section in the EC2 documentation](http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ComponentsAMIs.html#storage-for-the-root-device). 14 15 This builder builds an AMI by launching an EC2 instance from an existing 16 instance-storage backed AMI, provisioning that running machine, and then 17 bundling and creating a new AMI from that machine. 18 This is all done in your own AWS account. The builder will create temporary 19 keypairs, security group rules, etc. that provide it temporary access to 20 the instance while the image is being created. This simplifies configuration 21 quite a bit. 22 23 The builder does _not_ manage AMIs. Once it creates an AMI and stores it 24 in your account, it is up to you to use, delete, etc. the AMI. 25 26 ## Configuration Reference 27 28 There are many configuration options available for the builder. They are 29 segmented below into two categories: required and optional parameters. Within 30 each category, the available configuration keys are alphabetized. 31 32 Required: 33 34 * `access_key` (string) - The access key used to communicate with AWS. 35 If not specified, Packer will attempt to read this from environmental 36 variables `AWS_ACCESS_KEY_ID` or `AWS_ACCESS_KEY` (in that order). 37 38 * `account_id` (string) - Your AWS account ID. This is required for bundling 39 the AMI. This is _not the same_ as the access key. You can find your 40 account ID in the security credentials page of your AWS account. 41 42 * `ami_name` (string) - The name of the resulting AMI that will appear 43 when managing AMIs in the AWS console or via APIs. This must be unique. 44 To help make this unique, use a function like `timestamp` (see 45 [configuration templates](/docs/templates/configuration-templates.html) for more info) 46 47 * `instance_type` (string) - The EC2 instance type to use while building 48 the AMI, such as "m1.small". 49 50 * `region` (string) - The name of the region, such as "us-east-1", in which 51 to launch the EC2 instance to create the AMI. 52 53 * `s3_bucket` (string) - The name of the S3 bucket to upload the AMI. 54 This bucket will be created if it doesn't exist. 55 56 * `secret_key` (string) - The secret key used to communicate with AWS. 57 If not specified, Packer will attempt to read this from environmental 58 variables `AWS_SECRET_ACCESS_KEY` or `AWS_SECRET_KEY` (in that order). 59 60 * `source_ami` (string) - The initial AMI used as a base for the newly 61 created machine. 62 63 * `ssh_username` (string) - The username to use in order to communicate 64 over SSH to the running machine. 65 66 * `x509_cert_path` (string) - The local path to a valid X509 certificate for 67 your AWS account. This is used for bundling the AMI. This X509 certificate 68 must be registered with your account from the security credentials page 69 in the AWS console. 70 71 * `x509_key_path` (string) - The local path to the private key for the X509 72 certificate specified by `x509_cert_path`. This is used for bundling the AMI. 73 74 Optional: 75 76 * `ami_block_device_mappings` (array of block device mappings) - Add the block 77 device mappings to the AMI. The block device mappings allow for keys: 78 "device_name" (string), "virtual_name" (string), "snapshot_id" (string), 79 "volume_type" (string), "volume_size" (int), "delete_on_termination" (bool), 80 and "iops" (int). See [amazon-ebs](/docs/builders/amazon-ebs.html) for an 81 example template. 82 83 * `ami_description` (string) - The description to set for the resulting 84 AMI(s). By default this description is empty. 85 86 * `ami_groups` (array of string) - A list of groups that have access 87 to launch the resulting AMI(s). By default no groups have permission 88 to launch the AMI. 89 90 * `ami_product_codes` (array of string) - A list of product codes to 91 associate with the AMI. By default no product codes are associated with 92 the AMI. 93 94 * `ami_users` (array of string) - A list of account IDs that have access 95 to launch the resulting AMI(s). By default no additional users other than the user 96 creating the AMI has permissions to launch it. 97 98 * `bundle_destination` (string) - The directory on the running instance 99 where the bundled AMI will be saved prior to uploading. By default this is 100 "/tmp". This directory must exist and be writable. 101 102 * `bundle_prefix` (string) - The prefix for files created from bundling 103 the root volume. By default this is "image-{{timestamp}}". The `timestamp` 104 variable should be used to make sure this is unique, otherwise it can 105 collide with other created AMIs by Packer in your account. 106 107 * `bundle_upload_command` (string) - The command to use to upload the 108 bundled volume. See the "custom bundle commands" section below for more 109 information. 110 111 * `bundle_vol_command` (string) - The command to use to bundle the volume. 112 See the "custom bundle commands" section below for more information. 113 114 * `iam_instance_profile` (string) - The name of an 115 [IAM instance profile](http://docs.aws.amazon.com/IAM/latest/UserGuide/instance-profiles.html) 116 to launch the EC2 instance with. 117 118 * `launch_block_device_mappings` (array of block device mappings) - Add the 119 block device mappings to the launch instance. The block device mappings are 120 the same as `ami_block_device_mappings` above. 121 122 * `security_group_id` (string) - The ID (_not_ the name) of the security 123 group to assign to the instance. By default this is not set and Packer 124 will automatically create a new temporary security group to allow SSH 125 access. Note that if this is specified, you must be sure the security 126 group allows access to the `ssh_port` given below. 127 128 * `ssh_port` (int) - The port that SSH will be available on. This defaults 129 to port 22. 130 131 * `ssh_timeout` (string) - The time to wait for SSH to become available 132 before timing out. The format of this value is a duration such as "5s" 133 or "5m". The default SSH timeout is "1m", or one minute. 134 135 * `subnet_id` (string) - If using VPC, the ID of the subnet, such as 136 "subnet-12345def", where Packer will launch the EC2 instance. 137 138 * `tags` (object of key/value strings) - Tags applied to the AMI. 139 140 * `user_data` (string) - User data to apply when launching the instance. 141 Note that you need to be careful about escaping characters due to the 142 templates being JSON. It is often more convenient to use `user_data_file`, 143 instead. 144 145 * `user_data_file` (string) - Path to a file that will be used for the 146 user data when launching the instance. 147 148 * `vpc_id` (string) - If launching into a VPC subnet, Packer needs the 149 VPC ID in order to create a temporary security group within the VPC. 150 151 * `x509_upload_path` (string) - The path on the remote machine where the 152 X509 certificate will be uploaded. This path must already exist and be 153 writable. X509 certificates are uploaded after provisioning is run, so 154 it is perfectly okay to create this directory as part of the provisioning 155 process. 156 157 ## Basic Example 158 159 Here is a basic example. It is completely valid except for the access keys: 160 161 <pre class="prettyprint"> 162 { 163 "type": "amazon-instance", 164 "access_key": "YOUR KEY HERE", 165 "secret_key": "YOUR SECRET KEY HERE", 166 "region": "us-east-1", 167 "source_ami": "ami-d9d6a6b0", 168 "instance_type": "m1.small", 169 "ssh_username": "ubuntu", 170 171 "account_id": "0123-4567-0890", 172 "s3_bucket": "packer-images", 173 "x509_cert_path": "x509.cert", 174 "x509_key_path": "x509.key", 175 "x509_upload_path": "/tmp", 176 177 "ami_name": "packer-quick-start {{timestamp}}" 178 } 179 </pre> 180 181 <div class="alert alert-block alert-info"> 182 <strong>Note:</strong> Packer can also read the access key and secret 183 access key from environmental variables. See the configuration reference in 184 the section above for more information on what environmental variables Packer 185 will look for. 186 </div> 187 188 ## Custom Bundle Commands 189 190 A lot of the process required for creating an instance-store backed AMI 191 involves commands being run on the actual source instance. Specifically, the 192 `ec2-bundle-vol` and `ec2-upload-bundle` commands must be used to bundle 193 the root filesystem and upload it, respectively. 194 195 Each of these commands have a lot of available flags. Instead of exposing each 196 possible flag as a template configuration option, the instance-store AMI 197 builder for Packer lets you customize the entire command used to bundle 198 and upload the AMI. 199 200 These are configured with `bundle_vol_command` and `bundle_upload_command`. 201 Both of these configurations are 202 [configuration templates](/docs/templates/configuration-templates.html) 203 and have support for their own set of template variables. 204 205 ### Bundle Volume Command 206 207 The default value for `bundle_vol_command` is shown below. It is split 208 across multiple lines for convenience of reading. The bundle volume command 209 is responsible for executing `ec2-bundle-vol` in order to store and image 210 of the root filesystem to use to create the AMI. 211 212 ``` 213 sudo -n ec2-bundle-vol \ 214 -k {{.KeyPath}} \ 215 -u {{.AccountId}} \ 216 -c {{.CertPath}} \ 217 -r {{.Architecture}} \ 218 -e {{.PrivatePath}} \ 219 -d {{.Destination}} \ 220 -p {{.Prefix}} \ 221 --batch 222 ``` 223 224 The available template variables should be self-explanatory based on the 225 parameters they're used to satisfy the `ec2-bundle-vol` command. 226 227 <div class="alert alert-block"> 228 <strong>Warning!</strong> Some versions of ec2-bundle-vol silently 229 ignore all .pem and .gpg files during the bundling of the AMI, which can 230 cause problems on some systems, such as Ubuntu. You may want to 231 customize the bundle volume command to include those files (see the 232 <code>--no-filter</code> option of ec2-bundle-vol). 233 </div> 234 235 ### Bundle Upload Command 236 237 The default value for `bundle_upload_command` is shown below. It is split 238 across multiple lines for convenience of reading. The bundle upload command 239 is responsible for taking the bundled volume and uploading it to S3. 240 241 ``` 242 sudo -n ec2-upload-bundle \ 243 -b {{.BucketName}} \ 244 -m {{.ManifestPath}} \ 245 -a {{.AccessKey}} \ 246 -s {{.SecretKey}} \ 247 -d {{.BundleDirectory}} \ 248 --batch \ 249 --retry 250 ``` 251 252 The available template variables should be self-explanatory based on the 253 parameters they're used to satisfy the `ec2-upload-bundle` command.