|
Size: 6826
Comment:
|
Size: 3909
Comment:
|
| Deletions are marked like this. | Additions are marked like this. |
| Line 6: | Line 6: |
| * [[#6.0.7|6.0.7]] (''deprecated'') | |
| Line 37: | Line 36: |
| == 6.0.7 == <<Anchor(6.0.7)>> |
---- |
| Line 40: | Line 38: |
=== Debian Developer-created master images === <<Anchor(6.0.7-DDCreated)>> Images were created on 24/Feb/2013 by James Bromberger using [[https://github.com/andsens/ec2debian-build-ami/tree/offical-6.0.7-2013/02/24|ec2debian-build-ami]] tagged accordingly. The original (non-AWS-Marketplace) AMIs were generated in account 379101102735, and the images were identifiable in the AWS US-East-1 Region as: * ami-2ae17343: 379101102735/debian-squeeze-i386-20130224 * ami-7ce17315: 379101102735/debian-squeeze-amd64-20130224 {{{#!wiki note These 6.0.7 AMIs are deprecated and scheduled for removal on Friday 28th February 2014. }}} These images were generated in each Region (except !GovCloud) with the following script: {{{#!highlight bash #!/bin/sh apt-get update; apt-get install -y git; cd ~root; git clone https://github.com/andsens/ec2debian-build-ami.git; cd ~root/ec2debian-build-ami; export PATH=$PATH:/usr/local/bin/; export EC2_ACCESS_KEY='XXXXXXXXXXX'; export EC2_SECRET_KEY='XXXXXXXXXXX'; ./ec2debian-build-ami --volume-size 8 --plugin plugins/admin-user --description 'Debian 6.0.7 (Squeeze)' --plugin plugins/publish-ami --plugin plugins/publish-snapshot --codename squeeze; ./ec2debian-build-ami --volume-size 8 --plugin plugins/admin-user --description 'Debian 6.0.7 (Sequeze)' --arch i386 --plugin plugins/publish-ami --plugin plugins/publish-snapshot --codename squeeze; shutdown -h now }}} The full list of AMIs worldwide in the Debian AMI account are: ==== N Virginia/US-East-1: ==== * ami-7ce17315: 379101102735/debian-squeeze-amd64-20130224 * ami-2ae17343: 379101102735/debian-squeeze-i386-20130224 ==== Oregon/US-West-2: ==== * ami-cecf5afe: 379101102735/debian-squeeze-i386-20130224 * ami-decf5aee: 379101102735/debian-squeeze-amd64-20130224 ==== N California/US-West-1: ==== * ami-a41f3de1: 379101102735/debian-squeeze-amd64-20130224 * ami-b81f3dfd: 379101102735/debian-squeeze-i386-20130224 ==== Ireland/EU-West-1: ==== * ami-582e262c: 379101102735/debian-squeeze-i386-20130224 * ami-722e2606: 379101102735/debian-squeeze-amd64-20130224 ==== Singapore/AP-Southeast-1: ==== * ami-ec9ed3be: 379101102735/debian-squeeze-i386-20130224 * ami-f89ed3aa: 379101102735/debian-squeeze-amd64-20130224 ==== Tokyo/AP-Northeast-1: ==== * ami-13e76112: 379101102735/debian-squeeze-amd64-20130224 * ami-1fe7611e: 379101102735/debian-squeeze-i386-20130224 ==== Sydney/AP-Southeast-2: ==== * ami-8cfd6cb6: 379101102735/debian-squeeze-i386-20130224 * ami-94fd6cae: 379101102735/debian-squeeze-amd64-20130224 ==== Sao Paulo/SA-East-1: ==== * ami-d1fe25cc: 379101102735/debian-squeeze-i386-20130224 * ami-d9fe25c4: 379101102735/debian-squeeze-amd64-20130224 All AMIs and their corresponding EBS snapshots are marked as public so can be inspected by any other AWS user. === Upgrading from previous 6.0.x releases === |
== Upgrading from previous 6.0.x releases == |
| Line 101: | Line 44: |
| The image performs the following tasks: | The Squeeze image performs the following tasks: |
Debian Squeeze (6.0.x) on AWS EC2
You may wish to use the CloudFormation template and launch your instance with some smart UserData scripts.
SSH username
In line with the security of most Linux distributions on Amazon Web Services, remote root SSH is disabled (as is password authentication). You will need to connect to instances from this AMI as the user admin, and then sudo -i to gain root access.
Please note that a Marketplace image volume cannot be attached to another running instance (For example, to repair a broken /etc/fstab, or /etc/network/interfaces). This is a limitation of all Marketplace images, as described here: Official AWS documentation
6.0.9
Images were created on 16/Feb/2014 by James Bromberger using bootstrap-vz.
Region |
32-bit PVM |
64-bit PVM |
US-East-1 |
ami-574f483e |
ami-0740476e |
US-West-1 |
ami-7c586439 |
ami-72586437 |
US-West-2 |
ami-fe264bce |
ami-fc264bcc |
US-Gov-West-1 |
|
|
EU-West-1 |
ami-ccdd2dbb |
ami-d8dd2daf |
AP-Northeast-1 |
ami-cdec99cc |
ami-cbec99ca |
AP-Southeast-1 |
ami-eaecbab8 |
ami-e4ecbab6 |
AP-Southeast-2 |
ami-15d24b2f |
ami-17d24b2d |
SA-East-1 |
ami-8bc46796 |
ami-89c46794 |
Using the aws-cli, you may find this useful: aws --region us-east-1 ec2 describe-images --owners 379101102735 --filters "Name=tag:Name,Values=*6.0.9*" --query "Images[*].[Architecture,?ImageId]" --output text
Upgrading from previous 6.0.x releases
As is standard with Debian, a simple apt-get update && apt-get upgrade should bring all packages up to date. There is no need to reinstall, but any CloudFormation templates and AutoScale Launch Configurations should be tested with and then updated to use the current AMI. It is recommended not to use older point releases.
The Squeeze image performs the following tasks:
UserData that is a shell script is executed (you may wish to apply pending updates and install other software, etc)
- The root ext4 filesystem is resized on boot (you can grow larger than the default on instance launch)
- The root account is disabled; please SSH to the instance as the user 'admin'.
The image by default makes no contact to any external servers (no updates applied, no outbound requests, no data leakage).
It is planned to provide a machine-readable version of the above list of images. For the sake of the brainstorm, a JSON version is temporarly placed at Cloud/AmazonEC2Image/Squeeze/JSON. However, the structure is very likely to change, see 694035 for details. Here is a naive example on how to query the list. euca-describe-images $(curl --silent http://wiki.debian.org/Cloud/AmazonEC2Image/Squeeze/JSON?action=raw | jsonpipe | awk '/Debian606.ap-northeast-1.64/ {print $2}' | sed 's/"//g')
Suggested UserData scripts
The image by default takes no actions upon boot, and does not auto-update. However, as the Debian image does honour executing UserData meta-data that looks like a script (started with #!/bin/sh), you may optionally chose to take some action. This action can be passed as a script in the AWS Console UserData input, or in the above CloudFormation template to an instance (see the UserData section in the example above).
You can chose to enable auto update with the following UserData scripts:
See also Cloud and Teams/Cloud.
