Differences between revisions 8 and 9
Revision 8 as of 2013-05-05 05:22:45
Size: 8316
Comment:
Revision 9 as of 2013-05-07 04:42:01
Size: 8268
Comment:
Deletions are marked like this. Additions are marked like this.
Line 38: Line 38:
|| US-East-1 || ami-fbfc9192 || ami-51ff9238 || || || || || || ||
|| US-West-1 || ami-73311e36 || ami-39311e7c || || || || || || ||
|| US-West-2 || ami-b3990f83 || ami-a9990f99 || || || || || || ||
|| EU-West-1 || ami-f97a6c8d || ami-977a6ce3 || || || || || || ||
|| US-East-1 || ami-e17c1088 || ami-1d620e74 || || || || || || ||
|| US-West-1 || ami-8d1d32c8 || ami-d51d3290 || || || || || || ||
|| US-West-2 || ami-09b12739 || ami-1fb1272f || || || || || || ||
|| EU-West-1 || ami-7d011709 || ami-c90016bd || || || || || || ||
Line 43: Line 43:
|| AP-Southeast-2 || ami-3775e50d || ami-2975e513 || || || || || || ||
|| AP-Northeast-1 || ami-ef31bdee || ami-f531bdf4 || || || || || || ||
|| SA-East-1 || ami-c62bf1db || ami-fe2bf1e3 || || || || || || ||
|| AP-Southeast-2 || ami-3f7eee05 || ami-c17dedfb || || || || || || ||
|| AP-Northeast-1 || ami-1be06f1a || ami-dbe16eda || || || || || || ||
|| SA-East-1 || || || || || || || || ||
Line 88: Line 88:
                "us-east-1" : { "32" : "ami-fbfc9192", "64" : "ami-51ff9238"},
                "us-west-1" : { "32" : "ami-73311e36", "64" : "ami-39311e7c"},
                "us-west-2" : { "32" : "ami-b3990f83", "64" : "ami-a9990f99"},
                "us-east-1" : { "32" : "ami-e17c1088", "64" : "ami-1d620e74"},
                "us-west-1" : { "32" : "ami-8d1d32c8", "64" : "ami-d51d3290"},
                "us-west-2" : { "32" : "ami-09b12739", "64" : "ami-1fb1272f"},
Line 92: Line 92:
                "eu-west-1" : { "32" : "ami-f97a6c8d", "64" : "ami-977a6ce3"},                 "eu-west-1" : { "32" : "ami-7d011709", "64" : "ami-c90016bd"},
Line 94: Line 94:
                "ap-southeast-2" : { "32" : "ami-3775e50d", "64" : "ami-2975e513"},
                "ap-northeast-1" : { "32" : "ami-ef31bdee", "64" : "ami-f531bdf4"},
                "sa-east-1" : { "32" : "ami-c62bf1db", "64" : "ami-fe2bf1e3"},
                "ap-southeast-2" : { "32" : "ami-3f7eee05", "64" : "ami-c17dedfb"},
                "ap-northeast-1" : { "32" : "ami-1be06f1a", "64" : "ami-dbe16eda"},
                "sa-east-1" : { "32" : "
", "64" : ""},

Debian Wheezy (7.0.x) on AWS

Under construction 5/May/2013

Images are currently being generated; AMIs are being updated here as they become avaialable. Testing and feedback welcome to debian-cloud@lists.debian.org.

List of point releases published to the AWS Marketplace:

You may wish to use the CloudFormation template and launch your instance with some smart UserData scripts. For some releases you are free to choose the AWS Marketplace AMI, or the AMI that exists in the Debian AMI Account (account number 379101102735).

SSH username

In line with the security of most Linux distributions on Amazon Web Services, remote root SSH is disabled (as is password authentication). You will need to connect to instances from this AMI as the user admin using your SSH key, and then sudo -i to gain root access.

Please note that a Marketplace image volume cannot be attached to another running instance (For example, to repair a broken /etc/fstab, or /etc/network/interfaces). This is a limitation of all Marketplace images, as described here: Official AWS documentation


7.0.0

These images were generated with the following script:

   1 #!/bin/sh
   2 apt-get update; apt-get install -y git; cd ~root; git clone https://github.com/andsens/build-debian-cloud.git; logger "Cloned" ; cd ~root/debian-build-cloud; export PATH=$PATH:/usr/local/bin/; export EC2_ACCESS_KEY='XXXX'; export EC2_SECRET_KEY='XXXX'; logger "Starting AMD64 build. Path = $PATH"; ./build-debian-cloud ec2 --volume-size 8 --filesystem ext4 --plugin plugins/admin-user --description 'Debian 7 (Wheezy)' --plugin plugins/publish-ami --plugin plugins/publish-snapshot --codename wheezy; logger "Starting i386 build"; ./build-debian-cloud ec2 --volume-size 8 --filesystem ext4 --plugin plugins/admin-user --description 'Debian 7 (Wheezy)' --arch i386 --plugin plugins/publish-ami --plugin plugins/publish-snapshot --codename wheezy; shutdown -h now

The full list of AMIs worldwide in the Debian AMI account are:

Virtualisation

Para-virtualisation (PVM)

Hardware Virtualisation (HVM)

Root filesystem

EBS

Instance store

EBS

Instance store

Bits

32 bit

64 bit

32 bit

64 bit

32 bit

64 bit

32 bit

64 bit

US-East-1

ami-e17c1088

ami-1d620e74

US-West-1

ami-8d1d32c8

ami-d51d3290

US-West-2

ami-09b12739

ami-1fb1272f

EU-West-1

ami-7d011709

ami-c90016bd

AP-Southeast-1

ami-26a4eb74

ami-3ca4eb6e

AP-Southeast-2

ami-3f7eee05

ami-c17dedfb

AP-Northeast-1

ami-1be06f1a

ami-dbe16eda

SA-East-1

All AMIs and their corresponding EBS snapshots are marked as public so can be inspected by any other AWS user.

AWS Marketplace Image Distribution

These images (above) were copied to the AWS Marketplace Account and then replicated to all AWS Marketplace-supported Regions, and became identifiable by the following list of AMI IDs:

Upgrading from previous 6.x.y releases

As is standard with Debian, a simple apt-get update && apt-get upgrade should bring all packages up to date. There is no need to reinstall, but any ?CloudFormation templates and ?AutoScale Launch Configurations should be tested with and then updated to use the current AMI. It is recommended not to use older point releases.

CloudFormation Template

CloudFormation is a templating system for defining AWS resources - see http://aws.amazon.com/cloudformation/

{
        "Parameters" : {
                "KeyName" : {
                        "Description" : "SSH Key Name",
                        "Type" : "String",
                        "Default" : "My-Key"
                },
                "MyInstanceSize": {
                        "Description": "Instance size",
                        "Type": "String",
                        "Default" : "t1.micro"
                },
                "MyInstanceName": {
                        "Description": "Instance name",
                        "Type": "String"
                }
                "RootVolType": {
                        "Description": "Root volume type",
                        "Type": "String",
                        "Default": "EBS"
                }
        },
        "Mappings" : {
            "Debian700-EBS-PVM" : { 
                "us-east-1" :      { "32" : "ami-e17c1088", "64" : "ami-1d620e74"},
                "us-west-1" :      { "32" : "ami-8d1d32c8", "64" : "ami-d51d3290"},
                "us-west-2" :      { "32" : "ami-09b12739", "64" : "ami-1fb1272f"},
                "us-gov-west-1" :  { "32" : "", "64" : ""},
                "eu-west-1" :      { "32" : "ami-7d011709", "64" : "ami-c90016bd"},
                "ap-southeast-1" : { "32" : "ami-26a4eb74", "64" : "ami-3ca4eb6e"},
                "ap-southeast-2" : { "32" : "ami-3f7eee05", "64" : "ami-c17dedfb"},
                "ap-northeast-1" : { "32" : "ami-1be06f1a", "64" : "ami-dbe16eda"},
                "sa-east-1" :      { "32" : "", "64" : ""},
            },
            "Debian700-EBS-PVM-marketplace" : { 
                "us-east-1" :      { "32" : "ami-", "64" : "ami-"},
                "us-west-1" :      { "32" : "ami-", "64" : "ami-"},
                "us-west-2" :      { "32" : "ami-", "64" : "ami-"},
                "us-gov-west-1" :  { "32" : "", "64" : ""},
                "eu-west-1" :      { "32" : "ami-", "64" : "ami-"},
                "ap-southeast-1" : { "32" : "ami-", "64" : "ami-"},
                "ap-southeast-2" : { "32" : "", "64" : ""},
                "ap-northeast-1" : { "32" : "ami-", "64" : "ami-"},
                "sa-east-1" :      { "32" : "ami-", "64" : "ami-"},
            },
            "Debian700-Instance-PVM-marketplace" : {
                "us-east-1" :      { "32" : "ami-", "64" : "ami-"},
                "us-west-1" :      { "32" : "ami-", "64" : "ami-"},
                "us-west-2" :      { "32" : "ami-", "64" : "ami-"},
                "us-gov-west-1" :  { "32" : "", "64" : ""},
                "eu-west-1" :      { "32" : "ami-", "64" : "ami-"},
                "ap-southeast-1" : { "32" : "ami-", "64" : "ami-"},
                "ap-southeast-2" : { "32" : "ami-", "64" : "ami-"},
                "ap-northeast-1" : { "32" : "ami-", "64" : "ami-"},
                "sa-east-1" :      { "32" : "ami-", "64" : "ami-"},
            },
            "release" : {
                "stable" : { "squeeze" : "Debian700-EBS-PVM" }
            }
        },
        "Resources" : {
                "MyInstance" : {
                        "Type" : "AWS::EC2::Instance",
                        "Properties" : {
                                "SecurityGroups" : [ { "Ref" : "MySecurityGroup" } ],
                                "KeyName" : { "Ref": "KeyName" },
                                "Tags" : [{"Key": "Name", "Value": {"Ref" : "MyInstanceName"} } ],
                                "ImageId" : { "Fn::FindInMap" : [ "Debian700-EBS-PVM",  { "Ref" : "AWS::Region" }, "64"  ]},
                                "InstanceType" : { "Ref" : "MyInstanceSize" },
                                "UserData" : { "Fn::Base64" : "" }
                        }
                },
                "MySecurityGroup" : {
                        "Type" : "AWS::EC2::SecurityGroup",
                        "Properties" : {
                                "GroupDescription" : "Permit inbound SSH",
                                "SecurityGroupIngress" : [ 
                                    {
                                        "IpProtocol" : "tcp",
                                        "FromPort" : "22",
                                        "ToPort" : "22",
                                        "CidrIp" : "0.0.0.0/0"
                                    }
                                ]
                        }
                }
        }
}

Suggested UserData scripts

The image by default takes no actions upon boot, and does not auto-update. However, as the Debian image does honour executing UserData meta-data that looks like a script (started with #!/bin/sh), you may optionally chose to take some action. This action can be passed as a script in the AWS Console UserData input, or in the above CloudFormation template to an instance (see the UserData section in the example above). Note this is not cloud-init.

You can chose to enable auto update with the following UserData scripts:

   1 #!/bin/sh
   2 apt-get update && apt-get upgrade -y && apt-get install -y unattended-upgrades


See also Cloud and Teams/Cloud.