AWS DevOps & Developer Productivity Blog
How to Create an AMI Builder with AWS CodeBuild and HashiCorp Packer – Part 2
Written by AWS Solutions Architects Jason Barto and Heitor Lessa
In Part 1 of this post, we described how AWS CodeBuild, AWS CodeCommit, and HashiCorp Packer can be used to build an Amazon Machine Image (AMI) from the latest version of Amazon Linux. In this post, we show how to use AWS CodePipeline, AWS CloudFormation, and Amazon CloudWatch Events to continuously ship new AMIs. We use Ansible by Red Hat to harden the OS on the AMIs through a well-known set of security controls outlined by the Center for Internet Security in its CIS Amazon Linux Benchmark.
You’ll find the source code for this post in our GitHub repo.
At the end of this post, we will have the following architecture:
Requirements
To follow along, you will need Git and a text editor. Make sure Git is configured to work with AWS CodeCommit, as described in Part 1.
Technologies
In addition to the services and products used in Part 1 of this post, we also use these AWS services and third-party software:
AWS CloudFormation gives developers and systems administrators an easy way to create and manage a collection of related AWS resources, provisioning and updating them in an orderly and predictable fashion.
Amazon CloudWatch Events enables you to react selectively to events in the cloud and in your applications. Specifically, you can create CloudWatch Events rules that match event patterns, and take actions in response to those patterns.
AWS CodePipeline is a continuous integration and continuous delivery service for fast and reliable application and infrastructure updates. AWS CodePipeline builds, tests, and deploys your code every time there is a code change, based on release process models you define.
Amazon SNS is a fast, flexible, fully managed push notification service that lets you send individual messages or to fan out messages to large numbers of recipients. Amazon SNS makes it simple and cost-effective to send push notifications to mobile device users or email recipients. The service can even send messages to other distributed services.
Ansible is a simple IT automation system that handles configuration management, application deployment, cloud provisioning, ad-hoc task-execution, and multinode orchestration.
Getting Started
We use CloudFormation to bootstrap the following infrastructure:
Component | Purpose |
---|---|
AWS CodeCommit repository | Git repository where the AMI builder code is stored. |
S3 bucket | Build artifact repository used by AWS CodePipeline and AWS CodeBuild. |
AWS CodeBuild project | Executes the AWS CodeBuild instructions contained in the build specification file. |
AWS CodePipeline pipeline | Orchestrates the AMI build process, triggered by new changes in the AWS CodeCommit repository. |
SNS topic | Notifies subscribed email addresses when an AMI build is complete. |
CloudWatch Events rule | Defines how the AMI builder should send a custom event to notify an SNS topic. |
Region | AMI Builder Launch Template |
---|---|
N. Virginia (us-east-1) | |
Ireland (eu-west-1) |
After launching the CloudFormation template linked here, we will have a pipeline in the AWS CodePipeline console. (Failed at this stage simply means we don’t have any data in our newly created AWS CodeCommit Git repository.)
Next, we will clone the newly created AWS CodeCommit repository.
If this is your first time connecting to a AWS CodeCommit repository, please see instructions in our documentation on Setup steps for HTTPS Connections to AWS CodeCommit Repositories.
To clone the AWS CodeCommit repository (console)
- From the AWS Management Console, open the AWS CloudFormation console.
- Choose the AMI-Builder-Blogpost stack, and then choose Output.
- Make a note of the Git repository URL.
- Use git to clone the repository.
For example:
git clone https://git-codecommit.eu-west-1.amazonaws.com/v1/repos/AMI-Builder_repo
To clone the AWS CodeCommit repository (CLI)
# Retrieve CodeCommit repo URL
git_repo=$(aws cloudformation describe-stacks --query 'Stacks[0].Outputs[?OutputKey==`GitRepository`].OutputValue' --output text --stack-name "AMI-Builder-Blogpost")
# Clone repository locally
git clone ${git_repo}
Bootstrap the Repo with the AMI Builder Structure
Now that our infrastructure is ready, download all the files and templates required to build the AMI.
- Download ami-builder-packer ZIP.
- Extract and copy the contents to the Git repo.
Your local Git repo should have the following structure:
.
├── ami_builder_event.json
├── ansible
├── buildspec.yml
├── cloudformation
├── packer_cis.json
Next, push these changes to AWS CodeCommit, and then let AWS CodePipeline orchestrate the creation of the AMI:
git add .
git commit -m "My first AMI"
git push origin master
AWS CodeBuild Implementation Details
While we wait for the AMI to be created, let’s see what’s changed in our AWS CodeBuild buildspec.yml
file:
...
phases:
...
build:
commands:
...
- ./packer build -color=false packer_cis.json | tee build.log
post_build:
commands:
- egrep "${AWS_REGION}\:\sami\-" build.log | cut -d' ' -f2 > ami_id.txt
# Packer doesn't return non-zero status; we must do that if Packer build failed
- test -s ami_id.txt || exit 1
- sed -i.bak "s/<<AMI-ID>>/$(cat ami_id.txt)/g" ami_builder_event.json
- aws events put-events --entries file://ami_builder_event.json
...
artifacts:
files:
- ami_builder_event.json
- build.log
discard-paths: yes
In the build phase, we capture Packer output into a file named build.log. In the post_build phase, we take the following actions:
- Look up the AMI ID created by Packer and save its findings to a temporary file (ami_id.txt).
- Forcefully make AWS CodeBuild to fail if the AMI ID (ami_id.txt) is not found. This is required because Packer doesn’t fail if something goes wrong during the AMI creation process. We have to tell AWS CodeBuild to stop by informing it that an error occurred.
- If an AMI ID is found, we update the ami_builder_event.json file and then notify CloudWatch Events that the AMI creation process is complete.
- CloudWatch Events publishes a message to an SNS topic. Anyone subscribed to the topic will be notified in email that an AMI has been created.
Lastly, the new artifacts
phase instructs AWS CodeBuild to upload files built during the build process (ami_builder_event.json
and build.log
) to the S3 bucket specified in the Outputs section of the CloudFormation template. These artifacts can then be used as an input artifact in any later stage in AWS CodePipeline.
For information about customizing the artifacts sequence of the buildspec.yml, see the Build Specification Reference for AWS CodeBuild.
CloudWatch Events Implementation Details
CloudWatch Events allow you to extend the AMI builder to not only send email after the AMI has been created, but to hook up any of the supported targets to react to the AMI builder event. This event publication means you can decouple from Packer actions you might take after AMI completion and plug in other actions, as you see fit.
For more information about targets in CloudWatch Events, see the CloudWatch Events API Reference.
In this case, CloudWatch Events should receive the following event, match it with a rule we created through CloudFormation, and publish a message to SNS so that you can receive an email.
Example CloudWatch custom event
[
{
"Source": "com.ami.builder",
"DetailType": "AmiBuilder",
"Detail": "{ \"AmiStatus\": \"Created\"}",
"Resources": [ "ami-12cd5guf" ]
}
]
Cloudwatch Events rule
{
"detail-type": [
"AmiBuilder"
],
"source": [
"com.ami.builder"
],
"detail": {
"AmiStatus": [
"Created"
]
}
}
Example SNS message sent in email
{
"version": "0",
"id": "f8bdede0-b9d7...",
"detail-type": "AmiBuilder",
"source": "com.ami.builder",
"account": "<<aws_account_number>>",
"time": "2017-04-28T17:56:40Z",
"region": "eu-west-1",
"resources": ["ami-112cd5guf "],
"detail": {
"AmiStatus": "Created"
}
}
Packer Implementation Details
In addition to the build specification file, there are differences between the current version of the HashiCorp Packer template (packer_cis.json
) and the one used in Part 1.
Variables
"variables": {
"vpc": "{{env `BUILD_VPC_ID`}}",
"subnet": "{{env `BUILD_SUBNET_ID`}}",
“ami_name”: “Prod-CIS-Latest-AMZN-{{isotime \”02-Jan-06 03_04_05\”}}”
},
-
ami_name
: Prefixes a name used by Packer to tag resources during theBuilders
sequence. -
vpc
andsubnet
: Environment variables defined by the CloudFormation stack parameters.
We no longer assume a default VPC is present and instead use the VPC and subnet specified in the CloudFormation parameters. CloudFormation configures the AWS CodeBuild project to use these values as environment variables. They are made available throughout the build process.
That allows for more flexibility should you need to change which VPC and subnet will be used by Packer to launch temporary resources.
Builders
"builders": [{
...
"ami_name": “{{user `ami_name`| clean_ami_name}}”,
"tags": {
"Name": “{{user `ami_name`}}”,
},
"run_tags": {
"Name": “{{user `ami_name`}}",
},
"run_volume_tags": {
"Name": “{{user `ami_name`}}",
},
"snapshot_tags": {
"Name": “{{user `ami_name`}}",
},
...
"vpc_id": "{{user `vpc` }}",
"subnet_id": "{{user `subnet` }}"
}],
We now have new properties (*_tag
) and a new function (clean_ami_name
) and launch temporary resources in a VPC
and subnet
specified in the environment variables. AMI names can only contain a certain set of ASCII characters. If the input in project
deviates from the expected characters (for example, includes whitespace or slashes), Packer’s clean_ami_name
function will fix it.
For more information, see functions on the HashiCorp Packer website.
Provisioners
"provisioners": [
{
"type": "shell",
"inline": [
"sudo pip install ansible"
]
},
{
"type": "ansible-local",
"playbook_file": "ansible/playbook.yaml",
"role_paths": [
"ansible/roles/common"
],
"playbook_dir": "ansible",
"galaxy_file": "ansible/requirements.yaml"
},
{
"type": "shell",
"inline": [
"rm .ssh/authorized_keys ; sudo rm /root/.ssh/authorized_keys"
]
}
We used shell
provisioner to apply OS patches in Part 1. Now, we use shell
to install Ansible on the target machine and ansible-local
to import, install, and execute Ansible roles to make our target machine conform to our standards.
Packer uses shell
to remove temporary keys before it creates an AMI from the target and temporary EC2 instance.
Ansible Implementation Details
Ansible provides OS patching through a custom Common
role that can be easily customized for other tasks.
CIS Benchmark and Cloudwatch Logs are implemented through two Ansible third-party roles that are defined in ansible/requirements.yaml
as seen in the Packer template.
The Ansible provisioner uses Ansible Galaxy to download these roles onto the target machine and execute them as instructed by ansible/playbook.yaml
.
For information about how these components are organized, see the Playbook Roles and Include Statements in the Ansible documentation.
The following Ansible playbook (ansible</playbook.yaml
) controls the execution order and custom properties:
---
- hosts: localhost
connection: local
gather_facts: true # gather OS info that is made available for tasks/roles
become: yes # majority of CIS tasks require root
vars:
# CIS Controls whitepaper: http://bit.ly/2mGAmUc
# AWS CIS Whitepaper: http://bit.ly/2m2Ovrh
cis_level_1_exclusions:
# 3.4.2 and 3.4.3 effectively blocks access to all ports to the machine
## This can break automation; ignoring it as there are stronger mechanisms than that
- 3.4.2
- 3.4.3
# CloudWatch Logs will be used instead of Rsyslog/Syslog-ng
## Same would be true if any other software doesn't support Rsyslog/Syslog-ng mechanisms
- 4.2.1.4
- 4.2.2.4
- 4.2.2.5
# Autofs is not installed in newer versions, let's ignore
- 1.1.19
# Cloudwatch Logs role configuration
logs:
- file: /var/log/messages
group_name: "system_logs"
roles:
- common
- anthcourtney.cis-amazon-linux
- dharrisio.aws-cloudwatch-logs-agent
Both third-party Ansible roles can be easily configured through variables (vars
). We use Ansible playbook variables to exclude CIS controls that don’t apply to our case and to instruct the CloudWatch Logs agent to stream the /var/log/messages log file to CloudWatch Logs.
If you need to add more OS or application logs, you can easily duplicate the playbook and make changes. The CloudWatch Logs agent will ship configured log messages to CloudWatch Logs.
For more information about parameters you can use to further customize third-party roles, download Ansible roles for the Cloudwatch Logs Agent and CIS Amazon Linux from the Galaxy website.
Committing Changes
Now that Ansible and CloudWatch Events are configured as a part of the build process, commiting any changes to the AWS CodeComit Git Repository will triger a new AMI build process that can be followed through the AWS CodePipeline console.
When the build is complete, an email will be sent to the email address you provided as a part of the CloudFormation stack deployment. The email serves as notification that an AMI has been built and is ready for use.
Summary
We used AWS CodeCommit, AWS CodePipeline, AWS CodeBuild, Packer, and Ansible to build a pipeline that continuously builds new, hardened CIS AMIs. We used Amazon SNS so that email addresses subscribed to a SNS topic are notified upon completion of the AMI build.
By treating our AMI creation process as code, we can iterate and track changes over time. In this way, it’s no different from a software development workflow. With that in mind, software patches, OS configuration, and logs that need to be shipped to a central location are only a git commit away.
Next Steps
Here are some ideas to extend this AMI builder:
- Hook up a Lambda function in Cloudwatch Events to update EC2 Auto Scaling configuration upon completion of the AMI build.
- Use AWS CodePipeline parallel steps to build multiple Packer images.
- Add a commit ID as a tag for the AMI you created.
- Create a scheduled Lambda function through Cloudwatch Events to clean up old AMIs based on timestamp (name or additional tag).
- Implement Windows support for the AMI builder.
- Create a cross-account or cross-region AMI build.
Cloudwatch Events allow the AMI builder to decouple AMI configuration and creation so that you can easily add your own logic using targets (AWS Lambda, Amazon SQS, Amazon SNS) to add events or recycle EC2 instances with the new AMI.
If you have questions or other feedback, feel free to leave it in the comments or contribute to the AMI Builder repo on GitHub.