This lab facilitates learning by doing by utilizing Packer to create an AMI file that is staged in Amazon AWS. The Packer tool is used to run an Ansible role against the OS image to harden the image. The resulting AMI would then be available to specify when creating or upgrading Kubernetes clusters using installers such as kops.
Learning Objectives
Successfully complete this lab by achieving the following learning objectives:
- Grab the AWS Keys and Install the Ansible Role
Verify the files in your home directory.
Verify that Ansible is installed.
Display the AWS credentials for your lab and copy to the clipboard for later use.
IMPORTANT: DO NOT STORE THESE KEYS ANYWHERE BUT ON YOUR PRIVATE CLIENT SYSTEM.
Generate an RSA key for use by the Ansible playbook to harden the OS system.
Hit Enter on the configuration prompts to save the RSA key to the default directory.
Create a default vpc for your lab instance.
Use the
anisible-galaxy
script to install the sample playbook we will use in this lab.
- Add the Keys to the Packer Script and Run the Packer Job
Edit the
ksac-packer-build.sh
file and paste in the previously copied AWS credentials as environmental variables.Save and exit the file.
Execute the Packer build.
Once provisioned, log into the AWS Management Console to view the created AMIs using the lab credentials provided.
Navigate to the EC2 dashboard.
On the left menu, select Instances.
Packer Builder
now has an instance state of terminated.On the left menu under Images, select AMIs. The newly created
ksac-ubuntu-hard
image now appears.