You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The pipeline should have a recipe with no components (at least 1 is required today) or not require a recipe (might already be allowed today). This should skip instance launch and downloading AWSTOE onto the instance, going directly to distribution.
This image should be targetable by Image Builder lifecycle policies. Today, this requires a recipe for resource selection.
Additional Context
EC2 Image Builder currently provides the only avenue for users to manage EC2 AMIs and AMI lifecycle policies purely through AWS-provided CloudFormation resources (e.g. AWS::ImageBuilder::Image, AWS::ImageBuilder::LifecyclePolicy).
In comparison, other AMI baking solutions such as S3 → VM image import or HashiCorp Packer require a lot of extra supporting infrastructure to properly track and clean up old AMIs.
In addition to AMI building functionality, Image Builder can also distribute AMIs as part of an image pipeline.
Users may want to only use Image Builder's AMI distribution functionality without using the AMI building functionality.
For example, users may have a setup where they build VM images locally and then upload them to the AWS CDK bootstrap stack's S3 asset bucket for ingestion with ImportImage (does the actual import) + ImportVmImage (registers the AMI in Image Builder as an ARN-able resource).
Since imagebuilder:ImportVmImage is done outside of CloudFormation's purview, the resulting ImageBuilder Image (an ARN-able resource separate from the AMI) isn't tracked by CloudFormation. As a result, CloudFormation isn't able to automatically delete it when a replacement is needed during a stack update.
Community Note
Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request
Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritize the request
If you are interested in working on this issue or have submitted a pull request, please leave a comment
The text was updated successfully, but these errors were encountered:
Distribution-only image pipelines can be created today by creating a pipeline with an empty image workflow. Unlike image recipes, image workflows can do a no-op.
There are currently no plans to expand ImportVmImage which is likely required for supporting VM image import in CloudFormation.
Spoke with a Principal Engineer for EC2 Image Builder.
The difficulty around expanding ImportVmImage functionality is generally around ownership. Both ImportImage and ImportSnapshot are APIs that are owned by another EC2 division and not Image Builder.
Since Image Builder doesn't own the APIs nor the ARN-less AMIs created by these APIs, they will need to work with the EC2 team that owns these APIs to expand their capabilities and also add CloudFormation support (might need to live as its own CloudFormation resource type instead of being part of the Image Builder image CloudFormation resource).
Feature Request
Support VM image import in CloudFormation.
This also requires a few other things:
ec2:ImportImage
to support AArch64 images.ec2:ImportSnapshot
+ec2:RegisterImage
.imagebuilder:ImportVmImage
:ec2:ImportImage
request parameters (e.g. as anImageImportConfiguration
subfield). The service:ec2:ImportImage
, tracks the job in Image Builder, and returns.ec2:ImportSnapshot
task ID. The service:ec2:RegisterImage
, imports the AMI into Image Builder, and returns.ec2:ImportSnapshot
request parameters (e.g. as aSnapshotImportConfiguration
subfield). The service:ec2:ImportSnapshot
, tracks the job in Image Builder, and returns.ec2:RegisterImage
.Users should be able to have a CloudFormation template like this:
Alternatively if Image Builder offers a wrapper around
ec2:ImportSnapshot
+ec2:RegisterImage
instead, the template would look like this:This image should be targetable by Image Builder lifecycle policies. Today, this requires a recipe for resource selection.
Additional Context
EC2 Image Builder currently provides the only avenue for users to manage EC2 AMIs and AMI lifecycle policies purely through AWS-provided CloudFormation resources (e.g.
AWS::ImageBuilder::Image
,AWS::ImageBuilder::LifecyclePolicy
).In comparison, other AMI baking solutions such as S3 → VM image import or HashiCorp Packer require a lot of extra supporting infrastructure to properly track and clean up old AMIs.
In addition to AMI building functionality, Image Builder can also distribute AMIs as part of an image pipeline.
Users may want to only use Image Builder's AMI distribution functionality without using the AMI building functionality.
For example, users may have a setup where they build VM images locally and then upload them to the AWS CDK bootstrap stack's S3 asset bucket for ingestion with
ImportImage
(does the actual import) +ImportVmImage
(registers the AMI in Image Builder as an ARN-able resource).Since
imagebuilder:ImportVmImage
is done outside of CloudFormation's purview, the resulting ImageBuilder Image (an ARN-able resource separate from the AMI) isn't tracked by CloudFormation. As a result, CloudFormation isn't able to automatically delete it when a replacement is needed during a stack update.Community Note
The text was updated successfully, but these errors were encountered: