Creates an EC2 AMI using an Image Builder Pipeline and returns the AMI ID.
Project description
ImagePipeline Construct for AWS CDK
Overview
The ImagePipeline
construct is a versatile and powerful component of the AWS Cloud Development Kit (CDK) designed for
creating and managing AWS Image Builder pipelines. This construct simplifies the process of setting up automated
pipelines for building and maintaining Amazon Machine Images (AMIs). It provides extensive customization options,
enabling users to tailor the pipeline to specific needs, including vulnerability scanning, cross-account distribution,
and more.
Benefits
- Customizable Image Building: Offers a wide range of parameters to customize the AMI, including VPC settings, security groups, instance types, and more.
- Automated Pipeline Management: Automates the pipeline creation and execution process, reducing manual effort and potential errors.
- Cross-Account AMI Distribution: Facilitates the copying of AMIs to multiple AWS accounts, enhancing resource sharing and collaboration.
- Vulnerability Scanning Integration: Supports integration with AWS Inspector for continuous vulnerability scanning, ensuring security compliance.
- User-Friendly: Designed with user experience in mind, making it easy to integrate into AWS CDK projects.
- Scalability and Flexibility: Scales according to your needs and provides flexibility in configuring various aspects of the image building process.
Prerequisites
- AWS account and AWS CLI configured.
- Familiarity with AWS CDK and TypeScript.
- Node.js and npm installed.
Installation
Ensure that you have the AWS CDK installed. If not, you can install it using npm:
npm install -g aws-cdk
Next, add the ImagePipeline
construct to your CDK project:
npm install '@layerborn/cdk-ami-builder' --save
Usage Example
Below is an example of how to use the ImagePipeline
construct in your CDK application.
Importing the Construct
First, import the ImagePipeline
construct into your CDK application:
import { ImagePipeline } from '@layerborn/cdk-ami-builder';
Using the Construct
Here's an example of how to use the ImagePipeline
construct:
const vpc = new Vpc(this, 'Vpc', {
ipAddresses: IpAddresses.cidr(props.vpcCidr as string),
maxAzs: 2,
subnetConfiguration: [
{
name: 'Public',
subnetType: SubnetType.PUBLIC,
cidrMask: 24,
},
{
name: 'Private',
subnetType: SubnetType.PRIVATE_WITH_EGRESS,
cidrMask: 24,
},
],
natGateways: 1,
});
const image = ec2.MachineImage.lookup({
name: 'ubuntu/images/hvm-ssd/ubuntu-jammy-22.04-amd64-server-*',
owners: ['099720109477'],
});
const version = process.env.IMAGE_VERSION_NUMBER ?? '0.0.8';
const imagePipeline = new ImagePipeline(this, 'ImagePipeline', {
parentImage: image.getImage(this).imageId,
vpc: vpc,
imageRecipeVersion: version,
autoBuild: true, // Otherwise you can't use the below output
components: [
{
name: 'Install-Monitoring',
platform: 'Linux',
componentDocument: {
phases: [{
name: 'build',
steps: [
{
name: 'Install-CloudWatch-Agent',
action: 'ExecuteBash',
inputs: {
commands: [
'apt-get update',
'DEBIAN_FRONTEND=noninteractive apt-get install -y g++ make cmake unzip libcur14-openssl-dev',
'DEBIAN_FRONTEND=noninteractive apt-get install -y curl sudo jq bash zip unzip iptables software-properties-common ca-certificates',
'curl -sfLo /tmp/amazon-cloudwatch-agent.deb https://s3.amazonaws.com/amazoncloudwatch-agent/ubuntu/amd64/latest/amazon-cloudwatch-agent.deb',
'dpkg -i -E /tmp/amazon-cloudwatch-agent.deb',
'rm /tmp/amazon-cloudwatch-agent.deb',
],
},
},
],
}],
},
},
],
});
new CfnOutput(this, `ImageId-${this.stackName}`, {
value: imagePipeline.imageId, // Only valid if autoBuild=true
description: 'The AMI ID of the image created by the pipeline',
});
This example demonstrates creating a new VPC and setting up an Image Pipeline within it. You can customize the `
ImagePipeline` properties according to your requirements.
Customization Options
vpc
: Specify the VPC where the Image Pipeline will be deployed.parentImage
: Define the base AMI for the image recipe.components
: List custom components for the AMI, such as software installations and configurations.- Additional properties like
imageRecipeVersion
,platform
,enableVulnScans
, etc., allow further customization.
Outputs
The construct provides outputs like imagePipelineArn
and imageId
, which can be used in other parts of your AWS
infrastructure setup.
Best Practices
- Parameter Validation: Ensure that all inputs to the construct are validated.
- Security: Follow best practices for security group and IAM role configurations.
- Resource Naming: Use meaningful names for resources for better manageability.
- Error Handling: Implement error handling for pipeline execution and custom resources.
Support and Contribution
For support, please contact the package maintainer or open an issue in the repository. Contributions to the package are welcome. Please follow the contribution guidelines in the repository.
This README provides a basic guide to getting started with the ImagePipeline
construct. For more advanced usage and
customization, refer to the detailed documentation in the package.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Hashes for layerborn.cdk-ami-builder-0.0.0.tar.gz
Algorithm | Hash digest | |
---|---|---|
SHA256 | 5dad154a280c22a7935e4cbe4cd0138daa2bfd5ca8983f95fdcaa3d6bcf83b69 |
|
MD5 | c193381c4be7b61e4c385b0fcb84302e |
|
BLAKE2b-256 | f26732dc4be44444aed81d31e4c02679ca6dcb37ca9d286fd3a9d814af1253da |
Hashes for layerborn.cdk_ami_builder-0.0.0-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 417729be4798fa1decefa450273312f4fca089d78235694f7e0f7e6392084d02 |
|
MD5 | cc505feaf29e32b63398c9c5d4d51e23 |
|
BLAKE2b-256 | f5edc33a8e96a2b58fb1de6535071fc4a5770466c1165fe75ccfc4d50f23c86d |