This is the official Chef Knife plugin for Amazon EC2. This plugin gives knife the ability to create, bootstrap, and manage EC2 instances.
- Documentation: https://github.com/chef/knife-ec2/blob/master/README.md
- Source: https://github.com/chef/knife-ec2/tree/master
- Issues: https://github.com/chef/knife-ec2/issues
- IRC:
#chef
and#chef-hacking
on Freenode - Mailing list: https://discourse.chef.io/
If you're using ChefDK, simply install the Gem:
$ chef gem install knife-ec2
If you're using bundler, simply add Chef and Knife EC2 to your Gemfile
:
gem 'knife-ec2'
If you are not using bundler, you can install the gem manually from Rubygems:
$ gem install knife-ec2
Depending on your system's configuration, you may need to run this command with root privileges.
In order to communicate with the Amazon's EC2 API you will need to pass Knife your AWS Access Key, Secret Access Key, and if using STS your session token. This can be done in several ways:
The easiest way to configure your Amazon EC2 credentials for knife-ec2 is to specify them in your your knife.rb
file:
knife[:aws_access_key_id] = "Your AWS Access Key ID"
knife[:aws_secret_access_key] = "Your AWS Secret Access Key"
Additionally if using AWS STS:
knife[:aws_session_token] = "Your AWS Session Token"
Note: If your knife.rb
file will be checked into a source control management system, or is otherwise accessible by others, you may want to use one of the other configuration methods to avoid exposing your credentials.
Knife-ec2 can also read your credentials from shell environmental variables. Export AWS_ACCESS_KEY_ID
, AWS_SECRET_ACCESS_KEY
, and AWS_SESSION_TOKEN
variables in your shell then add the following configuration to your knife.rb
file:
knife[:aws_access_key_id] = ENV['AWS_ACCESS_KEY_ID']
knife[:aws_secret_access_key] = ENV['AWS_SECRET_ACCESS_KEY']
Additionally if using AWS STS:
knife[:aws_session_token] = ENV['AWS_SESSION_TOKEN']
You also have the option of passing your AWS API Key/Secret into the individual knife subcommands using the --aws-access-key-id
and --aws-secret-access-key
command options
Example of provisioning a new t2.micro Ubuntu 14.04 webserver:
$ knife ec2 server create -r 'role[webserver]' -I ami-cd0fd6be -f t2.micro --aws-access-key-id 'Your AWS Access Key ID' --aws-secret-access-key "Your AWS Secret Access Key"
Amazon's newer credential config file format is also supported by knife:
[default]
aws_access_key_id = Your AWS Access Key ID
aws_secret_access_key = Your AWS Secret Access Key
In this case, you can point the aws_credential_file
option to this file in your knife.rb
file, like so:
knife[:aws_credential_file] = "/path/to/credentials/file"
Since the Knife config file is just Ruby you can also avoid hardcoding your home directory, which creates a configuration that can be used for any user:
knife[:aws_credential_file] = File.join(ENV['HOME'], "/.aws/credentials")
If you have multiple profiles in your credentials file you can define which profile to use. The default
profile will be used if not supplied,
knife[:aws_profile] = "personal"
Amazon's newer configuration file format is also supported by knife:
[default]
region = "specify_any_supported_region"
In this case you can point the aws_config_file
option to this file in your knife.rb
file, like so:
knife[:aws_config_file] = "/path/to/configuration/file"
Since the Knife config is just Ruby you can also avoid hardcoding your name directory, which creates a config that can be used for any user:
knife[:aws_config_file] = File.join(ENV['HOME'], "/.aws/configuration")
If you have multiple profiles in your configuration file you can define which profile to use. The default
profile will be used if not supplied,
knife[:aws_profile] = "personal"
In this case configuration file format is:
[profile personal]
region = "specify_any_supported_region"
The following configuration options may be set in your knife.rb
:
- flavor
- image
- availability_zone
- ssh_key_name
- aws_session_token
- region
- distro
- template_file
knife-ec2 now includes the ability to retrieve the encrypted data bag secret and validation keys directly from a cloud-based assets store (currently only S3 is supported). To enable this functionality, you must first upload keys to S3 and give them appropriate permissions. The following is a suggested set of IAM permissions required to make this work:
{
"Statement": [
{
"Effect": "Allow",
"Action": [
"s3:Get*",
"s3:List*"
],
"Resource": [
"arn:aws:s3:::example.com/chef/*"
]
}
]
}
http
orhttps
based: 'http://example.com/chef/my-validator.pem's3
based: 's3://chef/my-validator.pem'
knife[:validation_key_url] = 'http://example.com/chef/my-validator.pem'
knife[:s3_secret] = 'http://example.com/chef/encrypted_data_bag_secret'
- Validation Key:
--validation-key-url s3://chef/my-validator.pem
- Encrypted Data Bag Secret:
--s3-secret s3://chef/encrypted_data_bag_secret
This plugin provides the following Knife subcommands. Specific command options can be found by invoking the subcommand with a --help
flag
Provisions a new server in the Amazon EC2 and then perform a Chef bootstrap (using the SSH or WinRM protocols). The goal of the bootstrap is to get Chef installed on the target system so it can run Chef Client with a Chef Server. The main assumption is a baseline OS installation exists (provided by the provisioning). It is primarily intended for Chef Client systems that talk to a Chef server. The examples below create Linux and Windows instances:
# Create some instances -- knife configuration contains the AWS credentials
# A Linux instance via ssh
knife ec2 server create -I ami-d0f89fb9 --ssh-key your-public-key-id -f m1.medium --ssh-user ubuntu --identity-file ~/.ssh/your-private-key
# A Windows instance via the WinRM protocol -- --ssh-key is still required due to EC2 API operations that need it to grant access to the Windows instance
# `--spot-price` option lets you specify the spot pricing
knife ec2 server create -I ami-173d747e -G windows -f m1.medium --user-data ~/your-user-data-file -x '.\a_local_user' -P 'yourpassword' --ssh-key your-public-key-id --spot-price price-in-USD
# Pass --server-connect-attribute to specify the instance attribute that we will try to connect to via ssh/winrm
# Possible values of --server-connect-attribute: private_dns_name, private_ip_address, dns_name, public_ip_address
# If --server-connect-attribute is not specified, knife attempts to determine if connecting to the instance's public or private IP is most appropriate based on other settings
knife ec2 server create -I ami-173d747e -x ubuntu --server-connect-attribute public_ip_address
View additional information on configuring Windows images for bootstrap in the documentation for knife-windows.
Users can also include the ec2 server id in the node name by placing %s
in the string passed to the --chef-node-name
option. The %s is replaced by the ec2 server id dynamically.
e.g. -N "www-server-%s" or --chef-node-name "www-server-%s"
Bootstrap Windows (2012 R2 and above platform) instance without user-data through winrm ssl transport
Users can bootstrap the Windows instance without the need to provide the user-data. knife-ec2
has the ability to bootstrap the Windows instance through winrm protocol
using the ssl
transport. This requires users to set --winrm-transport
option as ssl
and --winrm-ssl-verify-mode
option as verify_none
. This will do the necessary winrm ssl transport configurations on the target node and the bootstrap will just work.
Note: Users also need to pass the --security-group-ids
option with IDs of the security group(s) having the required ports opened like 5986
for winrm ssl transport. In case if --security-group-ids
option is not passed then make sure that the default security group in your account has the required ports opened.
Below is the sample command to create a Windows instance and bootstrap it through ssl
transport without passing any user-data:
knife ec2 server create -N chef-node-name -I your-windows-image -f flavor-of-server -x '.\a_local_user' -P 'yourpassword' --ssh-key your-public-key-id --winrm-transport ssl --winrm-ssl-verify-mode verify_none --security-group-ids your-security-groups -VV
The knife ec2 server create
command also supports the following options for bootstrapping a Windows node after the VM s created:
:winrm_password The WinRM password
:winrm_authentication_protocol Defaults to negotiate, supports kerberos, can be set to basic for debugging
:winrm_transport Defaults to plaintext, use ssl for improved security
:winrm_port Defaults to 5985 plaintext transport, or 5986 for SSL
:ca_trust_file The CA certificate file to use to verify the server when using SSL
:winrm_ssl_verify_mode Defaults to verify_peer, use verify_none to skip validation of the server certificate during testing
:kerberos_keytab_file The Kerberos keytab file used for authentication
:kerberos_realm The Kerberos realm used for authentication
:kerberos_service The Kerberos service used for authentication
This command provides the feature to list all EC2 AMIs. It also provides the feature to filter the AMIs based on owner and platform.
knife ec2 ami list
-
Owner: By default owner is aws-marketplace but you can specify following owner with the help of -o or --owner:
command: knife ec2 ami list -o (options)
:self Displays the list of AMIs created by the user. :aws-marketplace Displays all AMIs form trusted vendors like Ubuntu, Microsoft, SAP, Zend as well as many open source offering. :micosoft Displays only Microsoft vendor AMIs.
-
Platform: By default all platform AMIs are displayed, but you can filter your response by specifying the platform using -p or --platform:
command: knife ec2 ami list -p (options)
:Allowed platform windows, ubuntu, debian, centos, fedora, rhel, nginx, turnkey, jumpbox, coreos, cisco, amazon, nessus
-
Search: User can search any string into the description column by using -s or --search:
command: knife ec2 ami list -s (search_keyword)
:search_keyword Any String or number
Outputs a list of all servers in the currently configured AWS account. Note, this shows all instances associated with the account, some of which may not be currently managed by the Chef server.
Outputs a list of all instance types comprising varying combinations of CPU, memory, storage, and architecture capacity of the currently configured AWS account. Note, this shows all instances type associated with the account.
Deletes an existing server in the currently configured AWS account. By default, this does not delete the associated node and client objects from the Chef server. To do so, add the --purge
flag
- Author:: Adam Jacob ([email protected])
Copyright 2009-2015 Chef Software, Inc.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.