packer-cn/website/source/docs/builders/outscale.html.md

3.7 KiB

description layout page_title sidebar_current
Packer is able to create Outscale Machine Images (OMIs). To achieve this, Packer comes with multiple builders depending on the strategy you want to use to build the OMI. docs Outscale OMI - Builders docs-builders-osc

Outscale OMI Builder

Packer is able to create Outscale OMIs. To achieve this, Packer comes with multiple builders depending on the strategy you want to use to build the OMI. Packer supports the following builders at the moment:

  • osc-bsu - Create BSU-backed OMIs by launching a source OMI and re-packaging it into a new OMI after provisioning. If in doubt, use this builder, which is the easiest to get started with.

  • osc-chroot - Create EBS-backed OMIs from an existing OUTSCALE VM by mounting the root device and using a Chroot environment to provision that device. This is an advanced builder and should not be used by newcomers. However, it is also the fastest way to build an EBS-backed OMI since no new OUTSCALE VM needs to be launched.

  • osc-bsusurrogate - Create BSU-backed OMIs from scratch. Works similarly to the chroot builder but does not require running in Outscale VM. This is an advanced builder and should not be used by newcomers.

-> Don't know which builder to use? If in doubt, use the osc-bsu builder. It is much easier to use and Outscale generally recommends BSU-backed images nowadays.

Outscale BSU Volume Builder

Packer is able to create Outscale BSU Volumes which are preinitialized with a filesystem and data.

  • osc-bsuvolume - Create EBS volumes by launching a source OMI with block devices mapped. Provision the VM, then destroy it, retaining the EBS volumes.

Authentication

The OUTSCALE provider offers a flexible means of providing credentials for authentication. The following methods are supported, in this order, and explained below:

  • Static credentials
  • Environment variables
  • Shared credentials file
  • Outscale Role

Static Credentials

Static credentials can be provided in the form of an access key id and secret. These look like:

{
    "access_key": "AKIAIOSFODNN7EXAMPLE",
    "secret_key": "wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY",
    "region": "us-east-1",
    "type": "osc-bsu",
    "oapi_custom_endpoint": "outscale.com/oapi/latest"
}

Environment variables

You can provide your credentials via the OUTSCALE_ACCESSKEYID and OUTSCALE_SECRETKEYID, environment variables, representing your Outscale Access Key and Outscale Secret Key, respectively. The OUTSCALE_REGION and OUTSCALE_OAPI_URL environment variables are also used, if applicable:

Usage:

$ export OUTSCALE_ACCESSKEYID="anaccesskey"
$ export OUTSCALE_SECRETKEYID="asecretkey"
$ export OUTSCALE_REGION="eu-west-2"
$ packer build packer.json

Checking that system time is current

Outscale uses the current time as part of the request signing process. If your system clock is too skewed from the current time, your requests might fail. If that's the case, you might see an error like this:

==> osc-bsu: Error querying OMI: AuthFailure: OUTSCALE was not able to validate the provided access credentials

If you suspect your system's date is wrong, you can compare it against http://www.time.gov/. On Linux/OS X, you can run the date command to get the current time. If you're on Linux, you can try setting the time with ntp by running sudo ntpd -q.