diff --git a/README.md b/README.md index 22fbe8dd46..6f1b87baa6 100644 --- a/README.md +++ b/README.md @@ -46,8 +46,7 @@ cluster on AWS. - Native Kubernetes manifests and API - Manages the bootstrapping of VPCs, gateways, security groups and instances. -- Choice of Linux distribution among Amazon Linux 2, CentOS 7, Ubuntu and Flatcar - using [pre-baked AMIs][published_amis]. +- Choice of Linux distribution using [pre-baked AMIs][published_amis]. - Deploys Kubernetes control planes into private subnets with a separate bastion server. - Doesn't use SSH for bootstrapping nodes. diff --git a/docs/book/src/development/amis.md b/docs/book/src/development/amis.md index 5afea57036..6d24d65a90 100644 --- a/docs/book/src/development/amis.md +++ b/docs/book/src/development/amis.md @@ -1,30 +1,82 @@ # Publish AMIs -Publishing new AMIs is currently a manual process but it will be automated in th every near future (see [this issue](https://github.com/kubernetes-sigs/cluster-api-provider-aws/issues/1982) for progress). +Publishing new AMIs is done via manually invoking a GitHub Actions workflow. -## Pre-reqs +> NOTE: the plan is to ultimately fully automate the process in the future (see [this issue](https://github.com/kubernetes-sigs/cluster-api-provider-aws/issues/1982) for progress). -- You must have admin access to the CNCF AWAS account used for the AMIs (819546954734) +> NOTE: there are some issues with the RHEL based images at present. + +## Get build inputs + +For a new Kubernetes version that you want to build an AMI for you will need to determine the following values: + +| Input | Description | +| ----------------- | ----------- | +| kubernetes_semver | The semver version of k8s you want to build an AMI for. In format vMAJOR.MINOR.PATCH. | +| kubernetes_series | The release series for the Kubernetes version. In format vMAJOR.MINOR. | +| kubernetes_deb_version | The version of the debian package for the release. | +| kubernetes_rpm_version | The version of the rpm package for the release | +| kubernetes_cni_semver | The version of CNI to include. It needs to match the k8s release. | +| kubernetes_cni_deb_version | The version of the debian package for the CNI release to use | +| crictl_version | The vesion of the cri-tools package to install into the AMI | + +You can determine these values directly or by looking at the publish debian apt repositories for the k8s release. + +## Build + +### Using GitHub Actions Workflow + +To build the AMI using GitHub actions you must have write access to the CAPA repository (i.e. be a maintainer or part of release team). + +To build the new version: -## Process +1. Got to the GitHub Action +2. Click the **Start Workflow** button +3. Fill in the details of the build +4. Click **Run** + +### Manually + +> **WARNING: the manual process should only be followed in exceptional circumstances. + +To build manually you must have admin access to the CNCF AWS account used for the AMIs. + +The steps to build manually are: 1. Clone [image-builder](https://github.com/kubernetes-sigs/image-builder) 2. Open a terminal -3. Set the AWS environment variables for the AMI account +3. Set the AWS environment variables for the CAPA AMI account 4. Change directory into `images/capi` -5. Install dependencies by running: +5. Create a new file called `vars.json` with the following content (substituing the values with the build inputs): + +```json +{ + "kubernetes_rpm_version": "", + "kubernetes_semver": "", + "kubernetes_series": "", + "kubernetes_deb_version": "", + "kubernetes_cni_semver": "", + "kubernetes_cni_deb_version": "", + "crictl_version": "" +} +``` +6. Install dependencies by running: ```shell make deps-ami ``` -6. Build the AMIs using: +7. Build the AMIs using: ```shell -make build-ami-ubuntu-2004 -make build-ami-ubuntu-2204 -make build-ami-ubuntu-2404 -make build-ami-flatcar -make build-ami-rhel-8 +PACKER_VAR_FILES=vars.json make build-ami-ubuntu-2204 +PACKER_VAR_FILES=vars.json make build-ami-ubuntu-2404 +PACKER_VAR_FILES=vars.json make build-ami-flatcar +PACKER_VAR_FILES=vars.json make build-ami-rhel-8 ``` -> NOTE: there are some issues with the RHEL based images at present. +## Additional Information + +- The AMIs are hosted in a CNCF owned AWS account (819546954734). +- The AWS resources that are needed to support the GitHub Actions workflow are created via terraform. Source is [here](https://github.com/kubernetes/k8s.io/tree/main/infra/aws/terraform/cncf-k8s-infra-aws-capa-ami). +- OIDC and IAM Roles are used to grant access via short lived credentials to the GitHub Action workflow instance when it runs. + diff --git a/docs/book/src/topics/images/built-amis.md b/docs/book/src/topics/images/built-amis.md index 2619c2655e..b3903eea62 100644 --- a/docs/book/src/topics/images/built-amis.md +++ b/docs/book/src/topics/images/built-amis.md @@ -1,19 +1,28 @@ # Pre-built Kubernetes AMIs -New AMIs are built on a best effort basis when a new Kubernetes version is released. for each supported OS distribution and then published to supported regions. +New AMIs are built on a best effort basis when a new Kubernetes version is released for each supported OS distribution and then published to supported regions. + +## AMI Publication Policy + +- AMIs should only be used for non-production usage. For production environments we recommend that you build and maintain your own AMIs using the image-builder project. +- AMIs will only be published for the latest release series and 2 previous release series. For example, if the current release series is v1.30 then AMIs will only be published for v1.30, v1.29, v1.28. +- When there is a new k8s release series then any AMIs no longer covered by the previous point will be deleted. For example, when v1.31.0 is published then any AMIs for the v1.28 release series will be deleted. +- Existing AMIs are not updated for security fixes and it is recommended to always use the latest patch version for the Kubernetes version you want to run. + +> NOTE: As the old community images where located in an AWS account that the project no longer has access to and because those AMIs have been automatically deleted we have started publishing images again from v1.29.9 + +## Finding AMIs `clusterawsadm ami list` command lists pre-built reference AMIs by Kubernetes version, OS, or AWS region. See [clusterawsadm ami list](https://cluster-api-aws.sigs.k8s.io/clusterawsadm/clusterawsadm_ami_list.html) for details. If you are using a version of clusterawsadm prior to v2.6.2 then you will need to explicitly specify the owner-id for the community account: `clusterawsadm ami list --owner-id 819546954734`. -> **Note:** These images are not updated for security fixes and it is recommended to always use the latest patch version for the Kubernetes version you want to run. For production environments, it is highly recommended to build and use your own custom images. - ## Supported OS Distributions -- Amazon Linux 2 (amazon-2) -- Ubuntu (ubuntu-20.04, ubuntu-22.04, ubuntu-24.04) -- Centos (centos-7) +- Ubuntu (ubuntu-22.04, ubuntu-24.04) - Flatcar (flatcar-stable) +> Note: Centos (centos-7) and Amazon Linux 2 (amazon-2) where supported but there are some issues with the AMI build that need fixing. + ## Supported AWS Regions - ap-northeast-1 - ap-northeast-2 diff --git a/pkg/cloud/services/ec2/ami.go b/pkg/cloud/services/ec2/ami.go index bcec5e9f5f..163b155e9e 100644 --- a/pkg/cloud/services/ec2/ami.go +++ b/pkg/cloud/services/ec2/ami.go @@ -60,7 +60,7 @@ const ( ubuntuOwnerIDUsGov = "513442679011" // Description regex for fetching Ubuntu AMIs for bastion host. - ubuntuImageDescription = "Canonical??Ubuntu??20.04?LTS??amd64?focal?image*" + ubuntuImageDescription = "Canonical??Ubuntu??24.04?LTS??amd64?noble?image*" // defaultMachineAMILookupBaseOS is the default base operating system to use // when looking up machine AMIs. diff --git a/pkg/cloud/services/userdata/bastion.go b/pkg/cloud/services/userdata/bastion.go index da68768ca2..256a3b4985 100644 --- a/pkg/cloud/services/userdata/bastion.go +++ b/pkg/cloud/services/userdata/bastion.go @@ -26,7 +26,7 @@ curl -s -o $BASTION_BOOTSTRAP_FILE $BASTION_BOOTSTRAP chmod +x $BASTION_BOOTSTRAP_FILE # This gets us far enough in the bastion script to be useful. -apt-get -y update && apt-get -y install python-pip +apt-get -y update && apt-get -y install python3-pip pip install --upgrade pip &> /dev/null ./$BASTION_BOOTSTRAP_FILE --enable true