You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Aug 7, 2025. It is now read-only.
If the `ssh` command throws an error like "Identity file not accessible" or "bad permissions", then please make sure that the key file has a restrictive `0400` permission as illustrated [here]({{< relref "ec2#create-a-key-pair" >}}).
214
+
If the `ssh` command throws an error like "Identity file not accessible" or "bad permissions", make sure that the key file has a restrictive `0400` permission as illustrated above.
215
215
{{< /callout >}}
216
216
217
217
## VM Managers
@@ -251,8 +251,8 @@ While the records of resources will be persisted, the instances or AMIs themselv
251
251
252
252
### AMIs
253
253
254
-
LocalStack utilizes a specific naming scheme to recognize and manage associated containers and images.
255
254
Docker base images which are tagged with the scheme `localstack-ec2/<AmiName>:<AmiId>` are recognized as Amazon Machine Images (AMIs).
255
+
These can be used to launch EC2 instances which are in fact Docker containers.
256
256
257
257
You can mark any Docker base image as AMI using the below command:
258
258
@@ -267,28 +267,27 @@ At startup, LocalStack downloads the following AMIs that can be used to launch D
267
267
- Amazon Linux 2023 `ami-024f768332f0`
268
268
269
269
{{< callout "note" >}}
270
-
The auto download of Docker images to be used as AMIs can be disabled using the `EC2_DOWNLOAD_DEFAULT_IMAGES=0` configuration variable.
270
+
The auto download of Docker images for default AMIs can be disabled using the `EC2_DOWNLOAD_DEFAULT_IMAGES=0` configuration variable.
271
271
{{< /callout >}}
272
272
273
273
All LocalStack-managed Docker AMIs bear the resource tag `ec2_vm_manager:docker`.
If an AMI does have the `ec2_vm_manager:docker` tag, it means that it is mocked.
281
+
If an AMI does not have the `ec2_vm_manager:docker` tag, it means that it is mocked.
282
282
Attempting to launch Dockerized instances using these AMIs will result in an `InvalidAMIID.NotFound` error.
283
283
See [Mock VM manager](#mock-vm-manager).
284
284
{{< /callout >}}
285
285
286
-
AWS does not provide an API to download AMIs.
287
-
This prevents the use stock AWS AMIs on LocalStack.
288
-
However, in certain cases it may be possible to tweak your AMI build process to target Docker images.
286
+
AWS does not provide an API to download AMIs which prevents the use of real AWS AMIs on LocalStack.
287
+
However, in certain cases it may be possible to tweak your workflow to make it work with Localstack.
289
288
290
-
For example, suppose you use [Packer](https://packer.io/) to customise the Amazon Linux AMI on AWS.
291
-
You can instead make Packer use the [Docker builder](https://developer.hashicorp.com/packer/integrations/hashicorp/docker/latest/components/builder/docker) instead of the Amazon builder and add the customisations on top of the Amazon Linux [Docker base image](https://hub.docker.com/_/amazonlinux/).
289
+
For example, you can use [Packer](https://packer.io/) to customise the Amazon Linux AMI on AWS.
290
+
Packer can be made to use the [Docker builder](https://developer.hashicorp.com/packer/integrations/hashicorp/docker/latest/components/builder/docker) instead of the Amazon builder and add the customisations on top of the Amazon Linux [Docker base image](https://hub.docker.com/_/amazonlinux/).
292
291
The final image then can be used by LocalStack EC2 as illustrated above.
293
292
294
293
### Instances
@@ -321,26 +320,27 @@ These addresses are also printed in the logs while the instance is being initial
321
320
When instances are launched, LocalStack attempts to start SSH server `/usr/sbin/sshd` in the Docker base image.
322
321
If not found, it installs and starts the [Dropbear](https://github.com/mkj/dropbear) SSH server.
323
322
324
-
To be able to access the instance at additional ports from the host system, you can modify the default security group and incorporate the needed ingress ports.
323
+
To be able to access the instance at additional ports from the host system, you can modify the default security group and include the required ingress ports.
325
324
326
325
{{< callout "note" >}}
327
326
Security group ingress rules are applied only during the creation of the Dockerized instance.
328
327
Modifying a security group will not open any ports for a running instance.
329
328
{{< /callout >}}
330
329
331
330
The system supports up to 32 ingress ports.
332
-
This constraint is in place to prevent the host from exhausting available ports.
331
+
This constraint is in place to prevent exhausting free ports on the host.
0 commit comments