diff --git a/website/source/docs/builders/amazon-ebs.html.markdown b/website/source/docs/builders/amazon-ebs.html.markdown index 8a1a8ccc8..eb1782464 100644 --- a/website/source/docs/builders/amazon-ebs.html.markdown +++ b/website/source/docs/builders/amazon-ebs.html.markdown @@ -58,6 +58,12 @@ Required: Optional: +* `ami_block_device_mappings` (array of block device mappings) - Add the block + device mappings to the AMI. The block device mappings allow for keys: + "device_name" (string), "virtual_name" (string), "snapshot_id" (string), + "volume_type" (string), "volume_size" (int), "delete_on_termination" (bool), + and "iops" (int). + * `ami_description` (string) - The description to set for the resulting AMI(s). By default this description is empty. @@ -77,6 +83,10 @@ Optional: [IAM instance profile](http://docs.aws.amazon.com/IAM/latest/UserGuide/instance-profiles.html) to launch the EC2 instance with. +* `launch_block_device_mappings` (array of block device mappings) - Add the + block device mappings to the launch instance. The block device mappings are + the same as `ami_block_device_mappings` above. + * `security_group_id` (string) - The ID (_not_ the name) of the security group to assign to the instance. By default this is not set and Packer will automatically create a new temporary security group to allow SSH @@ -130,6 +140,34 @@ the section above for more information on what environmental variables Packer will look for. +## AMI Block Device Mappings Example + +Here is an example using the optional AMI block device mappings. This will add +the /dev/sdb and /dev/sdc block device mappings to the finished AMI. + +
+{
+ "type": "amazon-ebs",
+ "access_key": "YOUR KEY HERE",
+ "secret_key": "YOUR SECRET KEY HERE",
+ "region": "us-east-1",
+ "source_ami": "ami-de0d9eb7",
+ "instance_type": "t1.micro",
+ "ssh_username": "ubuntu",
+ "ami_name": "packer-quick-start {{timestamp}}",
+ "ami_block_device_mappings": [
+ {
+ "device_name": "/dev/sdb",
+ "virtual_name": "ephemeral0"
+ },
+ {
+ "device_name": "/dev/sdc",
+ "virtual_name": "ephemeral1"
+ }
+ ]
+}
+
+
## Tag Example
Here is an example using the optional AMI tags. This will add the tags
diff --git a/website/source/docs/builders/amazon-instance.html.markdown b/website/source/docs/builders/amazon-instance.html.markdown
index 3622c2b34..0e56dce80 100644
--- a/website/source/docs/builders/amazon-instance.html.markdown
+++ b/website/source/docs/builders/amazon-instance.html.markdown
@@ -73,6 +73,13 @@ Required:
Optional:
+* `ami_block_device_mappings` (array of block device mappings) - Add the block
+ device mappings to the AMI. The block device mappings allow for keys:
+ "device_name" (string), "virtual_name" (string), "snapshot_id" (string),
+ "volume_type" (string), "volume_size" (int), "delete_on_termination" (bool),
+ and "iops" (int). See [amazon-ebs](/docs/builders/amazon-ebs.html) for an
+ example template.
+
* `ami_description` (string) - The description to set for the resulting
AMI(s). By default this description is empty.
@@ -108,6 +115,10 @@ Optional:
[IAM instance profile](http://docs.aws.amazon.com/IAM/latest/UserGuide/instance-profiles.html)
to launch the EC2 instance with.
+* `launch_block_device_mappings` (array of block device mappings) - Add the
+ block device mappings to the launch instance. The block device mappings are
+ the same as `ami_block_device_mappings` above.
+
* `security_group_id` (string) - The ID (_not_ the name) of the security
group to assign to the instance. By default this is not set and Packer
will automatically create a new temporary security group to allow SSH