Received: from out2-smtp.messagingengine.com (out2-smtp.messagingengine.com [66.111.4.26]) by nld3-dev1.alpinelinux.org (Postfix) with ESMTPS id EB6FD782BBD for <~alpine/devel@lists.alpinelinux.org>; Sun, 17 Jan 2021 23:56:21 +0000 (UTC) Received: from compute7.internal (compute7.nyi.internal [10.202.2.47]) by mailout.nyi.internal (Postfix) with ESMTP id 03ADE5C0103; Sun, 17 Jan 2021 18:56:20 -0500 (EST) Received: from mailfrontend1 ([10.202.2.162]) by compute7.internal (MEProxy); Sun, 17 Jan 2021 18:56:20 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=crute.us; h=date :from:to:cc:subject:message-id:references:mime-version :content-type:in-reply-to; s=fm3; bh=HDh2US9fcjgE/jb5uyvUrtmp+Xf f+83UhOS/tyMG+i8=; b=Qlwgfkx3OC75FKm9glNv+xCFB6PN2GV7DLTEhrHxHGj ld25A+s4Fw666q0jSnv82SzpQHDVjsZjui+74qijKbs3WDAEA2RrEkwRMZ/gH41W n0ir/kOVDAD4fEUKrlg3vBoCKCmrq/Bed8FcXmdVngvqyyE7Uc7FkDg+9JQWktj8 FSd0sL+neG46kpWJE2UWsarzj3sQEyvJDlShMjRxLAyC7uZjSFK02bVIKIxWapPy muKeZxRIiWwwMpPRoANsdFRl874FcBLBGKCGtU48P4TvdxERHSSleH5fZLHGju9Q SkqSZMziMSqzYcxB84NVOkqFi9EBdmF3Tmgj3mdEZoQ== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-proxy :x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=fm1; bh=HDh2US 9fcjgE/jb5uyvUrtmp+Xff+83UhOS/tyMG+i8=; b=edEFCEM7USruXb1c+8NlIs 7binkHAmep7SlDSuFAa0WbMHVZ7E/w8bMkChbB9PxqH3FxfAAHvFHl1/hHmIgMIO /3EQncrkaKzLh8tCPZJfwiOIgfCs79tu2kkcem2k2VipCYWGecJHl85FV4auGZh9 RERap9akSv/hwWxAl8ojKlKGolVwTki3mKG9yzF2j+/wztZEqzJsl9bqpvcKQUOU RXEENqnLVC1NKblVvtd6PSTAEULB/B4dyPqiwdvlKCFcfXlSYrIJb4REW4blZ8sU 5ajmr3pRUGNxmE3FI3w/HIJ3XquyLBcuvAhneeo2DRL/ALJlJOLoDDXtt48gbPgg == X-ME-Sender: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduledrtdejgdduhecutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmdenuc fjughrpeffhffvuffkfhggtggujgesthdtredttddtvdenucfhrhhomhepofhikhgvucev rhhuthgvuceomhhikhgvsegtrhhuthgvrdhusheqnecuggftrfgrthhtvghrnhepgeejfe ehvdfhledvvefgtefhtddtjedutedtudffleekteeludegveeltdetueeknecuffhomhgr ihhnpehouhhtshgtrghlvgdrtghomhdpphgrtghkvghrrdhiohdpghhithhhuhgsrdgtoh hmnecukfhppeeigedrudekjedrudeikedrudehleenucevlhhushhtvghrufhiiigvpedt necurfgrrhgrmhepmhgrihhlfhhrohhmpehmihhkvgestghruhhtvgdruhhs X-ME-Proxy: Received: from crute.us (unknown [64.187.168.159]) by mail.messagingengine.com (Postfix) with ESMTPA id 3D1B724005E; Sun, 17 Jan 2021 18:56:19 -0500 (EST) Date: Sun, 17 Jan 2021 15:56:17 -0800 From: Mike Crute To: Romain Lecat Cc: ~alpine/devel@lists.alpinelinux.org Subject: Re: Alpine Linux for other cloud providers Message-ID: <20210117235617.GA3369494@crute.us> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: X-Editor: VIM - Vi IMproved 8.2 On Sun, Jan 17, 2021 at 03:13:00AM +0100, Romain Lecat wrote: > Hello Alpine Team, > > Now that you provide an AWS EC2 image of Alpine Linux, since the > latest release, I was wondering if you intended to provide other > formats for other cloud providers? > > I do work for 3DS Outscale (https://en.outscale.com/), a French IaaS > Cloud Provider, as a systems engineer, and I'd be interested to > provide an Alpine Linux Image for our customers. > > Most of AWS EC2 images can be used pretty much as-is on our Cloud > because we provide EC2 Metadata for CloudInit, so most of CloudInit > images do work fine. > > Would it be possible to get a raw of a boot drive of an AMI to see if > I can make it work on our Cloud? > > Thanks, > Best regards, > Romain Lecat Hello Romain, We're very interested in supporting as many cloud providers as possible with the Alpine images. The images are currently being built with Hashicorp Packer using the EC2 driver but you should be able to get them working with the QEMU driver (https://www.packer.io/docs/builders/qemu) which will give you an importable file in RAW or QCOW2 format. The code for the official images is here: https://github.com/mcrute/alpine-ec2-ami/ The images don't currently use cloud-init but rather tiny-ec2-bootstrap (https://github.com/mcrute/tiny-ec2-bootstrap/) which is a very minimal re-implementation that supports only SSH keys and userdata scripts. As long as your metadata interface supports those in the same way as AWS then that should work fine. In the 3.14 release cycle we're planning to migrate to official cloud-init. If you run into any issues getting the image working please file an issue on the alpine-ec2-ami GitHub repo and we'll be happy to help you troubleshoot any issues. It looks like 3DS Outscale supports public images (based on the API docs). Once the images are working would you be interested in listing them on the Alpine Cloud Images page and making them part of our official build and release process? ~mike