[StarCluster] Security concerns with making a customized starcluster AMI public

Dan Lovell dlovell at gmail.com
Tue Feb 4 14:45:03 EST 2014


We install some system
dependencies<https://github.com/mit-probabilistic-computing-project/crosscat/blob/master/crosscat/starcluster_plugin.py>but
don't copy anything sensitive up.  Currently, we
use ec2cim<https://github.com/mit-probabilistic-computing-project/crosscat/blob/master/README_STARCLUSTER.md#creating-an-ami-from-booted-instance>(ec2-create-image)
from ec2-api-tools.  Though I just realized that
starcluster has its own AMI creation command,
ebsimage<http://star.mit.edu/cluster/docs/latest/manual/create_new_ami.html#creating-an-ebs-backed-ami>
.

Is there anything 'special' that should be done before making a customized
starcluster AMI pubilc via either of the above methods?

Thanks,
Dan

PS: my concerns coming from reading
http://alestic.com/2011/06/ec2-ami-security and not knowing enough about
what starcluster does when spinning up an instance to be confident enough
to release an AMI.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mailman.mit.edu/pipermail/starcluster/attachments/20140204/5401e9ca/attachment.htm


More information about the StarCluster mailing list