Hi Nash,

Thanks for the question.  My standard pattern thus far (after we
discussed and confirmed this at DebConf last year) is to only keep the
latest point release of AMIs available directly. With situations where
there may be default vulnerabilities in the base AMIs (such as in
Heartbleed), I think we want to minimise anyone accidentally running an
image with known weaknesses.

I posted here on 11 Apr that due to the nature, new AMIs were generated,
and a that a week later we would remove the older ones - a short time
frame, but relatively urgent. I actually left nearly 2 weeks of
transition, and then removed public sharing from the older AMIs for a
further few days before deleting the 7.4 AMIs (superseded with 7.4a, and
now further superseded by 7.5).

I haven't yet posted about deprecating 7.4a as there is no immediate
rush - but this reminds me that we should. I'll send that over the
weekend ins a separate email, clearly marked with an appropriate
subject. Since we dont (yet) have a security reason to replace this, we
can leave a nice long transition time before removing the older release.
I'd be keen to hear how much time you (and other users on list) think we
should leave before removing older point releases (when there isn't a
known vulnerability, and when there is).

If you wish, you can effectively clone the AMIs into your account, and
then you can keep them for as long as you want.  I'd recommend this for
production AutoScale Groups - if you have a copy of the AMI in your
account (ie; your snapshot) then they are completely under your control.
This is probably a good thing regardless of what operating system AMIs
you are using.

All OS vendors/distributions update their AMIs from time to time - and
each time this is a new AMI I on EC2.

My aim is to ensure we get the current point release AMIs out quickly,
and give as long transition period as we think is safe.



  James


On 30/04/2014 8:04 AM, nash wrote:
>
> It looks like you deleted the older AMIs right away. I'm curious if
this is the normal procedure. We want to use the Debian images for
production but need to have some wiggle room to qa test them before they
go away.
>
> --nash
>
> On Apr 27, 2014 7:52 AM, "James Bromberger" <[email protected]
<mailto:[email protected]>> wrote:
>
>     Hello all,
>
>     Following this weekend's release of Debian Wheezy 7.5 [1], please
find the following AMIs now available globally in AWS EC2:
>
> Virtualisation  Para-virtualisation (PVM)                      
> Hardware Virtualisation (HVM)
> Root filesystem EBS             EBS             Instance store  EBS
> -------------------------------------------------------------------------------
> Architecture    i386            x86_64          x86_64          x86_64
> US-East-1       ami-90886cf8    ami-2c886c44    ami-848a6eec   
> ami-86896dee
> US-West-1       ami-6895ad2d    ami-5c95ad19    ami-d495ad91   
> ami-0e95ad4b
> US-West-2       ami-a0760290    ami-40760270    ami-ee7703de   
> ami-10770320
> EU-West-1       ami-510fcb26    ami-630fcb14    ami-a70fcbd0   
> ami-210fcb56
> AP-Southeast-1  ami-24fba876    ami-22fba870    ami-7cfaa92e   
> ami-dcfba88e
> AP-Southeast-2  ami-24fba876    ami-edc75cd7    ami-0bc65d31   
> ami-33c65d09
> AP-Northeast-1  ami-c7296cc6    ami-91296c90    ami-b53570b4   
> ami-112b6e10
> SA-East-1       ami-ffb815e2    ami-c3b815de    ami-efb815f2   
> ami-f5b815e8
> US-Gov-West-1
> CN-North-1      -               ami-c6b123ff    -              
> ami-38b62401
>
>
>
>     Please take care to update any CloudFormation templates and
AutoScale groups to use these newer AMI IDs (or clone these updated AMIs
into your account and use your own AMI IDs). These were generated by the
current version of bootstrap-vz as found in github; no additional
improvements were made over and above what landed for the impromptu 7.4a
release (Console to hvc0, Cloudinit not testing other metadata services,
S3 backed AMIs to 4 GB root (from 1GB), and all pending security updates
until that point in time which for 7.4a was the heartbleed libssl fix in
particular).
>
>     AWS GovCloud and AWS Marketplace updates will be pushed in a few
days should no issues arise here.
>
>     For any existing instances, please pay attention to pending
security updates (as always) with apt-get update && apt-get upgrade, and
please consider installing the unattended-upgrades package to help keep
your instance(s) up to date.
>
>     More information is on the Wiki at
https://wiki.debian.org/Cloud/AmazonEC2Image/Wheezy
>
>       James
>     [1] https://www.debian.org/News/2014/20140426

Reply via email to