# Using Cloud-Config CoreOS allows you to declaratively customize various OS-level items, such as network configuration, user accounts, and systemd units. This document describes the full list of items we can configure. The `coreos-cloudinit` program uses these files as it configures the OS after startup or during runtime. Your cloud-config is processed during each boot. Invalid cloud-config won't be processed but will be logged in the journal. You can validate your cloud-config with the [CoreOS validator]({{site.url}}/validate) or by running `coreos-cloudinit -validate`. In addition to `coreos-cloudinit -validate` command and https://coreos.com/validate/ online service you can debug `coreos-cloudinit` system output through the `journalctl` tool: ```sh journalctl _EXE=/usr/bin/coreos-cloudinit ``` It will show `coreos-cloudinit` run output which was triggered by system boot. ## Configuration File The file used by this system initialization program is called a "cloud-config" file. It is inspired by the [cloud-init][cloud-init] project's [cloud-config][cloud-config] file, which is "the defacto multi-distribution package that handles early initialization of a cloud instance" ([cloud-init docs][cloud-init-docs]). Because the cloud-init project includes tools which aren't used by CoreOS, only the relevant subset of its configuration items will be implemented in our cloud-config file. In addition to those, we added a few CoreOS-specific items, such as etcd configuration, OEM definition, and systemd units. We've designed our implementation to allow the same cloud-config file to work across all of our supported platforms. [cloud-init]: https://launchpad.net/cloud-init [cloud-init-docs]: http://cloudinit.readthedocs.org/en/latest/index.html [cloud-config]: http://cloudinit.readthedocs.org/en/latest/topics/format.html#cloud-config-data ### File Format The cloud-config file uses the [YAML][yaml] file format, which uses whitespace and new-lines to delimit lists, associative arrays, and values. A cloud-config file must contain a header: either `#cloud-config` for processing as cloud-config (suggested) or `#!` for processing as a shell script (advanced). If cloud-config has #cloud-config header, it should followed by an associative array which has zero or more of the following keys: - `coreos` - `ssh_authorized_keys` - `hostname` - `users` - `write_files` - `manage_etc_hosts` The expected values for these keys are defined in the rest of this document. If cloud-config header starts on `#!` then coreos-cloudinit will recognize it as shell script which is interpreted by bash and run it as transient systemd service. [yaml]: https://en.wikipedia.org/wiki/YAML ### Providing Cloud-Config with Config-Drive CoreOS tries to conform to each platform's native method to provide user data. Each cloud provider tends to be unique, but this complexity has been abstracted by CoreOS. You can view each platform's instructions on their documentation pages. The most universal way to provide cloud-config is [via config-drive](https://github.com/coreos/coreos-cloudinit/blob/master/Documentation/config-drive.md), which attaches a read-only device to the machine, that contains your cloud-config file. ## Configuration Parameters ### coreos #### etcd (deprecated. see etcd2) The `coreos.etcd.*` parameters will be translated to a partial systemd unit acting as an etcd configuration file. If the platform environment supports the templating feature of coreos-cloudinit it is possible to automate etcd configuration with the `$private_ipv4` and `$public_ipv4` fields. For example, the following cloud-config document... ```yaml #cloud-config coreos: etcd: name: node001 # generate a new token for each unique cluster from https://discovery.etcd.io/new discovery: https://discovery.etcd.io/ # multi-region and multi-cloud deployments need to use $public_ipv4 addr: $public_ipv4:4001 peer-addr: $private_ipv4:7001 ``` ...will generate a systemd unit drop-in for etcd.service with the following contents: ```yaml [Service] Environment="ETCD_NAME=node001" Environment="ETCD_DISCOVERY=https://discovery.etcd.io/" Environment="ETCD_ADDR=203.0.113.29:4001" Environment="ETCD_PEER_ADDR=192.0.2.13:7001" ``` For more information about the available configuration parameters, see the [etcd documentation][etcd-config]. _Note: The `$private_ipv4` and `$public_ipv4` substitution variables referenced in other documents are only supported on Amazon EC2, Google Compute Engine, OpenStack, Rackspace, DigitalOcean, and Vagrant._ [etcd-config]: https://github.com/coreos/etcd/blob/9fa3bea5a22265151f0d5063ce38a79c5b5d0271/Documentation/configuration.md #### etcd2 The `coreos.etcd2.*` parameters will be translated to a partial systemd unit acting as an etcd configuration file. If the platform environment supports the templating feature of coreos-cloudinit it is possible to automate etcd configuration with the `$private_ipv4` and `$public_ipv4` fields. When generating a [discovery token](https://discovery.etcd.io/new?size=3), set the `size` parameter, since etcd uses this to determine if all members have joined the cluster. After the cluster is bootstrapped, it can grow or shrink from this configured size. For example, the following cloud-config document... ```yaml #cloud-config coreos: etcd2: # generate a new token for each unique cluster from https://discovery.etcd.io/new?size=3 discovery: https://discovery.etcd.io/ # multi-region and multi-cloud deployments need to use $public_ipv4 advertise-client-urls: http://$public_ipv4:2379 initial-advertise-peer-urls: http://$private_ipv4:2380 # listen on both the official ports and the legacy ports # legacy ports can be omitted if your application doesn't depend on them listen-client-urls: http://0.0.0.0:2379,http://0.0.0.0:4001 listen-peer-urls: http://$private_ipv4:2380,http://$private_ipv4:7001 ``` ...will generate a systemd unit drop-in for etcd2.service with the following contents: ```yaml [Service] Environment="ETCD_DISCOVERY=https://discovery.etcd.io/" Environment="ETCD_ADVERTISE_CLIENT_URLS=http://203.0.113.29:2379" Environment="ETCD_INITIAL_ADVERTISE_PEER_URLS=http://192.0.2.13:2380" Environment="ETCD_LISTEN_CLIENT_URLS=http://0.0.0.0:2379,http://0.0.0.0:4001" Environment="ETCD_LISTEN_PEER_URLS=http://192.0.2.13:2380,http://192.0.2.13:7001" ``` For more information about the available configuration parameters, see the [etcd documentation][etcd-config]. _Note: The `$private_ipv4` and `$public_ipv4` substitution variables referenced in other documents are only supported on Amazon EC2, Google Compute Engine, OpenStack, Rackspace, DigitalOcean, and Vagrant._ [etcd-config]: https://github.com/coreos/etcd/blob/86e616c6e974828fc9119c1eb0f6439577a9ce0b/Documentation/configuration.md #### fleet The `coreos.fleet.*` parameters work very similarly to `coreos.etcd2.*`, and allow for the configuration of fleet through environment variables. For example, the following cloud-config document... ```yaml #cloud-config coreos: fleet: public-ip: $public_ipv4 metadata: region=us-west ``` ...will generate a systemd unit drop-in like this: ```yaml [Service] Environment="FLEET_PUBLIC_IP=203.0.113.29" Environment="FLEET_METADATA=region=us-west" ``` List of fleet configuration parameters: - **agent_ttl**: An Agent will be considered dead if it exceeds this amount of time to communicate with the Registry - **engine_reconcile_interval**: Interval in seconds at which the engine should reconcile the cluster schedule in etcd - **etcd_cafile**: Path to CA file used for TLS communication with etcd - **etcd_certfile**: Provide TLS configuration when SSL certificate authentication is enabled in etcd endpoints - **etcd_keyfile**: Path to private key file used for TLS communication with etcd - **etcd_key_prefix**: etcd prefix path to be used for fleet keys - **etcd_request_timeout**: Amount of time in seconds to allow a single etcd request before considering it failed - **etcd_servers**: Comma separated list of etcd endpoints - **metadata**: Comma separated key/value pairs that are published with the local to the fleet registry - **public_ip**: IP accessible by other nodes for inter-host communication - **verbosity**: Enable debug logging by setting this to an integer value greater than zero For more information on fleet configuration, see the [fleet documentation][fleet-config]. [fleet-config]: https://github.com/coreos/fleet/blob/master/Documentation/deployment-and-configuration.md#configuration #### flannel The `coreos.flannel.*` parameters also work very similarly to `coreos.etcd2.*` and `coreos.fleet.*`. They can be used to set environment variables for flanneld. For example, the following cloud-config... ```yaml #cloud-config coreos: flannel: etcd_prefix: /coreos.com/network2 ``` ...will generate a systemd unit drop-in like so: ``` [Service] Environment="FLANNELD_ETCD_PREFIX=/coreos.com/network2" ``` List of flannel configuration parameters: - **etcd_endpoints**: Comma separated list of etcd endpoints - **etcd_cafile**: Path to CA file used for TLS communication with etcd - **etcd_certfile**: Path to certificate file used for TLS communication with etcd - **etcd_keyfile**: Path to private key file used for TLS communication with etcd - **etcd_prefix**: etcd prefix path to be used for flannel keys - **ip_masq**: Install IP masquerade rules for traffic outside of flannel subnet - **subnet_file**: Path to flannel subnet file to write out - **interface**: Interface (name or IP) that should be used for inter-host communication - **public_ip**: IP accessible by other nodes for inter-host communication For more information on flannel configuration, see the [flannel documentation][flannel-readme]. [flannel-readme]: https://github.com/coreos/flannel/blob/master/README.md #### locksmith The `coreos.locksmith.*` parameters can be used to set environment variables for locksmith. For example, the following cloud-config... ```yaml #cloud-config coreos: locksmith: endpoint: http://example.com:2379 ``` ...will generate a systemd unit drop-in like so: ``` [Service] Environment="LOCKSMITHD_ENDPOINT=http://example.com:2379" ``` List of locksmith configuration parameters: - **endpoint**: Comma separated list of etcd endpoints - **etcd_cafile**: Path to CA file used for TLS communication with etcd - **etcd_certfile**: Path to certificate file used for TLS communication with etcd - **etcd_keyfile**: Path to private key file used for TLS communication with etcd For the complete list of locksmith configuration parameters, see the [locksmith documentation][locksmith-readme]. [locksmith-readme]: https://github.com/coreos/locksmith/blob/master/README.md #### update The `coreos.update.*` parameters manipulate settings related to how CoreOS instances are updated. These fields will be written out to and replace `/etc/coreos/update.conf`. If only one of the parameters is given it will only overwrite the given field. The `reboot-strategy` parameter also affects the behaviour of [locksmith](https://github.com/coreos/locksmith). - **reboot-strategy**: One of "reboot", "etcd-lock", "best-effort" or "off" for controlling when reboots are issued after an update is performed. - _reboot_: Reboot immediately after an update is applied. - _etcd-lock_: Reboot after first taking a distributed lock in etcd, this guarantees that only one host will reboot concurrently and that the cluster will remain available during the update. - _best-effort_ - If etcd is running, "etcd-lock", otherwise simply "reboot". - _off_ - Disable rebooting after updates are applied (not recommended). - **server**: The location of the [CoreUpdate][coreupdate] server which will be queried for updates. Also known as the [omaha][omaha-docs] server endpoint. - **group**: signifies the channel which should be used for automatic updates. This value defaults to the version of the image initially downloaded. (one of "master", "alpha", "beta", "stable") [coreupdate]: https://coreos.com/products/coreupdate [omaha-docs]: https://coreos.com/docs/coreupdate/custom-apps/coreupdate-protocol/ *Note: cloudinit will only manipulate the locksmith unit file in the systemd runtime directory (`/run/systemd/system/locksmithd.service`). If any manual modifications are made to an overriding unit configuration file (e.g. `/etc/systemd/system/locksmithd.service`), cloudinit will no longer be able to control the locksmith service unit.* ##### Example ```yaml #cloud-config coreos: update: reboot-strategy: etcd-lock ``` #### units The `coreos.units.*` parameters define a list of arbitrary systemd units to start after booting. This feature is intended to help you start essential services required to mount storage and configure networking in order to join the CoreOS cluster. It is not intended to be a Chef/Puppet replacement. Each item is an object with the following fields: - **name**: String representing unit's name. Required. - **runtime**: Boolean indicating whether or not to persist the unit across reboots. This is analogous to the `--runtime` argument to `systemctl enable`. The default value is false. - **enable**: Boolean indicating whether or not to handle the [Install] section of the unit file. This is similar to running `systemctl enable `. The default value is false. - **content**: Plaintext string representing entire unit file. If no value is provided, the unit is assumed to exist already. - **command**: Command to execute on unit: start, stop, reload, restart, try-restart, reload-or-restart, reload-or-try-restart. The default behavior is to not execute any commands. - **mask**: Whether to mask the unit file by symlinking it to `/dev/null` (analogous to `systemctl mask `). Note that unlike `systemctl mask`, **this will destructively remove any existing unit file** located at `/etc/systemd/system/`, to ensure that the mask succeeds. The default value is false. - **drop-ins**: A list of unit drop-ins with the following fields: - **name**: String representing unit's name. Required. - **content**: Plaintext string representing entire file. Required. **NOTE:** The command field is ignored for all network, netdev, and link units. The systemd-networkd.service unit will be restarted in their place. ##### Examples Write a unit to disk, automatically starting it. ```yaml #cloud-config coreos: units: - name: docker-redis.service command: start content: | [Unit] Description=Redis container Author=Me After=docker.service [Service] Restart=always ExecStart=/usr/bin/docker start -a redis_server ExecStop=/usr/bin/docker stop -t 2 redis_server ``` Add the DOCKER_OPTS environment variable to docker.service. ```yaml #cloud-config coreos: units: - name: docker.service drop-ins: - name: 50-insecure-registry.conf content: | [Service] Environment=DOCKER_OPTS='--insecure-registry="10.0.1.0/24"' ``` Start the built-in `etcd2` and `fleet` services: ```yaml #cloud-config coreos: units: - name: etcd2.service command: start - name: fleet.service command: start ``` ### ssh_authorized_keys The `ssh_authorized_keys` parameter adds public SSH keys which will be authorized for the `core` user. The keys will be named "coreos-cloudinit" by default. Override this by using the `--ssh-key-name` flag when calling `coreos-cloudinit`. ```yaml #cloud-config ssh_authorized_keys: - ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0g+ZTxC7weoIJLUafOgrm+h... ``` ### hostname The `hostname` parameter defines the system's hostname. This is the local part of a fully-qualified domain name (i.e. `foo` in `foo.example.com`). ```yaml #cloud-config hostname: coreos1 ``` ### users The `users` parameter adds or modifies the specified list of users. Each user is an object which consists of the following fields. Each field is optional and of type string unless otherwise noted. All but the `passwd` and `ssh-authorized-keys` fields will be ignored if the user already exists. - **name**: Required. Login name of user - **gecos**: GECOS comment of user - **passwd**: Hash of the password to use for this user - **homedir**: User's home directory. Defaults to /home/\ - **no-create-home**: Boolean. Skip home directory creation. - **primary-group**: Default group for the user. Defaults to a new group created named after the user. - **groups**: Add user to these additional groups - **no-user-group**: Boolean. Skip default group creation. - **ssh-authorized-keys**: List of public SSH keys to authorize for this user - **coreos-ssh-import-github** [DEPRECATED]: Authorize SSH keys from GitHub user - **coreos-ssh-import-github-users** [DEPRECATED]: Authorize SSH keys from a list of GitHub users - **coreos-ssh-import-url** [DEPRECATED]: Authorize SSH keys imported from a url endpoint. - **system**: Create the user as a system user. No home directory will be created. - **no-log-init**: Boolean. Skip initialization of lastlog and faillog databases. - **shell**: User's login shell. The following fields are not yet implemented: - **inactive**: Deactivate the user upon creation - **lock-passwd**: Boolean. Disable password login for user - **sudo**: Entry to add to /etc/sudoers for user. By default, no sudo access is authorized. - **selinux-user**: Corresponding SELinux user - **ssh-import-id**: Import SSH keys by ID from Launchpad. ```yaml #cloud-config users: - name: elroy passwd: $6$5s2u6/jR$un0AvWnqilcgaNB3Mkxd5yYv6mTlWfOoCYHZmfi3LDKVltj.E8XNKEcwWm... groups: - sudo - docker ssh-authorized-keys: - ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC0g+ZTxC7weoIJLUafOgrm+h... ``` #### Generating a password hash If you choose to use a password instead of an SSH key, generating a safe hash is extremely important to the security of your system. Simplified hashes like md5crypt are trivial to crack on modern GPU hardware. Here are a few ways to generate secure hashes: ``` # On Debian/Ubuntu (via the package "whois") mkpasswd --method=SHA-512 --rounds=4096 # OpenSSL (note: this will only make md5crypt. While better than plantext it should not be considered fully secure) openssl passwd -1 # Python (change password and salt values) python -c "import crypt, getpass, pwd; print crypt.crypt('password', '\$6\$SALT\$')" # Perl (change password and salt values) perl -e 'print crypt("password","\$6\$SALT\$") . "\n"' ``` Using a higher number of rounds will help create more secure passwords, but given enough time, password hashes can be reversed. On most RPM based distributions there is a tool called mkpasswd available in the `expect` package, but this does not handle "rounds" nor advanced hashing algorithms. ### write_files The `write_files` directive defines a set of files to create on the local filesystem. Each item in the list may have the following keys: - **path**: Absolute location on disk where contents should be written - **content**: Data to write at the provided `path` - **permissions**: Integer representing file permissions, typically in octal notation (i.e. 0644) - **owner**: User and group that should own the file written to disk. This is equivalent to the `:` argument to `chown : `. - **encoding**: Optional. The encoding of the data in content. If not specified this defaults to the yaml document encoding (usually utf-8). Supported encoding types are: - **b64, base64**: Base64 encoded content - **gz, gzip**: gzip encoded content, for use with the !!binary tag - **gz+b64, gz+base64, gzip+b64, gzip+base64**: Base64 encoded gzip content ```yaml #cloud-config write_files: - path: /etc/resolv.conf permissions: 0644 owner: root content: | nameserver 8.8.8.8 - path: /etc/motd permissions: 0644 owner: root content: | Good news, everyone! - path: /tmp/like_this permissions: 0644 owner: root encoding: gzip content: !!binary | H4sIAKgdh1QAAwtITM5WyK1USMqvUCjPLMlQSMssS1VIya9KzVPIySwszS9SyCpNLwYARQFQ5CcAAAA= - path: /tmp/or_like_this permissions: 0644 owner: root encoding: gzip+base64 content: | H4sIAKgdh1QAAwtITM5WyK1USMqvUCjPLMlQSMssS1VIya9KzVPIySwszS9SyCpNLwYARQFQ5CcAAAA= - path: /tmp/todolist permissions: 0644 owner: root encoding: base64 content: | UGFjayBteSBib3ggd2l0aCBmaXZlIGRvemVuIGxpcXVvciBqdWdz ``` ### manage_etc_hosts The `manage_etc_hosts` parameter configures the contents of the `/etc/hosts` file, which is used for local name resolution. Currently, the only supported value is "localhost" which will cause your system's hostname to resolve to "127.0.0.1". This is helpful when the host does not have DNS infrastructure in place to resolve its own hostname, for example, when using Vagrant. ```yaml #cloud-config manage_etc_hosts: localhost ```