This section details how to launch instances and retrieve instance specific data from within the image. It also covers launching shared AMIs and security risks associated with running shared AMIs.
Submit feedback about this site to: