| 21 Mar 2024 |
| @admin:nixos.org set the history visibility to "world_readable". | 12:58:15 |
| @admin:nixos.org set the room name to "NixOS AWS". | 12:58:15 |
| @admin:nixos.org invited Arian. | 12:59:08 |
| @admin:nixos.org invited NixOS Moderation Bot. | 12:59:09 |
| @admin:nixos.orgchanged room power levels. | 12:59:17 |
| @admin:nixos.orgchanged room power levels. | 12:59:22 |
| Room Avatar Renderer. | 13:00:57 |
| NixOS Moderation Bot joined the room. | 13:01:22 |
| @admin:nixos.orgchanged room power levels. | 13:01:49 |
| @admin:nixos.org left the room. | 13:01:57 |
| Arian joined the room. | 13:44:30 |
| NixOS Moderation Botchanged room power levels. | 18:03:54 |
| 22 Mar 2024 |
| @accelbread:matrix.org joined the room. | 01:49:52 |
| chadac joined the room. | 16:41:08 |
| 23 Mar 2024 |
| @AleXoundOS:matrix.org joined the room. | 00:22:57 |
| 25 Mar 2024 |
| [0x4A6F] joined the room. | 23:54:39 |
| 17 Apr 2024 |
| JoelMcCracken joined the room. | 16:27:55 |
| 28 Apr 2024 |
| kenji joined the room. | 09:59:37 |
| 29 Apr 2024 |
| NixOS Moderation Botchanged room power levels. | 15:28:39 |
| 1 May 2024 |
| NixOS Moderation Botchanged room power levels. | 15:06:12 |
| 2 May 2024 |
@AleXoundOS:matrix.org | Is ec2-instance-connect supported on NixOS? | 05:08:04 |
@AleXoundOS:matrix.org | Ah, found information that it's not going to be supported. | 05:13:23 |
@AleXoundOS:matrix.org | What are the alternatives if an EC2 instance has no public IP? | 05:14:59 |
@AleXoundOS:matrix.org | At least one alternative is to enable SSM Agent service (services.amazon-ssm-agent.enable= true), add IAM role with AmazonSSMManagedInstanceCore policy to EC2 instance and use:
$ aws ssm start-session --profile <YOUR_AWS_CLI_PROFILE> --target <EC2_INSTANCE_ID> --region <REGION>
| 11:34:02 |
@AleXoundOS:matrix.org | * At least one alternative is to enable SSM Agent service (services.amazon-ssm-agent.enable = true), add IAM role with AmazonSSMManagedInstanceCore policy to EC2 instance and use:
$ aws ssm start-session --profile <YOUR_AWS_CLI_PROFILE> --target <EC2_INSTANCE_ID> --region <REGION>
| 11:34:17 |
@AleXoundOS:matrix.org | * At least one alternative is to enable SSM Agent service (services.amazon-ssm-agent.enable = true), add IAM role with AmazonSSMManagedInstanceCore policy to EC2 instance and use on client side:
$ aws ssm start-session --profile <YOUR_AWS_CLI_PROFILE> --target <EC2_INSTANCE_ID> --region <REGION>
| 13:56:31 |