!atvIbxHoEqNcAIxYpN:nixos.org

NixOS AWS

64 Members
16 Servers

Load older messages


SenderMessageTime
1 May 2024
@mjolnir:nixos.orgNixOS Moderation Botchanged room power levels.15:06:12
2 May 2024
@AleXoundOS:matrix.org@AleXoundOS:matrix.org Is ec2-instance-connect supported on NixOS? 05:08:04
@AleXoundOS:matrix.org@AleXoundOS:matrix.org Ah, found information that it's not going to be supported. 05:13:23
@AleXoundOS:matrix.org@AleXoundOS:matrix.orgWhat are the alternatives if an EC2 instance has no public IP?05:14:59
@AleXoundOS:matrix.org@AleXoundOS:matrix.org

At least one alternative is to enable SSM Agent service (services.amazon-ssm-agent.enable= true), add IAM role with AmazonSSMManagedInstanceCore policy to EC2 instance and use:

$ aws ssm start-session --profile <YOUR_AWS_CLI_PROFILE> --target <EC2_INSTANCE_ID> --region <REGION>
11:34:02
@AleXoundOS:matrix.org@AleXoundOS:matrix.org *

At least one alternative is to enable SSM Agent service (services.amazon-ssm-agent.enable = true), add IAM role with AmazonSSMManagedInstanceCore policy to EC2 instance and use:

$ aws ssm start-session --profile <YOUR_AWS_CLI_PROFILE> --target <EC2_INSTANCE_ID> --region <REGION>
11:34:17
@AleXoundOS:matrix.org@AleXoundOS:matrix.org *

At least one alternative is to enable SSM Agent service (services.amazon-ssm-agent.enable = true), add IAM role with AmazonSSMManagedInstanceCore policy to EC2 instance and use on client side:

$ aws ssm start-session --profile <YOUR_AWS_CLI_PROFILE> --target <EC2_INSTANCE_ID> --region <REGION>
13:56:31
@nick_kadutskyi:matrix.org@nick_kadutskyi:matrix.org joined the room.17:15:46
@nick_kadutskyi:matrix.org@nick_kadutskyi:matrix.org set a profile picture.21:19:14
6 May 2024
@nick_kadutskyi:matrix.org@nick_kadutskyi:matrix.org changed their display name from nick_kadutskyi to nickkadutskyi.17:33:29
@nick_kadutskyi:matrix.org@nick_kadutskyi:matrix.org left the room.17:35:40
13 May 2024
@arianvp:matrix.orgArian SSM agent will be available in 24.05 17:40:02
@arianvp:matrix.orgArian EIC is planned but the EIC code is terribly unportable  18:21:52
@arianvp:matrix.orgArian https://github.com/NixOS/amis/pull/114 18:22:04
@arianvp:matrix.orgArian * SSM agent will be enabled by default in 24.05 18:22:27
22 May 2024
@mjolnir:nixos.orgNixOS Moderation Botchanged room power levels.15:25:51
@mjolnir:nixos.orgNixOS Moderation Botchanged room power levels.15:28:06
23 May 2024
@arianvp:matrix.orgArianthe 24.05beta AMIs are being uploaded as we speak. Please give them a try09:20:28
@samrose:matrix.orgsamrose joined the room.20:11:34
27 May 2024
@hkatz_ngrok:matrix.orgHarrison Katz joined the room.15:07:23
@hkatz_ngrok:matrix.orgHarrison Katz Hello! Arian We're trying to debug that AMI networking issue from Friday. If you're online today and would like to chat back and forth we would be much appreciative. I'll also be online tomorrow (or any day this week) to chat. Thanks! 15:08:22
30 May 2024
@o1lo0lol1o:matrix.orgo1lo0lol1o joined the room.14:54:06
@o1lo0lol1o:matrix.orgo1lo0lol1oWhat's the recommended way to get journald logs to cloudwatch?14:54:32
@arianvp:matrix.orgArianI can tell you what we do at work15:34:19
@arianvp:matrix.orgArian

We use fluent-bit with the following config:


[INPUT]
  name systemd
  tag journald
[FILTER]
  name aws
  match journald
  imds_version v2
  account_id true
[OUTPUT]
  name cloudwatch_logs
  match journald
  region us-east-1
  log_group_name /ec2/logs
  log_stream_template $ec2_instance_id
  log_stream_name default
  auto_create_group true
15:37:03
@arianvp:matrix.orgArianThere is no fluent-bit NixOS module yet. We have one internally.15:37:17
@arianvp:matrix.orgArian *

We use fluent-bit with the following config:


[INPUT]
  name systemd
  tag journald
[FILTER]
  name aws
  match journald
  imds_version v2
  account_id true
[OUTPUT]
  name cloudwatch_logs
  match journald
  region us-east-1
  log_group_name /ec2/logs
  log_stream_template $ec2_instance_id
  auto_create_group true
15:39:07
@arianvp:matrix.orgArian *

We use fluent-bit with the following config:


[INPUT]
  name systemd
  tag journald
  db ''${STATE_DIRECTORY}/journald.db
[FILTER]
  name aws
  match journald
  imds_version v2
  account_id true
[OUTPUT]
  name cloudwatch_logs
  match journald
  region us-east-1
  log_group_name /ec2/logs
  log_stream_template $ec2_instance_id
  log_stream_name default
  auto_create_group true
15:42:13
@arianvp:matrix.orgArianI can recommend it. zero issues so far :)15:44:11
@o1lo0lol1o:matrix.orgo1lo0lol1oSo you just made a systemd service that runs https://github.com/NixOS/nixpkgs/blob/master/pkgs/tools/misc/fluent-bit/default.nix 15:52:39

Show newer messages


Back to Room ListRoom Version: 10