!atvIbxHoEqNcAIxYpN:nixos.org

NixOS AWS

64 Members
16 Servers

Load older messages


SenderMessageTime
6 Nov 2024
@arianvp:matrix.orgArianOr use it as inspiration 13:06:05
@tuxiqae:matrix.orgtuxiqaeFML, wanted the ability to build a one-shot with Nix + Terranix that'll automatically provision the resources and start the instance13:11:41
@arianvp:matrix.orgArianYou can import snapshots with Terraform 13:15:56
@arianvp:matrix.orgArianAnd register the image too13:16:02
@arianvp:matrix.orgArianaws_ebs_snapshot_import resource13:16:35
@arianvp:matrix.orgArianCombine with aws_s3_bucket_item resource and aws_ami resource and you're done13:17:00
@arianvp:matrix.orgArianSomething like https://gist.github.com/arianvp/14dd40742c24894bb312ac3f5b90b43313:21:29
@tuxiqae:matrix.orgtuxiqaeYeah, but in order to import a snapshot I'd have to first provision a VM and then export that I wanted to just automatically create an image and upload that :(13:30:30
@arianvp:matrix.orgArianNo ?13:31:05
@tuxiqae:matrix.orgtuxiqae:O13:31:17
@arianvp:matrix.orgArianThis example is literally importing from local disk?13:31:35
@arianvp:matrix.orgArianJust like import image 13:31:38
@arianvp:matrix.orgArianSee line 413:32:07
@arianvp:matrix.orgArianThat's pointing to your local disk image you built13:32:28
@arianvp:matrix.orgArianYou upload the image to S3. Then import it as a snapshot. Then register the snapshot as an image13:32:45
@tuxiqae:matrix.orgtuxiqaeBut that'd mean that I'd have to provision a running image first, wouldn't it?14:00:26
@arianvp:matrix.orgArianYou just point that to your nix image build14:01:36
@arianvp:matrix.orgArianThis is just doing what upload-ami does but in terraform14:01:52
@arianvp:matrix.orgArianYou upload the image you built to s3. Import it to EBS. Then register the ebs snapshot as an image14:02:21
@arianvp:matrix.orgArianThere's no ec2 instances involved. 14:02:34
@arianvp:matrix.orgArianNot sure what you mean with "provision a running image'14:02:56
@tuxiqae:matrix.orgtuxiqaeAh, I see, I'll give it a look soon, thanks14:04:32
@arianvp:matrix.orgArianSo you'd point line 4 to the image that you built with disko14:05:52
@colemickens:matrix.orgcolemickens joined the room.17:19:49
@colemickens:matrix.orgcolemickens👋17:19:55
@arianvp:matrix.orgArianHello! Welcome17:56:15
@arianvp:matrix.orgArian @commiterate:matrix.org do you happen to know if its possible for us to register the nixos AMIs in the public ssm parameter store like Ubuntu does? 17:57:08
@arianvp:matrix.orgArianLike. It lives in the /Amazon namespace. Idk how they got access to that.17:57:22
@commiterate:matrix.orgcommiterate

I don't think creation of public SSM parameters is allowed. It's basically an AWS-internal thing.

SSM parameters can only be shared across accounts with AWS RAM. RAM only supports accounts, organizational units, or organizations (so no public option). They don't support resource-level IAM policies so we can't add one with a Principal: "*".

22:50:06
@commiterate:matrix.orgcommiterateWait nevermind, they do support resource-level policies. https://docs.aws.amazon.com/systems-manager/latest/APIReference/API_PutResourcePolicy.html22:52:11

Show newer messages


Back to Room ListRoom Version: 10