NixOS AWS | 64 Members | |
| 15 Servers |
| Sender | Message | Time |
|---|---|---|
| 25 Sep 2024 | ||
| * That's the default case for an EC2-initiated shutdown. What the docs aren't clear about is an instance-initiated shutdown (e.g. we poll IMDS's They also aren't clear about what they do if the instance goes into terminated before the lifecycle hook timeout and we don't call | 20:27:50 | |
| * That's the default case for an EC2-initiated shutdown. What the docs aren't clear about is an instance-initiated shutdown (e.g. we poll IMDS's They also aren't clear about what they do if the instance goes into terminated before the lifecycle hook timeout and we don't call | 20:36:50 | |
| I think for instance instanitated shutdown it's just the Lifecycle hook timeout that matters | 21:11:02 | |
| Like systemd doesn't send any signal to the hardware when you call systemctl poweroff. It will only do the poweroff after all the services actually stopped | 21:11:34 | |
| If you have a systemd inhibit or a service that just takes an hour to shut down. There is no way for EC2 to know the machine is shutting down | 21:12:07 | |
| So the machine will be shut down my ec2 after the lifecycle hook timeout | 21:12:45 | |
| kk. I'm checking with ASG and EC2 just in case but that's what I'm suspecting as well. | 21:52:46 | |
| 1 Oct 2024 | ||
| 21:03:49 | ||
| 6 Oct 2024 | ||
| I have a WIP new image builder that uses grub in hybrid mode | 16:16:23 | |
| So we can have 1 image for EFI and BIOS | 16:16:31 | |
| Eventually I wanna drop bios completely. But too many image types still around that don't support nitro.. | 16:17:09 | |
| 10 Oct 2024 | ||
| I'm in a bit of a pickle. So I want to stop uploading However existing EC2 instances that were booted with an old AMI will not have an ESP... So I can't outright remove the code. | 12:50:16 | |
I guess I can make it depend on stateVersion but it's so ugly... However forcing people to create their AWS instances to update to 24.11 seems harsh. | 12:50:43 | |
| 13:25:15 | ||
| 11 Oct 2024 | ||
| Would it matter given that to use the new AMI, they're either replacing the root volume or launching a new instance? | 02:33:55 | |
| * Would it matter given that to use the new AMI, they're either replacing the root volume (which has both the ESP and root partitions) or launching a new instance? | 02:39:19 | |
| If you use a new AMI it is no problem | 06:29:24 | |
| Problem is people doing nixos-rebuild switch on an existing instance | 06:29:51 | |
| commiterate: do you know if we need the AWS networkd stuff for EC2 instance connect endpoint? | 13:32:35 | |
| IIRC it works by adding a new ENI to the instance. I don't think our AMI manages that ENI so idk if it works out of the box | 13:32:53 | |
| ah nope just works! sick | 19:46:55 | |
In reply to @arianvp:matrix.org Wait are the AMIs tracking the ami repo for something? If they | 21:55:02 | |
In reply to @arianvp:matrix.org* Wait are the AMIs tracking the ami repo for something? If they | 21:56:00 | |
| * Wait are the AMIs tracking the ami repo for something? If they | 21:56:35 | |
| * Wait are the AMIs' If they | 21:57:02 | |
| Nope. EIC itself just works by having an OpenSSH AuthorizedKeysCommand program which calls IMDS (has EIC endpoints that return SSH keys, just like regular EC2 Key Pairs). | 21:58:30 | |
| I need to follow up next week to see if they're willing to take ownership of my Go rewrite over the existing Bash script abomination. https://github.com/commiterate/amazon-ec2-ssh-utils | 21:59:12 | |
| * I need to follow up next week to see if they're willing to take ownership of my Go rewrite to replace the existing Bash script abomination. https://github.com/commiterate/amazon-ec2-ssh-utils | 21:59:55 | |
* Nope. EIC itself just works by having an OpenSSH AuthorizedKeysCommand program which calls IMDS (has EIC endpoints that return SSH keys, just like regular EC2 Key Pairs) and just writes an OpenSSH authorized keys file contents to stdout. | 22:02:02 | |
* Nope. EIC itself just works by having an OpenSSH AuthorizedKeysCommand program which calls IMDS (has EIC endpoints that return SSH keys, just like regular EC2 Key Pairs) and just writes OpenSSH authorized keys file contents to stdout. | 22:02:15 | |