!atvIbxHoEqNcAIxYpN:nixos.org

NixOS AWS

64 Members
14 Servers

Load older messages


SenderMessageTime
17 Nov 2024
@arianvp:matrix.orgArianIt's kind of orthogonal to anything AWS :p17:09:21
@shift:c-base.orgshiftNot really. You make the details specific enough for your case and no more. Keep it in public. Helps others.17:14:48
19 Nov 2024
@commiterate:matrix.orgcommiterate

Nevermind, one of the NixOS systemd maintainers said the [Install] section is completely unused by the NixOS systemd libs.

They recommended just packaging the patched systemd units in the amazon-ec2-net-utils repo into the package's $out and specifying the package in the systemd.packages NixOS option (similar to how udev rules are added).

Checking with them if that will respect [Install].

04:08:39
@commiterate:matrix.orgcommiterate Pre-emptively moved to just adding the systemd units to $out and moved the PR from draft to ready. Just need a maintainer now. 04:24:04
@commiterate:matrix.orgcommiterate Wondering if we should add NixOS tests that just make sure the systemd units are available when the package is added to systemd.packages. IIRC there's some systemd unit helpers in the NixOS test suites. 04:25:41
@commiterate:matrix.orgcommiterateMoved back to draft after some discussion with the NixOS systemd maintainer. There needs to be some upstream fixes because upstream is providing some weird spaghetti code again.04:44:53
@arianvp:matrix.orgArianAmazon do anything sensible challenge: impossible 10:57:36
@arianvp:matrix.orgArianI wonder if they're aware that systemd can synthesize system units from devices?11:01:47
@arianvp:matrix.orgArianTheir udev rule should just set SYSTEMD_TAG+=1 11:02:07
@arianvp:matrix.orgArian* I wonder if they're aware that systemd can synthesize systemd units from devices?11:02:41
@arianvp:matrix.orgArianhttps://www.freedesktop.org/software/systemd/man/latest/systemd.device.html#SYSTEMD_WANTS=11:22:53
@arianvp:matrix.orgArianhmm I dont also really understand why they need these policy routes13:35:58
@arianvp:matrix.orgArianshouldn't linux already route egress packets correctly based on source IP anyway?13:36:16
@commiterate:matrix.orgcommiterateunfortunately I'm not all that familiar with more systems level stuff in Linux, so not sure17:43:40
@commiterate:matrix.orgcommiterate I assume systemd udev tags and systemctl start/stop don't mutate /etc like systemctl enable/disable does. 17:53:03
@commiterate:matrix.orgcommiterateAlso it looks like unit removal on device hot-detach works as well. You just need to tag the remove udev rule with the systemd tag. https://github.com/systemd/systemd/issues/7587#issuecomment-60549746518:12:48
@arianvp:matrix.orgArianYeh and stopping the systemd unit can be done with BindsTo=blah.device if I recall correctly 18:26:01
@arianvp:matrix.orgArian

i.e. idiomatic would be:

SUBSYSTEM=="net", ACTION=="add", ENV{ID_NET_DRIVER}=="vif|ena|ixgbevf", SYSTEMD_WANTS="policy-routes@.service refresh-policy-routes@.timer"

And then add

[Unit]
Description=Set up policy routes for %I
BindsTo=%i.device
After=%i.device

The script would then get the full sysfs path as an argument (e.g. /sys/devices/pci0000:00/0000:00:05.0/net/ens5) instead of just the device name so the scripts need to be adjusted slightly

18:47:27
@arianvp:matrix.orgArianBUT by the way18:48:26
@arianvp:matrix.orgArian systemctl enable --now works fine on NixOS if the units have no WantedBy in the [Install] section 18:48:40
@arianvp:matrix.orgArian it is just an alias for systemctl start in that case 18:48:47
@arianvp:matrix.orgArianso I actually think these scripts (Even though theyr'e ugly) will just work18:49:16
@arianvp:matrix.orgArianThere is nothing to patdch18:49:21
@commiterate:matrix.orgcommiterateI see, I'll swap it out of draft then and put out a call for a maintainer.19:13:35
@arianvp:matrix.orgArianNeed to double check it. But I think it's the case 19:24:41
@commiterate:matrix.orgcommiterateOpened an issue upstream to request a change to systemd device units. https://github.com/amazonlinux/amazon-ec2-net-utils/issues/11219:37:45
20 Nov 2024
@inayet:matrix.orgInayet removed their profile picture.00:59:37
21 Nov 2024
@commiterate:matrix.orgcommiterateCloudWatch Agent is finally in Nixpkgs: https://github.com/NixOS/nixpkgs/pull/337212 Tracker: https://nixpk.gs/pr-tracker.html?pr=33721217:32:28
@arianvp:matrix.orgArian
In reply to @commiterate:matrix.org

CloudWatch Agent is finally in Nixpkgs: https://github.com/NixOS/nixpkgs/pull/337212

Tracker: https://nixpk.gs/pr-tracker.html?pr=337212

Nice. we can backport this to 24.11 given it's a new package
18:23:52
23 Nov 2024
@commiterate:matrix.orgcommiterateHmm I might need to update it to let people specify paths to the configuration files. That way people can write their own systemd oneshots which dynamically generate a file at runtime during boot (e.g. getting information from IMDS, SSM Parameter Store, Secrets Manager) instead of having to make 1 VM image per configuration (especially since each VM image is several GBs).19:08:09

Show newer messages


Back to Room ListRoom Version: 10