<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Aws on jen20.dev</title>
    <link>https://jen20.dev/tags/aws/</link>
    <description>Recent content in Aws on jen20.dev</description>
    <generator>Hugo</generator>
    <language>en-gb</language>
    <managingEditor>hello@jen20.com (James Nugent)</managingEditor>
    <webMaster>hello@jen20.com (James Nugent)</webMaster>
    <lastBuildDate>Thu, 23 Apr 2020 17:00:00 +0000</lastBuildDate>
    <atom:link href="https://jen20.dev/tags/aws/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Ubuntu 20.04 With Root ZFS in AWS</title>
      <link>https://jen20.dev/post/ubuntu-20.04-with-root-zfs-in-aws/</link>
      <pubDate>Thu, 23 Apr 2020 17:00:00 +0000</pubDate><author>hello@jen20.com (James Nugent)</author>
      <guid>https://jen20.dev/post/ubuntu-20.04-with-root-zfs-in-aws/</guid>
      <description>&lt;p&gt;For several years now, I&amp;rsquo;ve been running all my AWS instances with a recent long-term support edition of &lt;a href=&#34;https://ubuntu.com&#34;&gt;Ubuntu server&lt;/a&gt;,&#xA;ZFS as the root file system. &lt;a href=&#34;https://wiki.ubuntu.com/FocalFossa/ReleaseNotes&#34;&gt;Ubuntu 20.04 LTS&lt;/a&gt; was released today, so I&amp;rsquo;ve updated my &lt;a href=&#34;https://packer.io&#34;&gt;Packer&lt;/a&gt; templates -&#xA;the &lt;a href=&#34;https://github.com/hashicorp/packer/pull/4351&#34;&gt;original inspiration&lt;/a&gt; for the &lt;a href=&#34;https://www.packer.io/docs/builders/amazon-ebssurrogate.html&#34;&gt;&lt;code&gt;amazon-ebssurrogate&lt;/code&gt; builder&lt;/a&gt; - to support it!&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://jen20.dev/images/ubuntu-20.04-zfs.png&#34; alt=&#34;Ubuntu 20.04 With Root ZFS in AWS&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;Ubuntu 20.04 has some nice new features, including:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;ZFS on Linux version 0.8.3,&lt;/li&gt;&#xA;&lt;li&gt;Linux Kernel version 5.4, including &lt;a href=&#34;https://www.wireguard.com&#34;&gt;&lt;code&gt;io_uring&lt;/code&gt;&lt;/a&gt; and built-in support for &lt;a href=&#34;https://www.wireguard.com&#34;&gt;WireGuard&lt;/a&gt;,&lt;/li&gt;&#xA;&lt;li&gt;Up-to-date compiler and runtime packages for a variety of platforms.&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;Since I last updated these templates, &lt;a href=&#34;https://hashicorp.com&#34;&gt;HashiCorp&lt;/a&gt; have also added a feature to Packer to allow templates to be authored&#xA;in &lt;a href=&#34;https://github.com/hashicorp/hcl/tree/v2.0.0&#34;&gt;HashiCorp Configuration Language v2&lt;/a&gt; instead of JSON.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Ubuntu 18.4 With Root ZFS on AWS</title>
      <link>https://jen20.dev/post/ubuntu-18.04-with-root-zfs-on-aws/</link>
      <pubDate>Tue, 09 Oct 2018 12:20:00 +0000</pubDate><author>hello@jen20.com (James Nugent)</author>
      <guid>https://jen20.dev/post/ubuntu-18.04-with-root-zfs-on-aws/</guid>
      <description>&lt;p&gt;Last year, I &lt;a href=&#34;https://operator-error.com/2017/03/02/building-zfs-root-ubuntu-amis-with-packer/&#34;&gt;posted&lt;/a&gt; about how to build Ubuntu 16.04 AMIs using &lt;a href=&#34;https://packer.io&#34;&gt;HashiCorp Packer&lt;/a&gt;&amp;rsquo;s &lt;a href=&#34;https://packer.io/docs/builders/amazon-ebssurrogate.html&#34;&gt;ebs-surrogate&lt;/a&gt; builder. Since then Ubuntu 18.04 has been released, and the process has changed a little.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Windows AMIs With Even Fewer Tears</title>
      <link>https://jen20.dev/post/windows-amis-with-even-fewer-tears/</link>
      <pubDate>Mon, 16 Apr 2018 14:00:00 +0000</pubDate><author>hello@jen20.com (James Nugent)</author>
      <guid>https://jen20.dev/post/windows-amis-with-even-fewer-tears/</guid>
      <description>&lt;p&gt;Some recent image building work I was doing required images based on Windows Server. One of my more popular posts, &lt;a href=&#34;http://jen20.com/2015/04/02/windows-amis-without-the-tears.html&#34;&gt;Windows AMIs Without the Tears&lt;/a&gt;, detailed the fraught endeavor of making the WinRM management system work for this purpose, but since then Microsoft have substantially improved the situation by committing engineering effort to &lt;a href=&#34;https://github.com/PowerShell/Win32-OpenSSH&#34;&gt;porting OpenSSH to Windows&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Building ZFS Root Ubuntu AMIs With Packer</title>
      <link>https://jen20.dev/post/building-zfs-root-ubuntu-amis-with-packer/</link>
      <pubDate>Thu, 02 Mar 2017 21:00:00 +0000</pubDate><author>hello@jen20.com (James Nugent)</author>
      <guid>https://jen20.dev/post/building-zfs-root-ubuntu-amis-with-packer/</guid>
      <description>&lt;p&gt;For all applications of importance or significance, we recommend using &lt;a href=&#34;https://openzfs.org&#34;&gt;ZFS&lt;/a&gt;. On bare metal servers, ZFS is king of the hill, but on AWS and Linux it is still gaining traction.  Data integrity guarantees as well as features such as &amp;ldquo;instantaneous&amp;rdquo; snapshots, compression, quotas, and the ability to send/receive datasets make ZFS very compelling. In this post, we&amp;rsquo;re going to demonstrate how to build from-scratch AMIs booting Ubuntu Linux with a ZFS root file system.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Managing IAM Policies in HCL With Terraform</title>
      <link>https://jen20.dev/post/managing-iam-policies-in-hcl-with-terraform/</link>
      <pubDate>Tue, 21 Feb 2017 12:00:00 +0000</pubDate><author>hello@jen20.com (James Nugent)</author>
      <guid>https://jen20.dev/post/managing-iam-policies-in-hcl-with-terraform/</guid>
      <description>&lt;p&gt;IAM Policy Documents are ubiquitous in AWS - they are used not only for standalone policies you might attach to users or roles, but also for S3 bucket policies, SNS topic policies and more. Unfortunately, the JSON syntax can be error prone to hand write, and the default mechanism for creating policies in many configuration management tools is template rendering.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Configuring AWS AutoScaling Event Notifications in Slack</title>
      <link>https://jen20.dev/post/configuring-aws-autoscaling-event-notifications-in-slack/</link>
      <pubDate>Mon, 20 Feb 2017 17:00:00 +0000</pubDate><author>hello@jen20.com (James Nugent)</author>
      <guid>https://jen20.dev/post/configuring-aws-autoscaling-event-notifications-in-slack/</guid>
      <description>&lt;p&gt;One of the easiest ways of building resilience into a system running in AWS is to use an autoscaling group. Generally speaking, I use one for any service which is required to self-heal - even when aiming to maintain a steady number of instances, as is desirable when running servers for Consul and Nomad, as well as a whole host of other clustered systems. Unhealthy instances can simply be replaced, usually without operator intervention, and launch configurations can be used to simplify upgrading clustered software one instance at a time.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Windows AMIs Without The Tears</title>
      <link>https://jen20.dev/post/windows-amis-without-the-tears/</link>
      <pubDate>Thu, 02 Apr 2015 14:00:00 +0000</pubDate><author>hello@jen20.com (James Nugent)</author>
      <guid>https://jen20.dev/post/windows-amis-without-the-tears/</guid>
      <description>&lt;p&gt;Twice in the last couple of weeks I&amp;rsquo;ve helped automate build infrastructure in&#xA;AWS, first for &lt;a href=&#34;https://geteventstore.com&#34;&gt;Event Store&lt;/a&gt; and then secondly for&#xA;another company. Both times we got 90% of the way there using great tools like&#xA;&lt;a href=&#34;https://terraform.io&#34;&gt;Terraform&lt;/a&gt; and &lt;a href=&#34;https://packer.io&#34;&gt;Packer&lt;/a&gt;, and fell at&#xA;the last hurdle: how do you build Windows images in an automated fashion (i.e.&#xA;no point-and-click)?&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
