Skip to content

Instantly share code, notes, and snippets.

View alexgottschalkmedal's full-sized avatar

alexgottschalkmedal

View GitHub Profile
@alexgottschalkmedal
alexgottschalkmedal / debug.log
Created April 27, 2018 20:09
packer debug log
$ PACKER_LOG=1 packer-1.2 build -var-file=./vars/prod_xenial_build.json debug.json
2018/04/27 13:05:56 [INFO] Packer version: 1.2.2
2018/04/27 13:05:56 Packer Target OS/Arch: darwin amd64
2018/04/27 13:05:56 Built with Go Version: go1.10
2018/04/27 13:05:56 Detected home directory from env var: /Users/alexg
2018/04/27 13:05:56 Using internal plugin for azure-arm
2018/04/27 13:05:56 Using internal plugin for ncloud
2018/04/27 13:05:56 Using internal plugin for null
2018/04/27 13:05:56 Using internal plugin for virtualbox-ovf
2018/04/27 13:05:56 Using internal plugin for scaleway
@alexgottschalkmedal
alexgottschalkmedal / packer.log
Last active April 20, 2018 19:22
Packer fail log
{
"builders": [
{
"type": "amazon-ebs",
"region": "us-west-2",
"instance_type": "t2.micro",
"ssh_username": "ubuntu",
"ami_description": "{{user `ami_description`}}",
"ami_name": "{{user `ami_name_prefix`}}_ubuntu-{{user `ami_os_string`}}-amd64-server_{{timestamp}}",
"profile": "prod",
@alexgottschalkmedal
alexgottschalkmedal / PackerPolicy.json
Created April 19, 2018 19:37 — forked from MattSurabian/PackerPolicy.json
Minimum IAM policy required by AWS for Packer to do its thing.https://github.com/mitchellh/packer Permissions are broken out by API functionality and a resource array has been defined with a wild card for each group. For tighter security resource level permissions can be applied per this documentation: http://aws.typepad.com/aws/2013/07/resource…
{
"Statement": [
{
"Sid": "PackerSecurityGroupAccess",
"Action": [
"ec2:CreateSecurityGroup",
"ec2:DeleteSecurityGroup",
"ec2:DescribeSecurityGroups",
"ec2:AuthorizeSecurityGroupIngress",
"ec2:RevokeSecurityGroupIngress"