Editing Terraform: AWS instance example with aws ami lookup and key name

Jump to navigation Jump to search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.

Latest revision Your text
Line 12: Line 12:
 
   filter {
 
   filter {
 
     name  = "name"
 
     name  = "name"
     values = ["ubuntu/images/hvm-ssd/ubuntu-[[kinetic]]-22.10-amd64-server-*"]
+
     values = ["ubuntu/images/hvm-ssd/ubuntu-hirsute-21.04-amd64-server-*"]
 
   }
 
   }
 
   
 
   
Line 25: Line 25:
 
  [[Terraform resource|resource]] "[[aws_instance]]" "myUbuntuMicroInstance" {
 
  [[Terraform resource|resource]] "[[aws_instance]]" "myUbuntuMicroInstance" {
 
   ami          = data.aws_ami.ubuntu.id
 
   ami          = data.aws_ami.ubuntu.id
   instance_type = "[[t3.micro]]"
+
   instance_type = "t3.micro"
  [[associate_public_ip_address]] = "[[true]]"
 
  [[vpc_security_group_ids]] = [aws_security_group.allow_ssh.id]
 
 
   [[key_name]] = "YourKeyName"  
 
   [[key_name]] = "YourKeyName"  
 
   
 
   
Line 35: Line 33:
 
  }
 
  }
 
   
 
   
  resource "[[aws_security_group]]" "allow_ssh" {
+
  resource "aws_key_pair" "YourKeyName" {
  name        = "allow_ssh"
+
   key_name  = "YourKeyName"
  description = "Allow ssh inbound traffic from Internet"
 
 
 
  ingress {
 
    description      = "SSH from Internet"
 
    from_port        = 22
 
    to_port          = 22
 
    protocol        = "tcp"
 
    cidr_blocks      = ["0.0.0.0/0"]
 
    ipv6_cidr_blocks = ["::/0"]
 
  }
 
 
  tags = {
 
    Name = "allow_ssh"
 
  }
 
}
 
 
resource "[[aws_key_pair]]" "YourKeyName" {
 
   [[key_name]]   = "YourKeyName"
 
 
   [[public_key]] = "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD3F6tyPEFEzV0LX3X8BsXdMsQz1x2cEikKDEY0aIj41qgxMCP/iteneqXSIFZBp5vizPvaoIR3Um9xK7PGoW8giupGn+EPuxIA4cDM4vzOqOkiMPhz5XK0whEjkVzTo4+S0puvDZuwIsdiW9mxhJc7tgBNL0cYlWSYVkz4G/fslNfRPW5mYAM49f4fhtxPb5ok4Q2Lg9dPKVHO/Bgeu5woMc7RY0p1ej6D4CKFE6lymSDJpW0YHX/wqE9+cfEauh7xZcG0q9t2ta6F6fmX0agvpFyZo8aFbXeUBr7osSCJNgvavWbM/06niWrOvYX2xwWdhXmXSrbX8ZbabVohBK41 [email protected]"
 
   [[public_key]] = "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQD3F6tyPEFEzV0LX3X8BsXdMsQz1x2cEikKDEY0aIj41qgxMCP/iteneqXSIFZBp5vizPvaoIR3Um9xK7PGoW8giupGn+EPuxIA4cDM4vzOqOkiMPhz5XK0whEjkVzTo4+S0puvDZuwIsdiW9mxhJc7tgBNL0cYlWSYVkz4G/fslNfRPW5mYAM49f4fhtxPb5ok4Q2Lg9dPKVHO/Bgeu5woMc7RY0p1ej6D4CKFE6lymSDJpW0YHX/wqE9+cfEauh7xZcG0q9t2ta6F6fmX0agvpFyZo8aFbXeUBr7osSCJNgvavWbM/06niWrOvYX2xwWdhXmXSrbX8ZbabVohBK41 [email protected]"
 
  }
 
  }
  
== Errors ==
 
* [[Error: creating Security Group]] (allow_ssh): [[VPCIdNotSpecified: No default VPC for this user]]
 
  
=== Errors: Key par does not exist ===
+
== Errors: Key par does not exist ==
 
  │ Error: Error launching source instance: InvalidKeyPair.NotFound: The [[key pair]] 'YourKeyName' does not exist
 
  │ Error: Error launching source instance: InvalidKeyPair.NotFound: The [[key pair]] 'YourKeyName' does not exist
 
  │      status code: 400, request id: 717f23c7-f87f-4056-a8f4-a82ad2095534
 
  │      status code: 400, request id: 717f23c7-f87f-4056-a8f4-a82ad2095534
 
 
[[VPCIdNotSpecified]]: [[No default VPC]] for this user. [[GroupName]] is only supported for [[EC2-Classic]] and [[default VPC]].
 
  
 
== Related ==
 
== Related ==
 
* <code>[[aws ec2 describe-key-pairs]]</code>
 
* <code>[[aws ec2 describe-key-pairs]]</code>
* <code>[[terraform init]]</code>, <code>[[terraform show]]</code>
+
* <code>[[terraform init]]</code>
* <code>[[terraform state show aws_instance.MYexample]]</code>
+
* <code>[[terraform show]]</code>
 
* [[Terraform resource]]: <code>[[Terraform resource: aws_key_pair|aws_key_pair]]</code>
 
* [[Terraform resource]]: <code>[[Terraform resource: aws_key_pair|aws_key_pair]]</code>
* <code>[[aws ec2 run-instances]]</code>
 
* <code>[[~/.ssh/config]]</code>
 
* <code>[[terraform show]] | grep [[private_ip]]</code>
 
* <code>[[aws_security_group]]</code>
 
 
== Activities ==
 
* Improve this example by adding a [[security group]] with ssh access from anywhere: [[Terraform resource: aws security group]]
 
  
 
== See also ==
 
== See also ==

Please note that all contributions to wikieduonline may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see Wikieduonline:Copyrights for details). Do not submit copyrighted work without permission!

Cancel Editing help (opens in new window)

Templates used on this page:

Advertising: