id: dcfafa083a864ca9be6d5e67461acf51 parent_id: 42c21121de204444bad441c08a108a9f item_type: 1 item_id: e9404fb28af54a7b9e820826cc2469eb item_updated_time: 1672321810871 title_diff: "[]" body_diff: "[{\"diffs\":[[-1,\"Add \\\n\\\nUpdate tfstate\\\n- OpenStack password in `OS_PASSWORD`\\\n- Run `terraform refresh`\\\n\\\nValidate and plan changes\\\n- `terraform validate` and `terraform plan`\"],[1,\"Make sure login credentials are in `clouds.yaml`\\\nPut webdb groups in `webdb-groups.tf`\\\nMaybe update image in `instances.tf`?\\\n- 1002 should be latest Ubuntu LTS, 2GB RAM\\\n\\\nWe used to create an ansible controller; I just do ansible setup from my own computer now, but it's possible.\\\n\\\nSecurity groups: `allow-users` allows some specific IPs (currently just me), makes set-up easier in that it doesn't require UvAvpn. Otherwise, all servers can only be accessed from within UvAvpn\\\n\\\nTerraform sets up a keypair for VM login but doesn't export it; you can extract it from the .tfstate file.\\\n\\\nUpdate .tfstate\\\n- OpenStack password in `OS_PASSWORD`\\\n- Run `terraform refresh`\\\n\\\nValidate and plan changes\\\n- `terraform validate` and `terraform plan`\\\n\\\nFor some reason Terraform wants to change egress rules for allow-uva-internal even though they are already set that way; this will error out when applying but doesn't matter.\\\n\"],[0,\"\\\n\\\n\"]],\"start1\":0,\"start2\":0,\"length1\":157,\"length2\":914}]" metadata_diff: {"new":{},"deleted":[]} encryption_cipher_text: encryption_applied: 0 updated_time: 2022-12-29T13:50:18.855Z created_time: 2022-12-29T13:50:18.855Z type_: 13