0c9ea6bc56
disable network fingerprinting in nomad
2023-08-07 11:17:40 +02:00
e71ca8fe11
rename wgautomesh config to deuxfleurs namespace to avoid conflict
2023-06-12 13:40:53 +02:00
24cf7ddd91
Merge branch 'main' into simplify-network-config
2023-05-09 12:20:35 +02:00
6c07a42978
different wgautomesh gossip ports for prod and staging
2023-05-04 13:39:33 +02:00
3befdea206
nix: allow wireguard + logs
2023-04-28 09:26:32 +02:00
607add3161
make specifying an ipv6 fully optionnal
2023-04-21 14:36:10 +02:00
a9e9149739
Fix unbound; remove Nixos firewall (use only diplonat)
2023-04-21 11:29:15 +02:00
16422d2809
introduce back static ipv4 prefix lenght but with default value
2023-04-05 14:04:11 +02:00
bb25797d2f
make script clearer and add documentation
2023-04-05 13:44:38 +02:00
dec4ea479d
Allow for IPv6 with RA disabled by manually providing gateway
2023-04-05 13:27:18 +02:00
96566ae523
refactor configuration syntax
2023-03-24 15:26:39 +01:00
e2aea648cf
greatly simplify ipv4 and ipv6 configuration
2023-03-24 14:42:36 +01:00
a0db30ca26
Sanitize DNS configuration
...
- get rid of outside nameserver, unbound does the recursive resolving
itself (and it checks DNSSEC)
- remove CAP_NET_BIND_SERVICE for Consul as it is no longer binding on
port 53 (was already obsolete)
- make unbound config independant of LAN IPv4 address
2023-03-24 12:58:44 +01:00
53b9cfd838
wgautomesh actually on prod
2023-03-24 12:01:38 +01:00
39254cca0e
keep wg-quick code as reference
2023-03-17 18:18:25 +01:00
bb2660792f
wgautomesh persist state to file
2023-03-17 17:17:56 +01:00
6664affaa0
wgautomesh gossip secret file
2023-03-17 17:17:56 +01:00
baae97b192
sample deployment of wgautomesh on staging (dont deploy prod with this commit)
2023-03-17 17:17:56 +01:00
f7be968531
TODOs in deuxfleurs.nix because the old world is maybe mixing with the new
2023-03-15 18:19:01 +01:00
ad6db2f1c5
Remove hardcoded years in deuxfleurs.nix
2023-01-01 19:43:35 +01:00
b47334d7d7
Replace deploy_wg by a NixOS activation script
2022-12-14 18:02:30 +01:00
a1fc396412
Add possible public_ipv4 node tag
2022-12-07 17:13:03 +01:00
ab97a7bffd
Staging: Add CNAME target meta parameter, will be used for diplonat auto dns update
2022-12-07 12:32:21 +01:00
105c081728
Staging: ability to run Nix jobs using exec2 driver
2022-11-28 22:58:39 +01:00
a327876e25
Remove root, add wg-quick-wg0 after unbound
2022-11-28 10:19:48 +01:00
bedfae8424
Fix wg-quick MTU because it does bad stuff by default
2022-11-22 16:22:05 +01:00
8d363d2e66
Add after config on nomad and consul
2022-11-22 13:30:00 +01:00
6659deb544
Add Baptiste ; fix wireguard
2022-11-22 12:09:28 +01:00
7866a92e16
remove systemd-resolved
2022-10-16 19:36:15 +02:00
5613ed9908
Complete telemetry configuration
2022-10-16 18:12:57 +02:00
b5a0f8bd82
Add docker
2022-10-16 13:13:43 +02:00
c3a30aabab
Switch to systemd-networkd
2022-10-15 10:38:48 +02:00
72606368bf
Force Garage to use ipv6 connectivity
2022-09-15 11:57:24 +02:00
6ec9aad801
Improve DNS configuration
...
Add Unbound server that separates queries between those going to Consul
and those going elsewhere. This allows us to have DNS working even if
Consul fails for some reason. This way we can also remove the secondary
`nameserver` entry in /etc/resolv.conf, thus fixing a bug where certain
containers (Alpine-based images?) were using the secondary resolver some
of the time, making them unable to access .consul hosts.
2022-08-30 15:52:42 +02:00
243eee4322
Ask consul to use advertised address and not bind one
2022-08-24 20:03:31 +02:00
1172e8e511
Fix nomad talking to consul
2022-08-24 18:51:55 +02:00
a0c8280c02
Fix access to consul for non-server nodes
2022-08-24 16:58:50 +02:00
ec2020b71b
Disable bootstrap_expect unless specific deuxfleurs.bootstrap is set
2022-08-24 14:23:17 +02:00
9e39677e1d
Fix IPv6
2022-08-24 11:06:55 +02:00
ab901fc81d
Remove wesher, reconfigure staging without it
2022-08-23 23:55:15 +02:00
02b1e6200c
Disable ipv6 temporary addresses
2022-08-23 13:12:07 +02:00
7d7efab9ee
Update to nixos 22.05
2022-07-27 11:18:23 +02:00
641a68715f
Configure Consul DNS
2022-06-01 14:48:16 +02:00
d47d4e93ab
Work on drone runner as VM
2022-05-30 14:57:05 +02:00
1e23341710
Fix firewall rule for IGD
2022-05-09 00:29:17 +02:00
178107af0c
Network configuration updates
2022-05-09 00:20:02 +02:00
83dd3ea25a
Update network configuration
2022-05-08 14:42:18 +02:00
10d370491e
Replace ad-hoc wireguard by wesher on staging cluster
2022-04-20 18:04:57 +02:00
3d8989b9c9
nix infinite recursion
2022-04-19 17:41:18 +02:00
86b9873221
Wireguard directly using LAN addresses when possible
2022-02-26 00:13:08 +01:00