forked from Deuxfleurs/nixcfg
Update README; DNS on prod
This commit is contained in:
parent
0dedbd2d22
commit
c81442dc01
2 changed files with 12 additions and 7 deletions
16
README.md
16
README.md
|
@ -139,6 +139,7 @@ Host caribou
|
||||||
HostName 2a01:e0a:c:a720::23
|
HostName 2a01:e0a:c:a720::23
|
||||||
LocalForward 14646 127.0.0.1:4646
|
LocalForward 14646 127.0.0.1:4646
|
||||||
LocalForward 8501 127.0.0.1:8501
|
LocalForward 8501 127.0.0.1:8501
|
||||||
|
LocalForward 1389 bottin.service.staging.consul:389
|
||||||
```
|
```
|
||||||
|
|
||||||
Then, in a separate window, launch `./tlsproxy <cluster_name>`: this will
|
Then, in a separate window, launch `./tlsproxy <cluster_name>`: this will
|
||||||
|
@ -151,10 +152,15 @@ long as you need to access Nomad and Consul on the cluster.
|
||||||
|
|
||||||
Stuff should be started in this order:
|
Stuff should be started in this order:
|
||||||
|
|
||||||
- `app/core`
|
1. `app/core`
|
||||||
- `app/frontend`
|
2. `app/frontend`
|
||||||
- `app/garage-staging`
|
3. `app/telemetry`
|
||||||
|
4. `app/garage-staging`
|
||||||
|
5. `app/directory`
|
||||||
|
|
||||||
At this point, we are able to have a systemd service called `mountgarage` that mounts Garage buckets in `/mnt/garage-staging`. This is used by the following services that can be launched afterwards:
|
Then, other stuff can be started in any order:
|
||||||
|
|
||||||
|
- `app/im` (cluster `staging` only)
|
||||||
|
- `app/cryptpad` (cluster `prod` only)
|
||||||
|
- `app/drone-ci`
|
||||||
|
|
||||||
- `app/im`
|
|
||||||
|
|
|
@ -5,8 +5,7 @@
|
||||||
deuxfleurs.lan_default_gateway = "192.168.1.1";
|
deuxfleurs.lan_default_gateway = "192.168.1.1";
|
||||||
deuxfleurs.lan_ip_prefix_length = 24;
|
deuxfleurs.lan_ip_prefix_length = 24;
|
||||||
deuxfleurs.ipv6_prefix_length = 64;
|
deuxfleurs.ipv6_prefix_length = 64;
|
||||||
|
deuxfleurs.nameservers = [ "192.168.1.1" ];
|
||||||
networking.nameservers = [ "192.168.1.1" ];
|
|
||||||
|
|
||||||
networking.firewall.allowedTCPPorts = [ 80 443 ];
|
networking.firewall.allowedTCPPorts = [ 80 443 ];
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue