infrastructure:servers:chaosknoten
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| infrastructure:servers:chaosknoten [2023-07-29 18:12 UTC] – [Konfiguration] stb | infrastructure:servers:chaosknoten [2026-02-24 13:44 UTC] (current) – fix netbox domain lilly | ||
|---|---|---|---|
| Line 2: | Line 2: | ||
| ---- dataentry server ---- | ---- dataentry server ---- | ||
| - | hostname: | + | hostname |
| - | location: | + | location |
| - | maintainers: | + | maintainers : Infra-Team |
| - | netbox_url: | + | netbox_url |
| ---- | ---- | ||
| + | |||
| <WRAP column half> | <WRAP column half> | ||
| Line 33: | Line 34: | ||
| ===== Gast-VMs ===== | ===== Gast-VMs ===== | ||
| - | Die VMs sind in Netbox dokumentiert: | + | Die VMs sind in Netbox dokumentiert: |
| ===== Firewall-Freischaltung ===== | ===== Firewall-Freischaltung ===== | ||
| Line 41: | Line 42: | ||
| * stb: 213.240.180.39 und 2a01: | * stb: 213.240.180.39 und 2a01: | ||
| * haegar: 136.243.3.21, | * haegar: 136.243.3.21, | ||
| + | |||
| ===== Netzwerkanbindung ===== | ===== Netzwerkanbindung ===== | ||
| Line 56: | Line 58: | ||
| * von hinten gesehen rechter Port | * von hinten gesehen rechter Port | ||
| * rotes Patchkabel zu Switchport 18 | * rotes Patchkabel zu Switchport 18 | ||
| - | * IPMI-iDRAC-Interface: | ||
| - | * 1G Kupfer | ||
| - | * verbunden mit IRZ42-Netz VLAN 512 (aber bei uns ungetaggt) | ||
| - | * Switchport 17, aber kein Patchkabel gesteckt, weil (noch) keine Firewall | ||
| '' | '' | ||
| Line 65: | Line 63: | ||
| '' | '' | ||
| - | DIe VMs haben Adressen aus verschiedenen Netzen. Siehe [[https:// | + | Die VMs haben Adressen aus verschiedenen Netzen. Siehe [[https:// |
| + | |||
| + | ==== IPMI-iDRAC-Interface ==== | ||
| + | |||
| + | * 1G Kupfer | ||
| + | * verbunden mit '' | ||
| + | * Wireguard-Config liegt in Pass unter '' | ||
| + | * Zugang zum Router liegt in Pass unter '' | ||
| + | * Hostname '' | ||
| + | |||
| + | ==== Network Design ==== | ||
| + | |||
| + | Currently only some traffic is going through the old router VM (turing) and other VMs are routed by Wieske. | ||
| + | We intend to move over to a setup where all traffic is going through a new router VM ([[https:// | ||
| + | |||
| + | There are requirements for 3 main networks: | ||
| + | |||
| + | * v4-NAT: VMs without public IPv4 address behind the public reverse proxy | ||
| + | * public: VMs with public IPv4 address | ||
| + | * VMs without public interface at all, e.g. CI runners | ||
| + | |||
| + | Internal networks are all running on one linux bridge interface '' | ||
| + | See [[https:// | ||
| + | |||
| + | Internal IPv4 addresses shall use '' | ||
| + | Each VLAN shall use it's own ''/ | ||
| + | |||
| + | The router will have additional network interfaces for the uplink bridge devices '' | ||
| + | |||
| + | === How to add VMs === | ||
| + | |||
| + | To add a new VM: | ||
| + | |||
| + | * Generate new public IPv6 and add to Netbox, e.g. in [[https:// | ||
| + | * Add records to DNS server | ||
| + | * AAAA record on '' | ||
| + | * A and AAAA records for '' | ||
| + | * Create VM in Proxmox and note MAC address | ||
| + | * Add VM in [[https:// | ||
| + | * Create interface in '' | ||
| + | * Configure the chosen IPv6 address in cloud-init, IPv4 shall be DHCP | ||
| + | * Setup firewall in Proxmox as needed | ||
| + | * When in v4-NAT network: Re-deploy public-reverse-proxy | ||
| + | |||
| + | ==== Legacy IPv4 Networks ==== | ||
| + | |||
| + | === Public IPv4s === | ||
| + | |||
| + | We have the following public IPv4 subnets/ | ||
| + | |||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | |||
| + | === Private IPv4s === | ||
| + | |||
| + | We use the following private IPv4 ranges: | ||
| + | |||
| + | * '' | ||
| + | * '' | ||
| + | |||
| + | ==== Legacy IPv6 Networks ==== | ||
| + | |||
| + | The new prefix for IPv6 connectivity is '' | ||
| + | It is routed through our new router VM (which shall have '' | ||
| + | Please see the NetBox which sub-prefixes are used for what! | ||
| + | |||
| + | Legacy: We have 2 IPv6-64-Prefixes, | ||
| + | |||
| + | === 2a00: | ||
| + | |||
| + | '' | ||
| + | This subnet corresponds to the following IPv4-Subnets: | ||
| + | * '' | ||
| + | |||
| + | To generate an IPv6 corresponding to an IPv4, we use the following convention: Take the last octet of the IPv4-address in decimal and use it for the first two bytes of the localpart, but with the digits as hex.\\ | ||
| + | So e.g.: '' | ||
| + | |||
| + | === 2a00: | ||
| + | |||
| + | '' | ||
| + | This subnet corresponds to the following IPv4-Subnets: | ||
| + | * '' | ||
| + | * '' | ||
| + | |||
| + | To generate an IPv6 corresponding to an IPv4 from either '' | ||
| + | So e.g.: | ||
| + | * '' | ||
| + | * '' | ||
| + | |||
| + | To generate an IPv6 corresponding to an IPv4 from '' | ||
| + | So e.g.: | ||
| + | * '' | ||
| ===== Konfiguration ===== | ===== Konfiguration ===== | ||
| Line 71: | Line 161: | ||
| ===== Zugriff auf VMs ===== | ===== Zugriff auf VMs ===== | ||
| - | SSH auf allen VMs läuft auf nicht-Standard-Ports, | + | SSH auf alten VMs läuft auf nicht-Standard-Ports, |
| - | Alle VMs, die eine RFC1918-Adresse haben, können über turing-router oder turing-main als Jumphost erreicht werden. Als Beispiel hier ein Snippet für '' | + | VMs sollten per IPv6 direkt erreichbar sein. |
| + | Falls Zugriff aus einem Netz ohne IPv6 erforderlich ist, kann die Router-VM als Jumphost verwendet werden. | ||
| + | |||
| + | Alte VMs, die eine RFC1918-Adresse haben, können über turing-router oder turing-main als Jumphost erreicht werden. Als Beispiel hier ein Snippet für '' | ||
| < | < | ||
| + | Host ccchh-router | ||
| + | User chaos | ||
| + | Hostname router.hamburg.ccc.de | ||
| + | |||
| + | Host *.host.hamburg.ccc.de | ||
| + | User chaos | ||
| + | ProxyJump ccchh-router | ||
| + | |||
| + | |||
| + | ## legacy | ||
| + | Host ccchh-jumphost | ||
| + | User chaos | ||
| + | Hostname public-reverse-proxy.hamburg.ccc.de | ||
| + | |||
| + | Host *-intern.hamburg.ccc.de | ||
| + | User chaos | ||
| + | ProxyJump ccchh-jumphost | ||
| + | |||
| Host turing | Host turing | ||
| HostName turing.hamburg.ccc.de | HostName turing.hamburg.ccc.de | ||
| Port 4222 | Port 4222 | ||
| User chaos | User chaos | ||
| - | IdentitiesOnly yes | ||
| Host turing-main | Host turing-main | ||
| Line 86: | Line 196: | ||
| Port 42666 | Port 42666 | ||
| User chaos | User chaos | ||
| - | IdentitiesOnly yes | + | </ |
| - | Host ns-intern | ||
| - | HostName ns-intern.hamburg.ccc.de | ||
| - | User chaos | ||
| - | IdentitiesOnly yes | ||
| - | ProxyJump turing | ||
| - | Host rproxy-intern | + | ===== HOWTO Chaosknoten-Reboot ===== |
| - | | + | |
| - | User chaos | + | ==== Vor dem Reboot ==== |
| - | | + | |
| - | | + | === VMs hibernaten === |
| - | </code> | + | |
| + | Eine Reihe von VMs brauchen beim Booten ein Secret über die Konsole, z. B. für LUKS. Wenn man das nicht machen will, kann mann die betreffenden VMs in den Winterschlaf schicken. Wir haben alle VMs, für die das notwendig ist, mit dem Tag " | ||
| + | |||
| + | # ./ | ||
| + | |||
| + | ==== Nach dem Reboot ==== | ||
| + | |||
| + | Was nach einem reboot alles passieren muss, damit alle services wieder hochkommen. | ||
| + | |||
| + | === ZFS encrypted Dataset entsperren === | ||
| + | |||
| + | Key liegt im pass unter '' | ||
| + | |||
| + | zfs load-key rust0/ | ||
| + | |||
| + | ===== Assigned Services ===== | ||
| + | |||
| + | ---- datatable ---- | ||
| + | headers : Service, Service-URLs, | ||
| + | cols : %pageid%, service-urls_urls, | ||
| + | filter | ||
| + | and : %pageid%!=infrastructure: | ||
| + | and : server_page==infrastructure: | ||
| + | ---- | ||
infrastructure/servers/chaosknoten.1690654365.txt.gz · Last modified: by stb