| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
|
| |
Install the key with the host's configuration and rekey the secrets.
|
| |
|
|
| |
Use anthropic's models and set the API key.
|
| |
|
|
|
|
| |
Run victoria metrics and grafana on rivendell. Grafana is using authelia
for auth. We run some collectors on all the machines, and they publish
to VM through the wireguard interface.
|
| | |
|
| |
|
|
|
|
|
| |
For machines with full disk encryption, we can remotely unlock them from
bree. A systemd timer will run every 10 minutes and check if we need to
unlock the host. If we need to, it will SSH and provide the passphrase
to unlock the disk(s).
|
| |
|
|
| |
All the secrets were re-keyed.
|
| |
|
|
|
|
| |
In addition to do a local backup, we also backup to the synology nas. We
don't configure what to backup in the profiles, but instead in the host
configuration.
|
| | |
|
| | |
|
| | |
|
| |
|
|
| |
This machine is replaced by argonath
|
| | |
|
| | |
|
| |
|
|
| |
Clean up API keys for Cloudflare.
|
| | |
|
| | |
|
| | |
|
| | |
|
| |
|
|
|
| |
I had to rekey all the secrets. Updated the documentation for both how
to setup forgejo and keycloak.
|
| | |
|
| |
|
|
|
| |
For some reasons, I can't get compression to work with Caddy, and I
don't get much benefit from it in the first place anyway.
|
| | |
|
| | |
|
| | |
|
| | |
|
| |
|
|
|
|
|
| |
Add a new machine on DigitalOcean and provision it using terraform +
nixos-anywhere. This takes care of bringing the machine up on nixos
completely, and use a static SSH host key in order to configure
wireguard at the same time.
|
| |
|
|
| |
All the secrets were rekeyed.
|
| |
|
|
|
|
|
|
|
|
| |
The new module is for NAS clients, where we specify the server and the
paths to mount locally.
We add a new secret to have the username of the `nas' user.
We mount the backups volume from the NAS under `/data/backups` on the
VM.
|
| |
|
|
|
|
|
|
|
|
| |
It might be useful to have a local backup so that I don't need to pull
it from the remote bucket. It is useful to be able to quickly browse and
see what's in the backup, and having to go to GCS for that is a waste of
resources.
Export environment variables to make it easier to interact with the
local repository.
|
| | |
|
| |
|
|
| |
For now we only backup git repositories.
|
| | |
|
| |
|
|
|
|
|
| |
The key is still stored in 1password, and we add a script to
synchronize the key to the host.
The existing keys have been rekeyed with the new key.
|
| |
|
|
|
|
|
|
|
|
|
| |
I have some secrets that I want to manage for my user without having
to rely on 1password, and ensure proper rotation everywhere when
needed.
For now we only have two secrets (one for `llm` and another one is the
API key for anthropic for Emacs).
Will document the process better in the near future.
|
| | |
|
| |
|
|
|
|
| |
`nixfmt-rfc-style' replaces `nixfmt-classic'. It's actively
maintained, but also changes the style, so this commit touches all the
files in the repository.
|
| | |
|
| | |
|
| |
|
|
|
| |
It has a small UI and the configuration with the secrets is managed
with `agenix'.
|
| | |
|
| |
|
|
|
| |
Refactor a bit the configuration, which should simplify the management
and usage of secrets from now on.
|
| |
|
|
|
|
| |
Add a couple of secrets to store the configuration and the service
account, and add a timer to synchronize the restic repository to a GCS
bucket once a day.
|
| | |
|
| | |
|
| |
|
|
|
|
|
|
|
| |
I want to run traefik on the NAS, so I can reach grafana and other
future services running on that host.
To manage TLS, we use let's encrypt with a DNS challenge. For this to
work we need a service account configuration, that is encrypted with
age.
|
| |
|
|
| |
Reinstalled tahoe, new ssh key for the host.
|
| | |
|
| | |
|
| |
|