nixos-config/hosts/plover
2023-01-10 12:13:51 +08:00
..
files hosts/plover: update Gitea home template 2023-01-10 12:13:51 +08:00
secrets hosts/plover: create separate passwords for different repos 2023-01-07 17:19:45 +08:00
default.nix hosts/plover: create separate passwords for different repos 2023-01-07 17:19:45 +08:00
hardware-configuration.nix hosts/plover: update hardware config according to Hetzner Cloud defaults 2023-01-07 10:52:30 +08:00
README.adoc docs: update various READMEs 2023-01-07 10:52:30 +08:00

This is Plover, a configuration meant to be used in a low-powered general-purpose machine. It isnt much of an instance to be seriously used yet but hopefully it is getting there.

This configuration is expected to be deployed in a Google Compute instance.

It has a reasonable set of assumptions to keep in mind when modifying this configuration:

  • Most of the defaults are left to the image profiles from nixpkgs including networking options and filesystems.

  • No additional storage drives.

  • At least 32 GB of space is assumed.

Some of the self-hosted services from this server:

  • An nginx server which will make tie all of the self-hosted services together.

  • A Vaultwarden instance for a little password management.

  • A Gitea instance for my personal projects.

  • A Keycloak instance for identity management.

  • An LDAP server with OpenLDAP.

General deployment guidelines

If you want to deploy it anywhere else, you have to keep some things in mind.

  • This uses sops and sops-nix to decrypt secrets. It mainly use the private key to the ./files/age-key.pub and move it to the appropriate location (i.e., /var/lib/sops-nix/key.txt).

  • Be sure to set the appropriate firewalls either in the NixOS configuration or in the VPS provider firewall settings. Take note some formats such as Google Compute image disable them entirely so its safer to leave the firewall service and just configure the allowed ports and other settings.

  • There are some things that are manually configured such as additional setup for the database. Mostly related to setting up the proper roles which should be set up with the initial script at this point but there are some still left.

  • If needed, restoring the application data from the backup into the services (e.g., Gitea, Keycloak, Vaultwarden).

  • Configuring the remaining parts for the services (which unfortunately involves manually going into each application).

  • Configure the database users with each appropriate service.

Deploying it as a Google Compute instance

Some documented guidelines to deploy this instance in Google Cloud Platform (GCP) so you wont have to re-read those documentation like a stuck rat the next time you visit them.

  • A GCP Compute Instance image of the configuration is available to be stored at your storage buckets. You can simply build it at packages.plover-gce and store it there.

    You can take it further automating it by running ../../scripts/generate-and-upload-gce-image which is just a modified version of the create-gce.sh script from nixpkgs.

  • If you already have access to at least one GCP KMS key, then skip this part. Add a key to be used for deployment to wherever relevant file in the secrets directory. [1] For this, youll have to create a GCP keyring on their key management system (KMS) and generate a key there.

  • Enable OS Login for your Compute Engine instance.

  • Enable HTTP and HTTPS traffic in the firewall settings.

  • Dont forget to set the appropriate scopes for the instance. Use the least privileged scopes as much as possible.

  • Reserve a static IP address, pls. Just dont forget to immediately assign it to the instance since it will charge higher if you just leave it alone.

  • Creating a dedicated service account for the VM is recommended. Just make sure to set the least amount of privileges for that account.

Deploying it to Hetzner Cloud

To deploy this to Hetzner Cloud, just initialize a server and run nixos-infect script. As an example, you can run the server with the following cloud config.

#cloud-config

runcmd:
  - curl https://raw.githubusercontent.com/elitak/nixos-infect/bca605ce2c91bc4d79bf8afaa4e7ee4fee9563d4/nixos-infect | NIX_CHANNEL=nixos-unstable bash 2>&1 | tee /tmp/infect.log

You could also easily create a server with hcloud with the following command:

hcloud server create --location hel1 --type cx21 --image ubuntu-22.04 \
    --user-data-from-file ./files/hcloud-user-data.yml \
    --ssh-key foodogsquared@foodogsquared.one \
    --name nixos-plover

If you dont want to setup the firewall in the system, you could use the firewall from Hetzner (which is recommended anyways).

Then, dont forget to setup the prerequisites such as filesystems properly. Heres a set of commands setting up to the current filesystem configuration.

e2label /dev/sda1 nixos
fatlabel /dev/sda15 boot

Next, do the steps as written from General deployment guidelines.


1. Of course, you need previous keys which youre likely using the private age key for this system.