No description
Find a file
2022-01-12 14:08:08 +01:00
group_vars/all Remove legacy configs 2021-07-15 18:00:49 +02:00
hardware Set timezone for storage1 2022-01-02 01:27:00 +01:00
keys Start migration to NixOS for storage1 2021-11-29 02:04:29 +01:00
modules Allow redirects from skynet.be 2022-01-12 14:08:08 +01:00
profiles Add Jitsi 2021-12-27 17:17:02 +01:00
roles Configure backup for Nextcloud 2021-07-17 01:02:26 +02:00
scripts Add new storage1 deploy-rs config 2021-11-26 00:14:44 +01:00
ssh_keys Assign floating ip to backend1 2021-07-24 03:02:54 +02:00
.envrc Move Synapse on hcloud and deploy it with Terraform + NixOs 2021-07-15 13:38:22 +02:00
.gitignore Update packages and deploy using deploy-rs 2021-11-25 00:33:28 +01:00
.gitmodules Provision k8s cluster with Kubespray 2019-04-04 02:25:38 +02:00
.sops.yaml Start migration to NixOS for storage1 2021-11-29 02:04:29 +01:00
ansible-playbook.sh Helper to transfer data to CephFs and setup wikis 2019-09-01 03:41:21 +02:00
ansible.cfg Add flaresolverr 2021-01-11 21:01:36 +01:00
config.tf Move Synapse on hcloud and deploy it with Terraform + NixOs 2021-07-15 13:38:22 +02:00
dns.tf Add storage1 dns 2022-01-02 01:33:53 +01:00
environment.nix Start migration to NixOS for storage1 2021-11-29 02:04:29 +01:00
flake.lock Update to NixOs 21.11 and add dokuwiki 2021-12-07 08:34:21 +01:00
flake.nix Update to NixOs 21.11 and add dokuwiki 2021-12-07 08:34:21 +01:00
instances.tf Start migration to NixOS for storage1 2021-11-29 02:04:29 +01:00
outputs.tf Move Synapse on hcloud and deploy it with Terraform + NixOs 2021-07-15 13:38:22 +02:00
playbook.yml Migrate Nextcloud to hcloud 2021-07-17 00:24:30 +02:00
production Remove legacy configs 2021-07-15 18:00:49 +02:00
README.md Update documentation 2018-04-25 19:00:15 +02:00
secrets.enc.yml Add Roundcube 2021-12-27 16:39:22 +01:00
shell.nix Fix dkim public key for froidmont.org 2021-09-02 16:11:58 +02:00
UNLICENSE Add UNLICENSE 2021-07-08 19:23:39 +02:00

Self-hosting

This project maintains the entire configuration of our self-hosted services. All configuration should be done exclusively in this repo so that everything is versioned and we have a reliable and esay way to restore the production to any given state. The deployement of the configuration is done with Ansible. Everything respects the basic Ansible principle that your configuration should be idempotent. It means that that the configuration is completely independent of the current state of the server so whatever the state of the server is, the resulting state should always be the same. Because of this you shouldn't hesitate to run Ansible often to make sure that the configuration works and the server is in the expected state. If you run ansible-playbook two times in a row, the second execution should result in no changes to be made.

Deploying the configuration

The following command deploys the complete configuration.

ansible-playbook -i production playbook.yml --ask-vault-pass

For this to work, you must of course have ansible installed and have ssh access to the server(s). You will be prompted for the vault password, ask for it if you don't have it.

Deploying specific parts of the configuration

You probably don't want to deploy the entire configuration every time you make a small change. You can deploy specific roles by providing a list of tags. Checkout playbook.yml to see which tag matches a specific role. Here is an example of deploying only the wiki and the reverse proxy:

ansible-playbook -i production playbook.yml --ask-vault-pass --tags wiki,traefik