Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add a wireguard network with hades as a router #12

Merged
merged 4 commits into from
Dec 21, 2024
Merged

Conversation

foodelevator
Copy link
Member

@foodelevator foodelevator commented Dec 19, 2024

Hades is the only host in the hetzner private network that needs to have wireguard installed. The others route packets to hades due to a routing rule set in hetzner. Hades forwards packets between the wireguard subnet (10.83.1.0/24) and the hetzner subnet (10.83.0.0/24).

Currently one peer has been set up, mjukglass, but Arkaden in META is apparently behind a NAT so we could add that as well so people can SSH to it (probably through a proxy (probably traefik) so we don't need to add people to the wireguard network).

Hades was chosen semi-arbitrarily. I thought it would be good to use one of the servers rather than ares or artemis.

This is already deployed btw :)

@foodelevator foodelevator requested a review from RafDevX December 19, 2024 21:09
Copy link

github-actions bot commented Dec 19, 2024

OpenTofu plan for dsekt-infra

No changes. Your infrastructure matches the configuration.
No changes. Your infrastructure matches the configuration.

OpenTofu has compared your real infrastructure against your configuration and
found no differences, so no changes are needed.

📝 Plan generated in Create OpenTofu plan #48

I think default is 100, which we're sometimes reaching now it seems
like. At least twenty has been erroring and it seems like that's why.
Found out you can see current connection count by database using `select
datname, numbackends from pg_stat_database;` and it seems we have a
reasonable number of connections per system yet the total is circa 80.
Hades is the only host in the hetzner private network that needs to have
wireguard installed. The others route packets to hades due to a routing
rule set in hetzner. Hades forwards packets between the wireguard subnet
(10.83.1.0/24) and the hetzner subnet (10.83.0.0/24). Currently one peer
has been set up, mjukglass, but _Arkaden_ in META is apparently behind a
NAT so we could add that as well so people can SSH to it (probably
through a proxy (probably traefik) so we don't need to add people to the
wireguard network).
@RafDevX
Copy link
Member

RafDevX commented Dec 20, 2024

This might need rebasing(?)

@foodelevator foodelevator merged commit ae7723c into main Dec 21, 2024
1 check passed
@foodelevator foodelevator deleted the wireguard branch December 21, 2024 02:13
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants