jungle/m/hut/configuration.nix

49 lines
1.2 KiB
Nix
Raw Normal View History

2023-09-04 22:09:40 +02:00
{ config, pkgs, ... }:
2023-03-31 18:27:25 +02:00
{
imports = [
../common/xeon.nix
2023-03-31 18:27:25 +02:00
../module/ceph.nix
../module/debuginfod.nix
../module/slurm-client.nix
2023-03-31 18:27:25 +02:00
./gitlab-runner.nix
2023-04-05 17:00:01 +02:00
./monitoring.nix
2023-04-06 13:57:32 +02:00
./nfs.nix
./slurm-server.nix
2023-09-12 12:19:43 +02:00
./nix-serve.nix
./public-inbox.nix
./gitea.nix
./msmtp.nix
./postgresql.nix
2023-08-25 13:21:00 +02:00
#./pxe.nix
2023-08-23 17:42:50 +02:00
];
boot.binfmt.emulatedSystems = [ "armv7l-linux" "aarch64-linux" "powerpc64le-linux" "riscv64-linux" ];
# Select the this using the ID to avoid mismatches
boot.loader.grub.device = "/dev/disk/by-id/ata-INTEL_SSDSC2BB240G7_PHDV6462004Y240AGN";
networking = {
2023-06-14 11:15:00 +02:00
hostName = "hut";
interfaces.eno1.ipv4.addresses = [ {
address = "10.0.40.7";
prefixLength = 24;
} ];
interfaces.ibp5s0.ipv4.addresses = [ {
address = "10.0.42.7";
prefixLength = 24;
} ];
firewall = {
extraCommands = ''
# Accept all proxy traffic from compute nodes but not the login
iptables -A nixos-fw -p tcp -s 10.0.40.30 --dport 23080 -j nixos-fw-log-refuse
iptables -A nixos-fw -p tcp -s 10.0.40.0/24 --dport 23080 -j nixos-fw-accept
'';
};
};
# Allow proxy to bind to the ethernet interface
services.openssh.settings.GatewayPorts = "clientspecified";
2023-03-31 18:27:25 +02:00
}