Add apex machine configuration #131
Reference in New Issue
Block a user
Delete Branch "apex"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
The apex machine will be the new login. It has a HW RAID 5 that should keep the data safe in the case of a single disk failure (it has 4 in good condition). The RAID 5 also can provide good speed, but I suspect disks need to be TRIMed, but with HW raid is... complicated. For now we arrive at 7kIOPS on latency and about 90MB/s on bandwidth, however the RAID controller can provide 16Gbit/s and each disk 500MB/s, so we should be able to arrive to at least 1GB/s. In any case, the old login could only arrive to 12 MiB/s, so it is already an improvement.
We are connected via a 10Gbps/s link to the upstream switch, and we can sustain almost 2Gbit/s of download speed from the outside world:
For now, we have:
We still don't have direct visibility to machines in the internal network to clone repositories, so we need to use help from other hosts.
This PR intention is to only setup the minimal parts to allow access to compute nodes. I still need to reconfigure a lot of services, but that can be left for other PR(s).
15b73eda4bto58a64f64e0WIP: Add apex machine configurationto Add apex machine configuration@@ -0,0 +14,4 @@# Check with `rpcinfo -p`extraCommands = ''# Accept NFS traffic from compute nodes but not from the outsideiptables -A nixos-fw -p tcp -s 10.0.40.0/24 --dport 111 -j nixos-fw-acceptWe should add
networking.nftables.enable = lib.mkForce false;in case they ever change the default to nftables.Sure!
@@ -0,0 +29,4 @@iptables -A nixos-fw -p udp -s 10.0.40.0/24 --dport 20048 -j nixos-fw-accept'';# Flush all rules and chains on stop so it won't break on startextraStopCommands = ''Seems that the nixos service drops its chains on start, so this may not be needed unless we have different chain rules?
9807714d69/nixos/modules/services/networking/firewall-iptables.nix (L63)Okay, I can change it. Let's see if we don't break the SSH.
Seems to work ok.
I will also add the host SSH configuration so users can access GitLab without any extra configuration.
4e9be9a8d3to9e4072f0aa9e4072f0aato9e83565977