snix/ops/glesys
Vincent Ambo bf552f7a9b feat(ops/machines): IPv6 setup for bugry
Adman (the hoster) have not provided an ETA for native v6 on bugry yet, so we
establish a public v6 connection through nevsky for now.

In traffic flows going West->East the overhead is minimal (a few ms), though I
guess it might be worse if you're in the middle (Yekaterinburg or something).

The prefix was chosen by the bugry public v4 address encoded in hex, and
appended to the nevsky prefix.

Change-Id: I133622c17bd02eade0a6febc6bdf97f403fed14c
Reviewed-on: https://cl.tvl.fyi/c/depot/+/12974
Autosubmit: tazjin <tazjin@tvl.su>
Tested-by: BuildkiteCI
Reviewed-by: sterni <sternenseemann@systemli.org>
2025-01-14 16:44:26 +00:00
..
.gitignore feat(ops/glesys): Add gitignore for Terraform files 2021-12-24 18:54:44 +00:00
default.nix refactor(ops/glesys): Use tools.checks.validateTerraform 2022-06-07 09:32:13 +00:00
dns-nixery-dev.tf fix(ops): update DNS record for nixery-01 2024-04-18 08:39:59 +00:00
dns-tvix-dev.tf feat(ops/glesys): add bolt.tvix.dev 2024-02-23 18:44:18 +00:00
dns-tvl-fyi.tf feat(ops/machines): IPv6 setup for bugry 2025-01-14 16:44:26 +00:00
dns-tvl-su.tf feat(ops/glesys): add bolt.tvix.dev 2024-02-23 18:44:18 +00:00
main.tf feat(ops/machines): IPv6 setup for bugry 2025-01-14 16:44:26 +00:00
README.md feat(ops/secrets): Import secrets for tf-glesys 2021-12-27 15:53:57 +00:00

Terraform for GleSYS

This contains the Terraform configuration for deploying TVL's infrastructure at GleSYS. This includes object storage (e.g. for backups and Terraform state) and DNS.

Secrets are needed for applying this. The encrypted file //ops/secrets/tf-glesys.age contains export calls which should be sourced, for example via direnv, by users with the appropriate credentials.

An example direnv configuration used by tazjin is this:

# //ops/secrets/.envrc
source_up
eval $(age --decrypt -i ~/.ssh/id_ed25519 $(git rev-parse --show-toplevel)/ops/secrets/tf-glesys.age)
watch_file $(git rev-parse --show-toplevel)/secrets/tf-glesys.age