From da580eb7d22dd3ef540ab41d267e1c98ebf7a064 Mon Sep 17 00:00:00 2001 From: shockrah Date: Tue, 4 Mar 2025 11:44:09 -0800 Subject: [PATCH] REmoving bogus wiki stuff --- runbooks/atlas-setup.md | 45 ----------------------------------------- runbooks/new-drive.md | 33 ------------------------------ 2 files changed, 78 deletions(-) delete mode 100644 runbooks/atlas-setup.md delete mode 100644 runbooks/new-drive.md diff --git a/runbooks/atlas-setup.md b/runbooks/atlas-setup.md deleted file mode 100644 index 530504f..0000000 --- a/runbooks/atlas-setup.md +++ /dev/null @@ -1,45 +0,0 @@ -# What this covers - -The creation of Atlas as it happened in order - -## Commands Ran - -Once the infra was provisioned and verified to be configured by Terraform correctly -we move on to the following - -```sh -# Setup the machine to run docker -ansible-playbook -i hosts.ini atlas/init/system-deps.yml - -# Second we copy over the contents of Alpha's mounted docker volumes -ansible-playbook -i hosts.ini atlas/init/perma-mount-drives.yml - -# Next we copy over the data that we want to migrate ( if any ) -ansible-playbook -i hosts.ini -e filebrowser=/path -e clippable=/path atlas/init/migrate-clips-files.yml - -# Setup the services on the host that we want to run -ansible-playbook -i hosts.ini atlas/init/setup-containers.yml - -# Next we put up the reverse proxy (nginx) -ansible-playbook -i hosts.ini atlas/init/setup-reverse-proxy.yml - -# Finally we add TLS on top of nginx and we're done -ansible-playbook -i hosts.ini atlas/init/setup-certbot.yml -``` - -Maintenance should be straight forward for this machine as TLS is automatically -renewed every 3 months by a cron job. We can manually update the certs however -if we really want to. They also don't require anymore manual variable injection -like Alpha did as the only thing protected was `dev@shockrah.xyz` which is at -this point becoming semi-public. This means while it is associated with code -it is more of a _business e-mail_ so it can be placed in this repository with -very little concern. - -System updates are now also to be fetched with a: - -```sh -ansible-playbook -i hosts.ini atlas/maintain/analyze-system-deps.yml -``` - -Which performs purely read operations and does not affect the state of the -machine. diff --git a/runbooks/new-drive.md b/runbooks/new-drive.md deleted file mode 100644 index 1684155..0000000 --- a/runbooks/new-drive.md +++ /dev/null @@ -1,33 +0,0 @@ -# Mounting an attached drive - -Assumptions: - -* New drive is attached(in AWS) and detected in software -Ideally attachment is made through terraform - -## Mounting Instructions (Step-by-Step) - -1. Verify data does not have data: `sudo file -s /dev/xvdf` - -Should return `data` if its ok. Other wise we're probably looking at the wrong -drive. - -2. Create the filesystem on the new empty drive: `sudo mkfs -t ext4 /dev/xvdf` - -3. Create mountpoint other wares to actaully use the drive -`sudo mkdir /mnt/example`. - -Change _example_ to something that actually makes sense. - -4. Add a new entry to /etc/fstab for automounting - -`/dev/xvdf /newvolume ext4 defaults,nofail 0 0` - -Tab delimited btw. - -5. Mount all drives listed in `/etc/fstab` from before. `sudo mount -a` - - - - -