- 14 May, 2022 2 commits
-
-
Evangelos Foutras authored
The intention is to use this config for other domains besides a mirror.
-
Evangelos Foutras authored
- add the new role to redirect.archlinux.org - release mirror.pkgbuild.com of all DNS duties
-
- 15 Apr, 2022 1 commit
-
-
Kristian Klausen authored
We don't want mirror.pkgbuild.com's DNS server to be a single-point-of-failure, so this commit adds multiple authoritative DNS servers for the zone. The extra DNS servers are run on the geomirror servers. The _acme-challenge zone, used for obtaining certificates, is run solely on mirror.pkgbuild.com's DNS server, to avoid syncing DNS records between the servers (KISS).
-
- 13 Apr, 2022 2 commits
-
-
Evangelos Foutras authored
mirror.pkgbuild.com doesn't need it.
-
Kristian Klausen authored
We had a GeoIP mirror in the past based on nginx and its GeoIP module, but it didn't perform very well, due to the high latency (asking a central server for the package and then redirected to the closest mirror). One of the reasons for offering this service, is so we can relieve mirror.pkgbuild.com which is burning a ton of traffic (50TB/month), likely due to it being the default mirror in our Docker image. Another reason is so we can offer a link to our arch-boxes images in libosinfo (used by gnome-boxes, virt-install and virt-manager), with good enough performance for most users. This time we take a different approach and use a DNS based solution, which means the latency penalty is only paid once (the first DNS request). The downside is that the mirrors must have a valid certificate for the same domain name, which makes using third-party mirrors a challenge. So for now, we are just using the sponsored mirorrs controlled by the DevOps team. Fix #101
-
- 04 Feb, 2022 1 commit
-
-
Kristian Klausen authored
The sponsored mirrors have a ton of storage, but mirror.pkgbuild.com doesn't, so debug packages aren't synced to it. [1] {america,asia,europe}.mirror.pkgbuild.com
-
- 02 Oct, 2021 1 commit
-
-
Kristian Klausen authored
Fix #392
-
- 06 Jul, 2021 1 commit
-
-
Kristian Klausen authored
This is meant as a internal authenticated and encrypted network which we can use for internal services, we don't want to expose to the internet or when encryption is desired but not easily implementable.
-
- 12 Apr, 2021 1 commit
-
-
Jelle van der Waa authored
We no longer mirror arch32 on our servers and this role is currently broken.
-
- 08 Apr, 2021 1 commit
-
-
Fix #263
-
- 07 Apr, 2021 1 commit
-
-
unbound is only used if dns_servers is explicit set to 127.0.0.1, which isn't the case for any of these systems. Fix #234
-
- 02 Nov, 2020 1 commit
-
-
Jelle van der Waa authored
For all hosts we want to have a working fail2ban for sshd brute force attempts through a group_vars/all. For some hosts an override is required to enable postfix or dovecot jails.
-
- 06 Oct, 2020 1 commit
-
-
Jelle van der Waa authored
-
- 12 Sep, 2020 1 commit
-
-
Jelle van der Waa authored
We switched for monitoring to prometheus so zabbix-agent is unwanted and we don't want to accidently deploy it again.
-
- 27 Aug, 2020 1 commit
-
-
- 24 Mar, 2019 1 commit
-
-
Florian Pritz authored
Signed-off-by:
Florian Pritz <bluewind@xinu.at>
-
- 02 Jul, 2018 1 commit
-
-
Florian Pritz authored
Signed-off-by:
Florian Pritz <bluewind@xinu.at>
-
- 07 Dec, 2017 1 commit
-
-
Bartłomiej Piotrowski authored
-
- 15 Nov, 2017 1 commit
-
-
Bartłomiej Piotrowski authored
-
- 20 Oct, 2017 1 commit
-
-
Bartłomiej Piotrowski authored
-
- 11 Sep, 2017 1 commit
-
-
Florian Pritz authored
Signed-off-by:
Florian Pritz <bluewind@xinu.at>
-
- 06 Sep, 2017 1 commit
-
-
Florian Pritz authored
Signed-off-by:
Florian Pritz <bluewind@xinu.at>
-
- 05 Sep, 2017 1 commit
-
-
Bartłomiej Piotrowski authored
-