Commit 59200d51 authored by Kristian Klausen's avatar Kristian Klausen 🎉
Browse files

Move the "Servers" section from the readme to docs/servers.md

parent 41c57430
......@@ -147,139 +147,7 @@ The following steps should be used to update our managed servers:
## Servers
### gemini
#### Services
- repos/sync (repos.archlinux.org)
- sources (sources.archlinux.org)
- archive (archive.archlinux.org)
### luna
#### Services
- mailman
- projects (projects.archlinux.org)
### apollo
#### Services
- wiki (wiki.archlinux.org)
- archweb
- patchwork
### aur.archlinux.org
#### Services
- aurweb
### bugs.archlinux.org
#### Services
- flyspray
### bbs.archlinux.org
#### Services
- bbs
### phrik.archlinux.org
#### Services
- phrik (irc bot) users in the phrik group defined in
the hosts vars and re-used the archusers role. Users
in the phrik group are allowed to restar the irc bot.
### dragon
#### Services
- build server
- sogrep
### state.archlinux.org
#### Services
- postgres server for terraform state
### quassel.archlinux.org
#### Services
- quassel core
### matrix.archlinux.org
#### Services
- Matrix homeserver (Synapse)
- Matrix ↔ IRC bridge
### homedir.archlinux.org
#### Services
- ~/user/ webhost
### accounts.archlinux.org
This server is _special_. It runs keycloak and is central to our unified Arch Linux account management world.
It has an Ansible playbook for the keycloak service but that only installs the package and starts it but it's configured via a secondary Terraform file only for keycloak `keycloak.tf`.
The reason for doing it this way is that Terraform support for Keycloak is much superior and it's declarative too which is great for making sure that no old config remains in the case of config changes.
So to set up this server from scratch, run:
- `cd tf-stage1`
- `terraform apply`
- `cd ../tf-stage2`
- `terraform import keycloak_realm.master master`
- `terraform apply`
#### Services
- keycloak
### mirror.pkgbuild.com
#### Services
- Regular mirror.
### reproducible.archlinux.org
[Rebuilderd docs](./docs/rebuilderd.md)
#### Services
- Runs a master [rebuilderd](https://reproducible.archlinux.org) instance two workers:
- repro1.pkgbuild.com (packet.net Arch Linux box)
### runner2.archlinux.org
Medium-fast-ish packet.net Arch Linux box.
#### Services
- GitLab runner
### monitoring.archlinux.org
Prometheus and Grafana server which collects performance/metrics from our services and runs alertmanager.
#### Services
- Alertmanager
- [Grafana](https://monitoring.archlinux.org) and [docs/grafana.md](./docs/grafana.md)
- Prometheus
### openpgpkey.archlinux.org
Hosts our gnupg open web key directory for fetching Arch Linux keyring keys over https.
#### Services
- WKD
### Archive Mirrors
The [Arch Linux Archive](https://archive.archlinux.org) is mirrored to three dedicated servers to help aid global availability.
#### Servers
- https://america.archive.pkgbuild.com
- https://asia.archive.pkgbuild.com
- https://europe.archive.pkgbuild.com
This section has been moved to [docs/servers.md](docs/servers.md).
## Ansible repo workflows
......
# Servers
## Table of contents
[[_TOC_]]
## gemini
### Services
- repos/sync (repos.archlinux.org)
- sources (sources.archlinux.org)
- archive (archive.archlinux.org)
## luna
### Services
- mailman
- projects (projects.archlinux.org)
## apollo
### Services
- wiki (wiki.archlinux.org)
- archweb
- patchwork
## aur.archlinux.org
### Services
- aurweb
## bugs.archlinux.org
### Services
- flyspray
## bbs.archlinux.org
### Services
- bbs
## phrik.archlinux.org
### Services
- phrik (irc bot) users in the phrik group defined in
the hosts vars and re-used the archusers role. Users
in the phrik group are allowed to restar the irc bot.
## dragon
### Services
- build server
- sogrep
## state.archlinux.org
### Services
- postgres server for terraform state
## quassel.archlinux.org
### Services
- quassel core
## matrix.archlinux.org
### Services
- Matrix homeserver (Synapse)
- Matrix ↔ IRC bridge
## homedir.archlinux.org
### Services
- ~/user/ webhost
## accounts.archlinux.org
This server is _special_. It runs keycloak and is central to our unified Arch Linux account management world.
It has an Ansible playbook for the keycloak service but that only installs the package and starts it but it's configured via a secondary Terraform file only for keycloak `keycloak.tf`.
The reason for doing it this way is that Terraform support for Keycloak is much superior and it's declarative too which is great for making sure that no old config remains in the case of config changes.
So to set up this server from scratch, run:
- `cd tf-stage1`
- `terraform apply`
- `cd ../tf-stage2`
- `terraform import keycloak_realm.master master`
- `terraform apply`
### Services
- keycloak
## mirror.pkgbuild.com
### Services
- Regular mirror.
## reproducible.archlinux.org
[Rebuilderd docs](./docs/rebuilderd.md)
### Services
- Runs a master [rebuilderd](https://reproducible.archlinux.org) instance two workers:
- repro1.pkgbuild.com (packet.net Arch Linux box)
## runner2.archlinux.org
Medium-fast-ish packet.net Arch Linux box.
### Services
- GitLab runner
## monitoring.archlinux.org
Prometheus and Grafana server which collects performance/metrics from our services and runs alertmanager.
### Services
- Alertmanager
- [Grafana](https://monitoring.archlinux.org) and [docs/grafana.md](./docs/grafana.md)
- Prometheus
## openpgpkey.archlinux.org
Hosts our gnupg open web key directory for fetching Arch Linux keyring keys over https.
### Services
- WKD
## Archive Mirrors
The [Arch Linux Archive](https://archive.archlinux.org) is mirrored to three dedicated servers to help aid global availability.
### Servers
- https://america.archive.pkgbuild.com
- https://asia.archive.pkgbuild.com
- https://europe.archive.pkgbuild.com
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment