initial configs for ekman

This commit is contained in:
Jonas Juselius
2022-08-19 18:47:52 +02:00
parent cf956c739e
commit 606b87851e
36 changed files with 346 additions and 816 deletions

View File

@@ -1,6 +1,6 @@
{ pkgs, ...}: { pkgs, ...}:
let let
nodes = import ./nixops/stokes/nodes.nix; nodes = import ./nixops/ekman/nodes.nix;
in in
{ {
# deployment.tags = [ "frontend" ]; # deployment.tags = [ "frontend" ];
@@ -15,16 +15,16 @@ in
features = { features = {
host = { host = {
address = "10.1.62.2"; address = "10.255.241.100";
name = "c0-0"; name = "ekman";
}; };
os = { os = {
externalInterface = "eno1"; externalInterface = "enp33s0f0np0";
nfs.enable = true; nfs.enable = true;
nfs.exports = '' nfs.exports = ''
/exports 10.1.61.0/24(insecure,rw,sync,no_subtree_check,crossmnt,fsid=0,no_root_squash) /exports 10.255.241.0/24(insecure,rw,sync,no_subtree_check,crossmnt,fsid=0,no_root_squash)
/exports 10.1.63.0/24(insecure,rw,sync,no_subtree_check,crossmnt,fsid=0,no_root_squash) /exports 10.255.243.0/24(insecure,rw,sync,no_subtree_check,crossmnt,fsid=0,no_root_squash)
''; '';
}; };
@@ -42,16 +42,16 @@ in
monitoring = { monitoring = {
server = { server = {
enable = false; enable = false;
scrapeHosts = [ "frontend" "mds0-0" ] ++ (builtins.map (x: x.name) nodes); scrapeHosts = [ "frontend" "mds1-0" ] ++ (builtins.map (x: x.name) nodes);
defaultAlertReceiver = { defaultAlertReceiver = {
email_configs = [ email_configs = [
{ to = "jonas.juselius@tromso.serit.no"; } { to = "jonas.juselius@oceanbox.io"; }
]; ];
}; };
pageAlertReceiver = { pageAlertReceiver = {
webhook_configs = [ webhook_configs = [
{ {
url = "https://prometheus-msteams.k2.itpartner.no/stokes"; url = "https://prometheus-msteams.k2.itpartner.no/ekman";
http_config = { http_config = {
tls_config = { insecure_skip_verify = true; }; tls_config = { insecure_skip_verify = true; };
}; };
@@ -69,16 +69,8 @@ in
infiniband-exporter = { infiniband-exporter = {
enable = true; enable = true;
nameMap = '' nameMap = ''
0x0c42a10300ddc4bc "frontend"
0x1c34da0300787798 "mds0-0"
0x0c42a10300dbe7f4 "c0-1" 0x0c42a10300dbe7f4 "c0-1"
0x0c42a10300dbe7d8 "c0-2" 0x0c42a10300ddc4bc "c0-2"
0x0c42a10300dbe800 "c0-3"
0x0c42a10300dbec80 "c0-4"
0x0c42a10300dbea50 "c0-5"
0x0c42a10300dbeb2c "c0-6"
0x0c42a10300dbe7fc "c0-7"
0x0c42a10300dbe5a0 "c0-8"
''; '';
}; };
slurm-exporter = { slurm-exporter = {
@@ -88,47 +80,43 @@ in
}; };
}; };
# services.udev.extraRules = ''
# KERNEL=="ibp59s0", SUBSYSTEM=="net", ATTR{create_child}:="0x2222"
# '';
networking = { networking = {
hostName = "stokes";
useDHCP = false; useDHCP = false;
interfaces.eno1 = { hostName = "ekman";
interfaces.enp33s0f0np0 = {
useDHCP = false; useDHCP = false;
ipv4.addresses = [ { ipv4.addresses = [ {
address = "10.1.62.2"; address = "10.255.242.2";
prefixLength = 24; prefixLength = 24;
} ]; } ];
}; };
interfaces.enp175s0f0 = { interfaces.enp33s0f3np3 = {
useDHCP = false; useDHCP = false;
ipv4.addresses = [ { ipv4.addresses = [ {
address = "10.1.61.100"; address = "10.255.241.100";
prefixLength = 24; prefixLength = 24;
} ]; } ];
}; };
interfaces.ibp59s0 = { interfaces.ibp65s0 = {
useDHCP = false; useDHCP = false;
ipv4.addresses = [ { ipv4.addresses = [ {
address = "10.1.63.100"; address = "10.255.243.100";
prefixLength = 24; prefixLength = 24;
} ]; } ];
}; };
defaultGateway = "10.1.62.1"; defaultGateway = "10.255.242.1";
firewall.extraCommands = '' firewall.extraCommands = ''
iptables -I INPUT -s 10.1.63.0/24 -j ACCEPT iptables -I INPUT -s 10.255.243.0/24 -j ACCEPT
iptables -t nat -A POSTROUTING -s 10.1.63.0/24 -j MASQUERADE iptables -t nat -A POSTROUTING -s 10.255.243.0/24 -j MASQUERADE
''; '';
}; };
fileSystems ={ fileSystems = {
"/exports/home" = { "/exports/home" = {
device = "/home"; device = "/home";
options = [ "bind" ]; options = [ "bind" ];
}; };
"/stokes" = { "/frontend" = {
device = "/home"; device = "/home";
options = [ "bind" ]; options = [ "bind" ];
}; };
@@ -142,9 +130,9 @@ in
}; };
}; };
nix.extraOptions = '' # nix.extraOptions = ''
secret-key-files = /etc/nix/stokes.private # secret-key-files = /etc/nix/ekman.key
''; # '';
services.xserver = { services.xserver = {
enable = true; enable = true;
@@ -163,29 +151,29 @@ in
smtp_smarthost = "smtpgw.itpartner.no:465"; smtp_smarthost = "smtpgw.itpartner.no:465";
smtp_auth_username = "utvikling"; smtp_auth_username = "utvikling";
smtp_auth_password = "S0m3rp0m@de#21!"; smtp_auth_password = "S0m3rp0m@de#21!";
smtp_hello = "stokes.regnekraft.io"; smtp_hello = "ekman.oceanbox.io";
smtp_from = "noreply@stokes.regnekraft.io"; smtp_from = "noreply@ekman.oceanbox.io";
}; };
services.nginx = { # services.nginx = {
virtualHosts = { # virtualHosts = {
"ds.matnoc.regnekraft.io" = { # "ds.matnoc.regnekraft.io" = {
forceSSL = true; # forceSSL = true;
enableACME = true; # enableACME = true;
serverAliases = []; # serverAliases = [];
locations."/" = { # locations."/" = {
proxyPass = "http://localhost:9088"; # proxyPass = "http://localhost:9088";
proxyWebsockets = false; # proxyWebsockets = false;
extraConfig = '' # extraConfig = ''
allow 10.1.2.0/24; # allow 10.1.2.0/24;
allow 172.19.254.0/24; # allow 172.19.254.0/24;
allow 172.19.255.0/24; # allow 172.19.255.0/24;
deny all; # deny all;
''; # '';
}; # };
}; # };
}; # };
}; # };
# services.gitlab-runner = { # services.gitlab-runner = {
# enable = true; # enable = true;
@@ -197,7 +185,7 @@ in
# sif = { # sif = {
# registrationConfigFile = "/var/lib/secrets/gitlab-runner-registration"; # registrationConfigFile = "/var/lib/secrets/gitlab-runner-registration";
# executor = "shell"; # executor = "shell";
# tagList = [ "stokes" "sif" ]; # tagList = [ "ekman" "sif" ];
# }; # };
# }; # };
# }; # };
@@ -225,9 +213,10 @@ in
}; };
# ssh-rsa is deprecated, but putty/winscp users use it # ssh-rsa is deprecated, but putty/winscp users use it
services.openssh.extraConfig = '' # services.openssh.extraConfig = ''
pubkeyacceptedalgorithms ssh-rsa,ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,sk-ssh-ed25519-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256 # pubkeyacceptedalgorithms ssh-rsa,ssh-ed25519-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,sk-ssh-ed25519-cert-v01@openssh.com,sk-ecdsa-sha2-nistp256-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-ed25519,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ssh-ed25519@openssh.com,sk-ecdsa-sha2-nistp256@openssh.com,rsa-sha2-512,rsa-sha2-256
''; # '';
imports = [ ./nixops/stokes/cluster.nix ./hardware-configuration.nix ]; imports = [ ./nixops/ekman/cluster.nix ./hardware-configuration.nix ];
} }

View File

@@ -8,20 +8,32 @@
[ (modulesPath + "/installer/scan/not-detected.nix") [ (modulesPath + "/installer/scan/not-detected.nix")
]; ];
boot.initrd.availableKernelModules = [ "ahci" "xhci_pci" "megaraid_sas" "usbhid" "usb_storage" "sd_mod" "sr_mod" ]; boot.initrd.availableKernelModules = [ "megaraid_sas" "xhci_pci" "ahci" "usbhid" "usb_storage" "sd_mod" "sr_mod" ];
boot.initrd.kernelModules = [ ]; boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-intel" ]; boot.kernelModules = [ "kvm-amd" ];
boot.extraModulePackages = [ ]; boot.extraModulePackages = [ ];
fileSystems."/" = fileSystems."/" =
{ device = "/dev/disk/by-uuid/099be829-726d-44c9-b113-4c2604a663c5"; { device = "/dev/disk/by-uuid/c4a5ea80-2a87-440d-8431-a695d623da24";
fsType = "ext4"; fsType = "ext4";
}; };
fileSystems."/boot" = fileSystems."/boot" =
{ device = "/dev/disk/by-uuid/8111-9F24"; { device = "/dev/disk/by-uuid/D8A3-A04D";
fsType = "vfat"; fsType = "vfat";
}; };
swapDevices = [ ]; swapDevices = [ ];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's
# still possible to use this option, but it's recommended to use it in conjunction
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
networking.useDHCP = lib.mkDefault true;
# networking.interfaces.enp33s0f0np0.useDHCP = lib.mkDefault true;
# networking.interfaces.enp33s0f1np1.useDHCP = lib.mkDefault true;
# networking.interfaces.enp33s0f2np2.useDHCP = lib.mkDefault true;
# networking.interfaces.enp33s0f3np3.useDHCP = lib.mkDefault true;
hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
} }

View File

@@ -8,9 +8,9 @@ let
existing = true; existing = true;
nodes = nodes =
{ {
c0-0 = "10.1.61.100"; etcd0 = "10.255.241.100";
c0-1 = "10.1.61.101"; # etcd1 = "10.255.241.80";
c0-2 = "10.1.61.102"; # etcd2 = "10.255.241.81";
}; };
}; };
@@ -32,12 +32,16 @@ let
loader.efi.canTouchEfiVariables = true; loader.efi.canTouchEfiVariables = true;
# kernelPackages = pkgs.linuxPackages_5_4; # kernelPackages = pkgs.linuxPackages_5_4;
kernelModules = [ "ib_umad" "ib_ipoib" ]; kernelModules = [ "ib_umad" "ib_ipoib" ];
kernelParams = [ # kernelParams = [
"console=ttyS0,115200" # "console=ttyS0,115200"
"console=tty0" # "console=tty0"
]; # ];
}; };
services.udev.extraRules = ''
KERNEL=="ibp1s0", SUBSYSTEM=="net", ATTR{create_child}:="0x3666"
'';
console = { console = {
font = "Lat2-Terminus16"; font = "Lat2-Terminus16";
keyMap = "us"; keyMap = "us";
@@ -67,7 +71,7 @@ let
tls = false; tls = false;
tls_starttls = false; tls_starttls = false;
port = 24; port = 24;
from = "stokes@regnekraft.io"; from = "ekman@oceanbox.io";
host = "smtpgw.itpartner.no"; host = "smtpgw.itpartner.no";
# user = "utvikling"; # user = "utvikling";
# password = "S0m3rp0m@de#21!"; # password = "S0m3rp0m@de#21!";
@@ -108,25 +112,25 @@ let
slurm = { slurm = {
client = true; client = true;
mungeKey = ./munge.key; mungeKey = ./munge.key;
mungeUid = 997; # hack mungeUid = 995; # hack
controlMachine = "stokes"; controlMachine = "ekman";
nodeName = [ nodeName = [
"c0-[1-8] Sockets=1 CoresPerSocket=64 ThreadsPerCore=1 RealMemory=256000 TmpDisk=100000 State=UNKNOWN" "c0-[1-2] Sockets=2 CoresPerSocket=64 ThreadsPerCore=1 RealMemory=256000 TmpDisk=500000 State=UNKNOWN"
"stokes Sockets=2 CoresPerSocket=16 ThreadsPerCore=2 RealMemory=64000 TmpDisk=500000 State=UNKNOWN" "ekman Sockets=2 CoresPerSocket=64 ThreadsPerCore=1 RealMemory=256000 TmpDisk=500000 State=UNKNOWN"
]; ];
partitionName = [ partitionName = [
"batch Nodes=c0-[1-8] Default=YES MaxTime=INFINITE State=UP" "batch Nodes=c0-[1-2] Default=YES MaxTime=INFINITE State=UP"
"frontend Nodes=stokes MaxTime=1:00:00 State=UP" "frontend Nodes=ekman MaxTime=1:00:00 State=UP"
]; ];
}; };
beegfs = { beegfs = {
enable = true; enable = false;
beegfs = { beegfs = {
mds0-0 = { bee0-0 = {
mgmtdHost = "mds0-0"; mgmtdHost = "mds1-0";
connAuthFile = "/etc/beegfs/connauthfile"; connAuthFile = "/etc/beegfs/connauthfile";
client = { client = {
enable = true; enable = false;
mountPoint = "/work"; mountPoint = "/work";
}; };
}; };
@@ -137,19 +141,18 @@ let
k8s = { k8s = {
enable = true; enable = true;
node.enable = true; node.enable = true;
clusterName = "hpc0"; clusterName = "ekman";
inherit etcdCluster;
initca = ./ca; initca = ./ca;
cidr = "10.100.0.0/16"; cidr = "10.100.0.0/16";
master = { master = {
name = "stokes"; name = "ekman";
address = "10.1.61.100"; address = "10.255.241.100";
extraSANs = [ "hpc0-0.regnekraft.io" ]; extraSANs = [ "ekman.local" "ekman.oceanbox.io" ];
}; };
ingressNodes = [ ingressNodes = [
"hpc0-0.regnekraft.io" "ekman.oceanbox.io"
]; ];
fileserver = "mds0-0"; fileserver = "mds1-0";
charts = { charts = {
acme_email = "innovasjon@itpartner.no"; acme_email = "innovasjon@itpartner.no";
grafana_smtp_user = "utvikling"; grafana_smtp_user = "utvikling";
@@ -164,24 +167,24 @@ let
}; };
networking = { networking = {
domain = mkDefault "regnekraft.io"; domain = mkDefault "cluster.local";
defaultGateway = mkDefault "10.1.61.1"; defaultGateway = mkDefault "10.255.241.1";
nameservers = mkDefault [ "8.8.8.8" ]; nameservers = mkDefault [ "8.8.8.8" ];
search = mkDefault [ "local" ]; search = mkDefault [ "local" ];
extraHosts = import ./hosts.nix; extraHosts = import ./hosts.nix;
firewall.extraCommands = '' firewall.extraCommands = ''
iptables -I INPUT -s 10.1.61.0/24 -j ACCEPT iptables -I INPUT -s 10.255.241.0/24 -j ACCEPT
''; '';
}; };
fileSystems = { fileSystems = {
"/opt" = { "/opt" = {
device = "10.1.63.80:/opt"; device = "10.255.241.81:/opt";
fsType = "nfs"; fsType = "nfs";
options = [ "soft" "rdma" "defaults" "vers=4.2" ]; options = [ "soft" "rdma" "defaults" "vers=4.2" ];
}; };
"/data" = { "/data" = {
device = "10.1.63.80:/data"; device = "255.241.81:/data";
fsType = "nfs"; fsType = "nfs";
options = [ "soft" "rdma" "defaults" "vers=4.2" ]; options = [ "soft" "rdma" "defaults" "vers=4.2" ];
}; };
@@ -201,65 +204,33 @@ let
nix = { nix = {
maxJobs = 32; maxJobs = 32;
trustedUsers = [ "@wheel" ]; trustedUsers = [ "@wheel" ];
# binaryCachePublicKeys = [ binaryCachePublicKeys = [
# "stokes-1:BCgUFnXc6wgpstwG0M09/Ccrrz45MxHpS62JSC9sxW5hWxMqBNNvU1otqs4pWUOyvdxLPKIk6P5WCJWp+AFJig==" "ekman:pka41J3q4j9ZC3dr4y+sDN9uMW0pAxoWeCkrzUlqcZs="
# ]; ];
}; };
}; };
i40efix = {
# boot = let kernelExtras = pkgs.callPackage ./kernel.nix {
# kernel = pkgs.linuxPackages_5_4.kernel;
# }; in {
# extraModulePackages = [ kernelExtras.i40e2 ];
# kernelModules = [ "ib_umad" "ib_ipoib" "i40e2" ];
# };
};
shosts = { shosts = {
environment.etc."ssh/shosts.equiv" = { environment.etc."ssh/shosts.equiv" = {
mode = "0644"; mode = "0644";
uid = 0; uid = 0;
gid = 0; gid = 0;
text = '' text = ''
10.1.62.2 10.255.241.100
10.1.61.100 10.255.241.101
10.1.61.101 10.255.241.102
10.1.61.102
10.1.61.103
10.1.61.104
10.1.61.105
10.1.61.106
10.1.61.107
10.1.61.108
10.1.63.100
10.1.63.101
10.1.63.102
10.1.63.103
10.1.63.104
10.1.63.105
10.1.63.106
10.1.63.107
10.1.63.108
''; '';
}; };
programs.ssh.knownHosts = { programs.ssh.knownHosts = {
stokes = { ekman = {
hostNames = [ hostNames = [
"stokes" "stokes.hpc.local" "stokes.regnekraft.io" "10.1.61.100" "ekman" "ekman.cluster.local" "ekman.oceanbox.io" "10.255.241.8"
"10.1.63.100" "10.1.62.2"
]; ];
publicKeyFile = ./pubkeys/stokes.pub; publicKeyFile = ./pubkeys/ekman.pub;
}; };
c0-1 = { hostNames = [ "c0-1" "c0-1.hpc.local" "10.1.61.101" "10.1.63.101" ]; publicKeyFile = ./pubkeys/c0-1.pub; }; c0-1 = { hostNames = [ "c0-1" "c0-1.cluster.local" "10.255.241.101" "10.255.243.11" ]; publicKeyFile = ./pubkeys/c0-1.pub; };
c0-2 = { hostNames = [ "c0-2" "c0-2.hpc.local" "10.1.61.102" "10.1.63.102" ]; publicKeyFile = ./pubkeys/c0-2.pub; }; c0-2 = { hostNames = [ "c0-2" "c0-2.cluster.local" "10.255.241.102" "10.255.243.11" ]; publicKeyFile = ./pubkeys/c0-1.pub; };
c0-3 = { hostNames = [ "c0-3" "c0-3.hpc.local" "10.1.61.103" "10.1.63.103" ]; publicKeyFile = ./pubkeys/c0-3.pub; };
c0-4 = { hostNames = [ "c0-4" "c0-4.hpc.local" "10.1.61.104" "10.1.63.104" ]; publicKeyFile = ./pubkeys/c0-4.pub; };
c0-5 = { hostNames = [ "c0-5" "c0-5.hpc.local" "10.1.61.105" "10.1.63.105" ]; publicKeyFile = ./pubkeys/c0-5.pub; };
c0-6 = { hostNames = [ "c0-6" "c0-6.hpc.local" "10.1.61.106" "10.1.63.106" ]; publicKeyFile = ./pubkeys/c0-6.pub; };
c0-7 = { hostNames = [ "c0-7" "c0-7.hpc.local" "10.1.61.107" "10.1.63.107" ]; publicKeyFile = ./pubkeys/c0-7.pub; };
c0-8 = { hostNames = [ "c0-8" "c0-8.hpc.local" "10.1.61.108" "10.1.63.108" ]; publicKeyFile = ./pubkeys/c0-8.pub; };
}; };
environment.systemPackages = [ openssh-shosts ]; environment.systemPackages = [ openssh-shosts ];
@@ -315,20 +286,12 @@ let
in { in {
options.node = { options.node = {
# i40efix = mkEnableOption "Apply fix for i40e driver";
myvnc = mkEnableOption "Enable myvnc script"; myvnc = mkEnableOption "Enable myvnc script";
}; };
config = mkMerge [ config = mkMerge [
configuration configuration
# deployment
shosts shosts
# (mkIf config.node.i40efix i40efix)
(mkIf config.node.myvnc myvnc) (mkIf config.node.myvnc myvnc)
]; ];

View File

@@ -0,0 +1 @@
q丘

View File

@@ -12,8 +12,8 @@ let
# deployment.tags = [ "compute" ]; # deployment.tags = [ "compute" ];
fileSystems = { fileSystems = {
"/stokes" = { "/frontend" = {
device = "10.1.63.100:/home"; device = "10.255.241.100:/home";
fsType = "nfs4"; fsType = "nfs4";
options = [ options = [
"soft" "soft"
@@ -26,7 +26,7 @@ let
systemd.automounts = [ systemd.automounts = [
{ {
where = "/stokes"; where = "/frontend";
wantedBy = [ "default.target" ]; wantedBy = [ "default.target" ];
} }
]; ];
@@ -34,13 +34,13 @@ let
mkCompute = host: mkCompute = host:
let let
ipoib = builtins.replaceStrings [".61."] [".63."] host.address; ipoib = builtins.replaceStrings [".241."] [".243."] host.address;
hw = ./hw + "/${host.name}.nix"; hw = ./hw + "/${host.name}.nix";
in { in {
"${host.name}" = { "${host.name}" = {
features = { features = {
inherit host; inherit host;
os.externalInterface = "eno33"; os.externalInterface = "enp33s0f0np0";
hpc.compute = true; hpc.compute = true;
# k8s = { inherit etcdCluster; }; # k8s = { inherit etcdCluster; };
}; };
@@ -52,25 +52,24 @@ let
# ''; # '';
node = { node = {
# i40efix = true;
}; };
networking = { networking = {
useDHCP = false; useDHCP = false;
interfaces.eno33 = { interfaces.enp33s0f0np0 = {
useDHCP = false; useDHCP = false;
ipv4.addresses = [ { ipv4.addresses = [ {
address = host.address; address = host.address;
prefixLength = 24; prefixLength = 24;
} ]; } ];
ipv4.routes = [ { ipv4.routes = [ {
address = "10.1.62.2"; address = "10.255.242.2";
prefixLength = 32; prefixLength = 32;
via = "10.1.61.100"; via = "10.1.241.100";
} ]; } ];
}; };
interfaces.ibp65s0 = { interfaces.ibp1s0 = {
useDHCP = false; useDHCP = false;
ipv4.addresses = [ { ipv4.addresses = [ {
address = ipoib; address = ipoib;
@@ -87,12 +86,12 @@ in builtins.foldl' (a: n: a // mkCompute n) {} nodes
## morph ## morph
# network = { # network = {
# inherit pkgs; # inherit pkgs;
# description = "stokes"; # description = "ekman";
# ordering = { # ordering = {
# tags = [ "frontend" "compute" ]; # tags = [ "frontend" "compute" ];
# }; # };
# }; # };
# inherit stokes; # inherit ekman;
#} // builtins.foldl' (a: n: a // mkCompute n) {} nodes # } // builtins.foldl' (a: n: a // mkCompute n) {} nodes

11
nixops/ekman/hosts.nix Normal file
View File

@@ -0,0 +1,11 @@
''
10.255.240.200 ekman ekman.cluster.local
10.255.240.200 etcd0 etcd0.cluster.local
10.255.240.201 c0-1 c0-1.cluster.local
# 10.1.61.80 bee0-0 bee0-0.cluster.local
# 10.1.63.101 ib0-1 ib0-1.cluster.local
# 10.1.63.80 ibmds0-0 ibmds0-0.cluster.local
''

39
nixops/ekman/hw/c0-1.nix Normal file
View File

@@ -0,0 +1,39 @@
# Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{ config, lib, pkgs, modulesPath, ... }:
{
imports =
[ (modulesPath + "/installer/scan/not-detected.nix")
];
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "nvme" "usbhid" "usb_storage" "sd_mod" ];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-amd" ];
boot.extraModulePackages = [ ];
fileSystems."/" =
{ device = "/dev/disk/by-uuid/102a2e89-1ffb-4f8b-810e-b742b6f9da98";
fsType = "ext4";
};
fileSystems."/boot" =
{ device = "/dev/disk/by-uuid/54C4-7983";
fsType = "vfat";
};
swapDevices =
[ { device = "/dev/disk/by-uuid/29ba5bab-0777-4ac1-96af-3952e28d570c"; }
];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's
# still possible to use this option, but it's recommended to use it in conjunction
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
networking.useDHCP = lib.mkDefault true;
# networking.interfaces.enp33s0f0np0.useDHCP = lib.mkDefault true;
# networking.interfaces.enp33s0f1np1.useDHCP = lib.mkDefault true;
hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
}

39
nixops/ekman/hw/c0-2.nix Normal file
View File

@@ -0,0 +1,39 @@
# Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{ config, lib, pkgs, modulesPath, ... }:
{
imports =
[ (modulesPath + "/installer/scan/not-detected.nix")
];
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "nvme" ];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-amd" ];
boot.extraModulePackages = [ ];
fileSystems."/" =
{ device = "/dev/disk/by-uuid/e19cbe18-e194-47f6-8eb5-c60b5be1bb7a";
fsType = "ext4";
};
fileSystems."/boot" =
{ device = "/dev/disk/by-uuid/6A07-053A";
fsType = "vfat";
};
swapDevices =
[ { device = "/dev/disk/by-uuid/2100e403-0dff-4314-b85a-cad99820aacf"; }
];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's
# still possible to use this option, but it's recommended to use it in conjunction
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
networking.useDHCP = lib.mkDefault true;
# networking.interfaces.enp33s0f0np0.useDHCP = lib.mkDefault true;
# networking.interfaces.enp33s0f1np1.useDHCP = lib.mkDefault true;
hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
}

View File

@@ -40,7 +40,7 @@ in
{ {
i40e2 = i40e; i40e2 = i40e;
overlay = self: super: { overlay = self: super: {
# linuxPackages_5_4 = super.linuxPackages_5_4 // { inherit i40e; }; linuxPackages_5_4 = super.linuxPackages_5_4 // { inherit i40e; };
}; };
} }

View File

@@ -1,3 +1,3 @@
with builtins; with builtins;
let nodes = genList (n: n + 1) 8; in let nodes = genList (n: n + 1) 2; in
map (n: ({ name = "c0-${toString n}"; address = "10.1.61.10${toString n}"; })) nodes map (n: ({ name = "c0-${toString n}"; address = "10.1.61.10${toString n}"; })) nodes

View File

@@ -0,0 +1 @@
ssh-rsa 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 root@OBNODE01

View File

@@ -0,0 +1 @@
ssh-rsa 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 root@OBNODE02

128
nixops/ekman/users.nix Normal file
View File

@@ -0,0 +1,128 @@
{ pkgs, ... }:
{
users.groups = {
jonas = { gid = 1000; };
olean = { gid = 1001; };
frankgaa = { gid = 1002; };
bast = { gid = 1003; };
stig = { gid = 1004; };
sif = {
gid = 11000;
members = [
"jonas"
"olean"
"bast"
"frankgaa"
"stig"
];
};
};
users.users = {
jonas = {
description = "Jonas Juselius";
home = "/home/jonas";
group = "jonas";
extraGroups = [
"users"
"wheel"
"root"
"adm"
"admin"
"cdrom"
"fuse"
"wireshark"
"libvirtd"
"networkmanager"
"tty"
"keys"
];
uid = 1000;
isNormalUser = true;
createHome = true;
useDefaultShell = false;
shell = pkgs.fish;
openssh.authorizedKeys.keys = [
"ssh-rsa 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 jonas.juselius@juselius.io"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKiAS30ZO+wgfAqDE9Y7VhRunn2QszPHA5voUwo+fGOf jonas-3"
];
};
olean = {
description = "Ole Anders Nøst";
home = "/home/olean";
group = "olean";
extraGroups = [
"users"
];
uid = 1001;
isNormalUser = true;
createHome = true;
useDefaultShell = false;
shell = pkgs.fish;
openssh.authorizedKeys.keys = [
"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEAlfc2r3mNkvmdta+H/5zfdFe6317zmCdhhPYbipaGVFPUZO2cCTgSso28oDvOpCDldo/wl3jUxYNDlwH8LYMqKT3aGaOZr8JbxYzd+L+5GM2KTD+4YRmPtpYS/LWcc3j+fiFXSgX6Mrrgf6ineCRuBxSooDVE+pBakM1U7d5NE25apaAvclzFTmZBg0Sf9e5sgHkR99r9DUeGEQWGNZVUGwti39dFVp+aC9dsA+1/OtNB/HMF5G1MMk9dqvN7n7i9o9Plef2DParn4QU1GhmUKeEiBe4OAmSP+WwD4YvK6iXSKZG6tuTEspw+mR3rK5gBHrEiaNlCtp7O9BnAw4Wjhw== rsa-key-20201218"
"ssh-rsa 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 olean@navier"
];
};
frankgaa = {
description = "Frank Gaardsted";
home = "/home/frankgaa";
group = "frankgaa";
extraGroups = [
"users"
];
uid = 1002;
isNormalUser = true;
createHome = true;
useDefaultShell = false;
shell = pkgs.fish;
openssh.authorizedKeys.keys = [
"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDTq/IAtLkvHaPKTsp5U9YnhBj7PLFflS9vWpm5e/bFXQkSShkqUOktff1GITIN+RTpUS8zF9UkJA8fj5K382DhIn4jVb9HvQzmHNBTxU5ClpOuKhfibrts5IKMLAiN1enwZYu0iUIVfDKTYmqgAnjN8B6OyzIAB8bsBUMdN29PEwJT4cCVRRySLRfoWiXiZKow71FzXIACgxMwGhj2fpslKQoat2LGny03XR7EZrv36u1OktT28Gxf4ZrGpT9+3SAyf7aW20xHALU/dHXVsfsuqnoqw1InZ5VhvIVtoIj+5Vc5dkTXkychL0Hb+WxiH5O/3T18YUqes08UPZX5G9kB fga@akvaplan.niva.no"
"ssh-rsa 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 frankgaa@frankenstein"
];
};
bast = {
description = "Radovan Bast";
home = "/home/bast";
group = "bast";
extraGroups = [
"users"
"wheel"
"root"
];
uid = 1003;
isNormalUser = true;
createHome = true;
useDefaultShell = false;
shell = pkgs.fish;
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFbrEhm1acesXmbgfO5lN1gcTFXqusq61QyCZXunYJpl"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIdcJteh9d/N1o8BbdEMRVxeMjm28saon/Oh2tV0+TYj"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEg6tHlB5xco85d4XJja71hz1nEe9wFF1+ht8oKULkwh"
];
};
stig = {
description = "Stig Rune Jensen";
home = "/home/stig";
group = "stig";
extraGroups = [
"users"
"wheel"
"root"
];
uid = 1004;
isNormalUser = true;
createHome = true;
useDefaultShell = false;
shell = pkgs.fish;
openssh.authorizedKeys.keys = [
];
};
};
}

View File

@@ -1,26 +0,0 @@
''
10.1.30.10 fs0-0 fs0-0.itpartner.intern
10.1.30.10 fs1-0 fs1-0.itpartner.intern
10.1.8.10 fs2-0 fs2-0.itpartner.intern
10.1.30.80 psql1-0 psql1-0.itpartner.intern
10.1.8.50 k0-0 k0-0.itpartner.intern
10.1.8.51 k0-1 k0-1.itpartner.intern
10.1.8.52 k0-2 k0-2.itpartner.intern
10.1.8.60 k2-0 k2-0.itpartner.intern
10.1.8.61 k2-1 k2-1.itpartner.intern
10.1.8.62 k2-2 k2-2.itpartner.intern
10.1.8.63 k2-3 k2-3.itpartner.intern
10.1.8.64 k2-4 k2-4.itpartner.intern
10.1.8.65 k2-5 k2-5.itpartner.intern
10.1.8.66 k2-6 k2-6.itpartner.intern
10.1.30.100 k1-0 k1-0.itpartner.intern
10.1.30.101 k1-1 k1-1.itpartner.intern
10.1.30.102 k1-2 k1-2.itpartner.intern
10.1.30.103 k1-3 k1-3.itpartner.intern
10.1.30.104 k1-4 k1-4.itpartner.intern
10.1.30.105 k1-5 k1-5.itpartner.intern
''

View File

@@ -1 +0,0 @@
Elåºt8IòÞV7öF5(µãMtßÍsƒÍD££œÙ<>íXÛ%Nöñ:@(9s6]Œ£*¼¯ôËq;…SËYbˤ„k—hdŽ1mÂk<uN/X+]¨Ïÿš6;¹žÙ9/3f

View File

@@ -1,26 +0,0 @@
''
10.1.62.2 stokes stokes.regnekraft.io
10.1.61.100 frontend frontend.hpc.local c0-0.regnekraft.io
10.1.61.101 c0-1 c0-1.hpc.local c0-1.regnekraft.io
10.1.61.102 c0-2 c0-2.hpc.local c0-2.regnekraft.io
10.1.61.103 c0-3 c0-3.hpc.local c0-3.regnekraft.io
10.1.61.104 c0-4 c0-4.hpc.local c0-4.regnekraft.io
10.1.61.105 c0-5 c0-5.hpc.local c0-5.regnekraft.io
10.1.61.106 c0-6 c0-6.hpc.local c0-6.regnekraft.io
10.1.61.107 c0-7 c0-7.hpc.local c0-7.regnekraft.io
10.1.61.108 c0-8 c0-8.hpc.local c0-8.regnekraft.io
10.1.61.80 mds0-0 mds0-0.hpc.local
10.1.63.101 ib0-1 ib0-1.hpc.local
10.1.63.102 ib0-2 ib0-2.hpc.local
10.1.63.103 ib0-3 ib0-3.hpc.local
10.1.63.104 ib0-4 ib0-4.hpc.local
10.1.63.105 ib0-5 ib0-5.hpc.local
10.1.63.106 ib0-6 ib0-6.hpc.local
10.1.63.107 ib0-7 ib0-7.hpc.local
10.1.63.108 ib0-8 ib0-8.hpc.local
10.1.63.80 ibmds0-0 ibmds0-0.hpc.local
''

View File

@@ -1,28 +0,0 @@
# Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{ config, lib, pkgs, modulesPath, ... }:
{
imports =
[ (modulesPath + "/installer/scan/not-detected.nix")
];
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "usbhid" "usb_storage" "sd_mod" "sr_mod" ];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-amd" ];
boot.extraModulePackages = [ ];
fileSystems."/" =
{ device = "/dev/disk/by-uuid/3af91585-8079-420d-acdf-f60b94d3cfff";
fsType = "ext4";
};
fileSystems."/boot" =
{ device = "/dev/disk/by-uuid/3590-199A";
fsType = "vfat";
};
swapDevices = [ ];
}

View File

@@ -1,28 +0,0 @@
# Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{ config, lib, pkgs, modulesPath, ... }:
{
imports =
[ (modulesPath + "/installer/scan/not-detected.nix")
];
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "usbhid" "usb_storage" "sd_mod" "sr_mod" ];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-amd" ];
boot.extraModulePackages = [ ];
fileSystems."/" =
{ device = "/dev/disk/by-uuid/d89e1496-fda1-4de0-b2cc-474967b04402";
fsType = "ext4";
};
fileSystems."/boot" =
{ device = "/dev/disk/by-uuid/A51A-1F4D";
fsType = "vfat";
};
swapDevices = [ ];
}

View File

@@ -1,28 +0,0 @@
# Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{ config, lib, pkgs, modulesPath, ... }:
{
imports =
[ (modulesPath + "/installer/scan/not-detected.nix")
];
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "usbhid" "usb_storage" "sd_mod" "sr_mod" ];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-amd" ];
boot.extraModulePackages = [ ];
fileSystems."/" =
{ device = "/dev/disk/by-uuid/84cc9cea-08eb-4b54-8ca3-2aa5c1300a92";
fsType = "ext4";
};
fileSystems."/boot" =
{ device = "/dev/disk/by-uuid/882D-A342";
fsType = "vfat";
};
swapDevices = [ ];
}

View File

@@ -1,28 +0,0 @@
# Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{ config, lib, pkgs, modulesPath, ... }:
{
imports =
[ (modulesPath + "/installer/scan/not-detected.nix")
];
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "usbhid" "usb_storage" "sd_mod" "sr_mod" ];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-amd" ];
boot.extraModulePackages = [ ];
fileSystems."/" =
{ device = "/dev/disk/by-uuid/f0826ad5-8a4e-427d-98d3-5afa44440993";
fsType = "ext4";
};
fileSystems."/boot" =
{ device = "/dev/disk/by-uuid/21A6-D34C";
fsType = "vfat";
};
swapDevices = [ ];
}

View File

@@ -1,28 +0,0 @@
# Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{ config, lib, pkgs, modulesPath, ... }:
{
imports =
[ (modulesPath + "/installer/scan/not-detected.nix")
];
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "usbhid" "usb_storage" "sd_mod" "sr_mod" ];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-amd" ];
boot.extraModulePackages = [ ];
fileSystems."/" =
{ device = "/dev/disk/by-uuid/37944fce-07ca-492f-906a-620a37e7e1b3";
fsType = "ext4";
};
fileSystems."/boot" =
{ device = "/dev/disk/by-uuid/2F51-EC20";
fsType = "vfat";
};
swapDevices = [ ];
}

View File

@@ -1,28 +0,0 @@
# Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{ config, lib, pkgs, modulesPath, ... }:
{
imports =
[ (modulesPath + "/installer/scan/not-detected.nix")
];
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "usbhid" "usb_storage" "sd_mod" "sr_mod" ];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-amd" ];
boot.extraModulePackages = [ ];
fileSystems."/" =
{ device = "/dev/disk/by-uuid/d23386a8-0ca8-4871-b662-decf2b24f4d7";
fsType = "ext4";
};
fileSystems."/boot" =
{ device = "/dev/disk/by-uuid/AF8A-DEFE";
fsType = "vfat";
};
swapDevices = [ ];
}

View File

@@ -1,28 +0,0 @@
# Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{ config, lib, pkgs, modulesPath, ... }:
{
imports =
[ (modulesPath + "/installer/scan/not-detected.nix")
];
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "usbhid" "usb_storage" "sd_mod" "sr_mod" ];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-amd" ];
boot.extraModulePackages = [ ];
fileSystems."/" =
{ device = "/dev/disk/by-uuid/12477966-c6c5-47c6-afdc-35fa7e57e837";
fsType = "ext4";
};
fileSystems."/boot" =
{ device = "/dev/disk/by-uuid/DB96-7453";
fsType = "vfat";
};
swapDevices = [ ];
}

View File

@@ -1,28 +0,0 @@
# Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{ config, lib, pkgs, modulesPath, ... }:
{
imports =
[ (modulesPath + "/installer/scan/not-detected.nix")
];
boot.initrd.availableKernelModules = [ "xhci_pci" "ahci" "usbhid" "usb_storage" "sd_mod" "sr_mod" ];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-amd" ];
boot.extraModulePackages = [ ];
fileSystems."/" =
{ device = "/dev/disk/by-uuid/2f468316-5832-4684-866d-2e92b08fb68b";
fsType = "ext4";
};
fileSystems."/boot" =
{ device = "/dev/disk/by-uuid/76FE-F657";
fsType = "vfat";
};
swapDevices = [ ];
}

View File

@@ -1 +0,0 @@
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEwwu4RJJhKo8s2Mtmpdvxs02d4IwrmS9cTpfAOQ2YkI root@nixos

View File

@@ -1 +0,0 @@
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBEV8wEkeGUOs6umhdeOKYnVlYlta2rOCZSoezvu+bZ4 root@nixos

View File

@@ -1 +0,0 @@
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINQFQqo2vcj2eYaH7nwdEzgCPme+7g3Db+s16KbQHzLI root@nixos

View File

@@ -1 +0,0 @@
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDIsqJqWWftoiyiOOHnIuHYqbsaOg4AbKNm80wpjH2E8 root@nixos

View File

@@ -1 +0,0 @@
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDme/xztp22wQOybtN2TVXMcn2QcVaXtRMp4AnPnzr2T root@nixos

View File

@@ -1 +0,0 @@
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIImItUKMSygMY/1ZNsyGkyfywyngEDgZ7TxM63UwG1VH root@nixos

View File

@@ -1 +0,0 @@
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID1WxWnNg+L2+lQ3W2mD0/6kqwuCUOEJImvWnQYLzdUB root@nixos

View File

@@ -1 +0,0 @@
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBq+v2bBhQieqfXmtmGYb/9mOv9oc88zerRkkpGpoc0x root@nixos

View File

@@ -1 +0,0 @@
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOkSSuHkieXwgFMKRy4MjwjNrJEItWbQHeAAH+Zn1YZp root@localhost

View File

@@ -1,367 +0,0 @@
{ pkgs, ... }:
{
users.groups = {
jonas = { gid = 1000; };
olean = { gid = 1001; };
frankgaa = { gid = 1002; };
hdj002 = { gid = 1003; };
hes = { gid = 1004; };
mad = { gid = 1005; };
peyghamg = { gid = 1006; };
qin = { gid = 1007; };
eli = { gid = 1008; };
ovanov = { gid = 1009; };
bast = { gid = 1010; };
marius = { gid = 1011; };
michael = { gid = 1012; };
yugaos = { gid = 1013; };
ata = { gid = 1014; };
kvile ={ gid = 1015; };
achim ={ gid = 1016; };
mib ={ gid = 1017; };
# @grp@
sif = {
gid = 11000;
members = [
"jonas"
"olean"
"bast"
"frankgaa"
"hes"
"hdj002"
"mad"
"marius"
"eli"
"ovanov"
"peyghamg"
"qin"
"yugaos"
"ata"
"achim"
"mib"
];
};
matnoc = {
gid = 11001;
members = [
"jonas"
"olean"
"bast"
"frankgaa"
"hes"
"eli"
];
};
};
users.users = {
jonas = {
description = "Jonas Juselius";
home = "/home/jonas";
group = "jonas";
extraGroups = [
"users"
"wheel"
"root"
"adm"
"admin"
"cdrom"
"fuse"
"wireshark"
"libvirtd"
"networkmanager"
"tty"
"keys"
];
uid = 1000;
isNormalUser = true;
createHome = false;
useDefaultShell = false;
shell = pkgs.fish;
openssh.authorizedKeys.keys = [
"ssh-rsa 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 jonas.juselius@juselius.io"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKiAS30ZO+wgfAqDE9Y7VhRunn2QszPHA5voUwo+fGOf jonas-3"
];
};
olean = {
description = "Ole Anders Nøst";
home = "/home/olean";
group = "olean";
extraGroups = [
"users"
];
uid = 1001;
isNormalUser = true;
createHome = false;
openssh.authorizedKeys.keys = [
"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEAlfc2r3mNkvmdta+H/5zfdFe6317zmCdhhPYbipaGVFPUZO2cCTgSso28oDvOpCDldo/wl3jUxYNDlwH8LYMqKT3aGaOZr8JbxYzd+L+5GM2KTD+4YRmPtpYS/LWcc3j+fiFXSgX6Mrrgf6ineCRuBxSooDVE+pBakM1U7d5NE25apaAvclzFTmZBg0Sf9e5sgHkR99r9DUeGEQWGNZVUGwti39dFVp+aC9dsA+1/OtNB/HMF5G1MMk9dqvN7n7i9o9Plef2DParn4QU1GhmUKeEiBe4OAmSP+WwD4YvK6iXSKZG6tuTEspw+mR3rK5gBHrEiaNlCtp7O9BnAw4Wjhw== rsa-key-20201218"
"ssh-rsa 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 olean@navier"
];
};
frankgaa = {
description = "Frank Gaardsted";
home = "/home/frankgaa";
group = "frankgaa";
extraGroups = [
"users"
];
uid = 1002;
isNormalUser = true;
createHome = false;
openssh.authorizedKeys.keys = [
"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDTq/IAtLkvHaPKTsp5U9YnhBj7PLFflS9vWpm5e/bFXQkSShkqUOktff1GITIN+RTpUS8zF9UkJA8fj5K382DhIn4jVb9HvQzmHNBTxU5ClpOuKhfibrts5IKMLAiN1enwZYu0iUIVfDKTYmqgAnjN8B6OyzIAB8bsBUMdN29PEwJT4cCVRRySLRfoWiXiZKow71FzXIACgxMwGhj2fpslKQoat2LGny03XR7EZrv36u1OktT28Gxf4ZrGpT9+3SAyf7aW20xHALU/dHXVsfsuqnoqw1InZ5VhvIVtoIj+5Vc5dkTXkychL0Hb+WxiH5O/3T18YUqes08UPZX5G9kB fga@akvaplan.niva.no"
"ssh-rsa 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 frankgaa@frankenstein"
];
};
hdj002 = {
description = "Hans Kristian Djuve";
home = "/home/hdj002";
group = "hdj002";
extraGroups = [
"users"
];
uid = 1003;
isNormalUser = true;
createHome = false;
openssh.authorizedKeys.keys = [
"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEAvXTQTRfcpVkaJ+HO6wpgMKO9bdoTvQunbexn1N4jOuJOB5uAKZrZsimucw4DpvzaLZAftLI6RQlmiklxWItZA2UCfhlIZus8wy0cSTic2PkxLUXzBa1wl7nr8anYSK/HReQfTkgSi6LGTsGhejBxe//XC24ygW9eFYZTwOkpD8klNBNFHUA6sXgnzcjT/j3rwUjYI4GVJ82kP3GA0GBDSMwZ45/8ZYBk/Dbja0RJlvTHLSIgAmKzOuor1ORXk4zGdVpsTgNRv7QxeXZT09KJFp9hexMB/fT/OwZopKrHdGrOIIi2vhO6AGh4U+qjnjWY8yn5qHSOAIDDiJQ/iLeCCw== rsa-key-20201217"
];
};
hes = {
description = "Håvard Espenes";
home = "/home/hes";
group = "hes";
extraGroups = [
"users"
];
uid = 1004;
isNormalUser = true;
createHome = false;
openssh.authorizedKeys.keys = [
"ssh-rsa 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 havard@vortex"
"ssh-rsa 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 haavaes@nzinga"
];
};
mad = {
description = "Magnus Drivdal";
home = "/home/mad";
group = "mad";
extraGroups = [
"users"
];
uid = 1005;
isNormalUser = true;
createHome = false;
openssh.authorizedKeys.keys = [
"ssh-rsa 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 pckey"
"ssh-rsa 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 mad@AKVA9409"
];
};
peyghamg = {
description = "Peygham Ghaffari Nooran";
home = "/home/peyghamg";
group = "peyghamg";
extraGroups = [
"users"
];
uid = 1006;
isNormalUser = true;
createHome = false;
openssh.authorizedKeys.keys = [];
};
qin = {
description = "Qin Zhou";
home = "/home/qin";
group = "qin";
extraGroups = [
"users"
];
uid = 1007;
isNormalUser = true;
createHome = false;
openssh.authorizedKeys.keys = [
"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEAhrMpKwIKQoANoB0I7X9IXGVpfPVvjFjeuT7RGKO+XghSm88B0RTeBeiEcwp1fADUTdzbd00YhrWLIBSl3z/fyhG/k/EyOadNYn0BFenJ9IBxBFo/Nyhbfg1jKAO/OLN7S6WFWPvJzE/G6UP/wN1QBeJmM1iEIuorwwTifMGD0nM1DaQA9R9Ji56yn6Kzl2wym0z0WKyqrn+vTBh3YXJljEFboeuWlBL/a7R7W6XxJHPo0wZzKxE7mdEQqqGXioTUTPgyBLK1duS0YjWuMS/pfkMIji0kD50QtlA72h2p++43ZS1NpFK9d8q7C2ZxE/RlxAFGwUcKGhEIUdk3JRhfcQ== rsa-key-20210429"
];
};
eli = {
description = "Eli Børve";
home = "/home/eli";
group = "eli";
extraGroups = [
"users"
];
uid = 1008;
isNormalUser = true;
createHome = false;
openssh.authorizedKeys.keys = [
"ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEA8cclW3+wlmFl4fNEIqudlrtKVsZCXdzLgXNaGnqZPbqUCVXqw6rigFXSPYnRnE47yi8heC+06ga+4l8LkAuFCPhoZN6xxq6M7qmlNRHtpNn6PrXuDaTkgNig9TD2BCbHGwkqIByPhea4qQbM0mLKRk+a4H0ZGHsJnZI+nm185sSo6jQJ1gCHLk6ZZOoRDGYjoZIs3En3fTSTJBfbluf5A/gVXf2pbvIQ+R5QEOszRcln6nFfTd2Lwu2t63jA1pHN3KQoKcJ9RtBrRC0ZgZrOlEU1bpGLwuHwpj5xoxlsoI49QMgqJL4PE06mNGLYuxl6N/Sj6l90fuPFrEQpf45S0w== rsa-key-20201217"
"ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAvn2P+ID0J4SEIZF22Ewx4YqrUxgM78eUPZPtEngvQhi+s+lROpmkPPG7JQ2AO4tsATIOWHhXXerIciWuP5W8LikUmr4xXdQD7S1lbmH1sKvgyquPqyfjucQlP/efcoYXGQMp7tFs/1Z1RXPmq4oG3IZIy/wZOgiT8/wP/nCVOAahtAE1VxRldber286ruoF4e3GFjSxYafjyifaYwSvHySiKKqjVCaHw1oVv6bJn2H1sjuU19LSvDTZk+zMlWuxe1HW2dLtrGQGptd1JSURzmuc+stmrDBeiSGQ5QZza4+6TZKnSMNZ0RrjvTLlT+qW6OYMSPkiSDlEjkB47kIGQKQ== eli@AKVA9163"
"ssh-rsa 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 akvaplan\elb@AKVA9319"
];
};
ovanov = {
description = "Øyvind Leikvin";
home = "/home/ovanov";
group = "ovanov";
extraGroups = [
"users"
];
uid = 1009;
isNormalUser = true;
createHome = false;
openssh.authorizedKeys.keys = [];
};
bast = {
description = "Radovan Bast";
home = "/home/bast";
group = "bast";
extraGroups = [
"users"
"wheel"
"root"
];
uid = 1010;
isNormalUser = true;
createHome = false;
useDefaultShell = false;
shell = pkgs.fish;
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFbrEhm1acesXmbgfO5lN1gcTFXqusq61QyCZXunYJpl"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIdcJteh9d/N1o8BbdEMRVxeMjm28saon/Oh2tV0+TYj"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEg6tHlB5xco85d4XJja71hz1nEe9wFF1+ht8oKULkwh"
];
};
marius = {
description = "Marius Indreberg";
home = "/home/marius";
group = "marius";
extraGroups = [
"users"
];
uid = 1011;
isNormalUser = true;
createHome = false;
useDefaultShell = false;
shell = pkgs.fish;
openssh.authorizedKeys.keys = [
"ssh-rsa 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 marius.indreberg@itpartner.no"
];
};
michael = {
description = "Ka Hin (Michael) Lau";
home = "/home/michael";
group = "michael";
extraGroups = [
"users"
];
uid = 1012;
isNormalUser = true;
createHome = false;
useDefaultShell = false;
shell = pkgs.fish;
openssh.authorizedKeys.keys = [
"ssh-rsa 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"
];
};
yugaos = {
description = "Yuago Shen";
home = "/home/yugaos";
group = "yugaos";
extraGroups = [
"users"
];
uid = 1013;
isNormalUser = true;
createHome = false;
useDefaultShell = true;
# shell = pkgs.fish;
openssh.authorizedKeys.keys = [
"ssh-rsa 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 yugaos@AKVA9452"
];
};
ata = {
description = "Anne Tårånd Aasen";
home = "/home/ata";
group = "ata";
extraGroups = [
"users"
];
uid = 1014;
isNormalUser = true;
createHome = false;
useDefaultShell = true;
# shell = pkgs.fish;
openssh.authorizedKeys.keys = [
"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDJDndk2/iDsj0dikNe4SugQDTeBWv90MHRRR8zNNXAKqECsIcAq4FuYsuckvvCtXaaeh6+UUuX2VnjQmbkq7pfiYsjS/wVsUHIxUo8kXX6+1OigDM+gXXcv9bbNRE/mBOmTg51vqTiceAOvzlqsvyt+jgAsja7C64UC74cy+cw1ecdYaYOKH7X5PSVdMowySHFjez2Iyn+akXTo+HHXTJGJFv1E4yPtEkEYUbNPntH8Aa3LehdF+Xo9sQBCM9Y+MRYx4fqG/6YkzycvXhdvfDeI04RkmqQZoqcO5kQ1FC3yYzz16uly0zyEWcNDaUztAgiF/DmEUM3VjxuX5Rajc5/ rsa-key-20210903"
];
};
kvile = {
description = "Kristina Øie Kvile";
home = "/home/kvile";
group = "kvile";
extraGroups = [
"users"
];
uid = 1015;
isNormalUser = true;
createHome = false;
useDefaultShell = true;
# shell = pkgs.fish;
openssh.authorizedKeys.keys = [
"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCtB+HWtE4iXJiRVi1MUKaE3R3FAcHzCgiF84ho6GXKxx5H2iY8sgfxWo/lFSonhZKTo/+dHOYNKs42Q85ytG1rpcEYYVOK53mx8f7Z3THmw348a/+geM8Bukvo5pLc7KmXIvq6UQIjZmI/wnbA7B8MzLyrod71SaT1ujMEV1Jg0b3KnjS5kJnUHDICw3CdvuenNIgYl/zbTeEJ1iUu6T1TY+cNGG/7HOsaR1leCArDutHIKowcIFQFZoLEikM2DX5MSp9UBizAVogHugEqE2Bqh+C7NyTzJfQzR8s4drnt9IaptJQmCo6z9f+dQALjhftJXBDdkR6coMyOujV3Yyc5 rsa-key-20210928"
];
};
achim = {
description = "Achim Randelhoff";
home = "/home/achim";
group = "achim";
extraGroups = [
"users"
];
uid = 1016;
isNormalUser = true;
createHome = false;
useDefaultShell = true;
# shell = pkgs.fish;
openssh.authorizedKeys.keys = [
"ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQCuShthrciA4hz3g/e4Q2S1L8OOyb0BpXg3FdjAhBHq8ZWK3GD40qyjmvk45EMX+2hZBXKKjEgO2ToTnH6P0NggwfBU9XhEb/SVxJwohJs55xRERT8jTXcYAXGrZntUg79ndWUHL2NzMMSJnJPEX1M3GZIymDxmUzsaagNvRI3kja42FNHtdX49hGSSygRoqjE+ui2lbFVi6+uY8TUdeW03+BYOgOJ8AtbvwP8MDZqUbHWc7fbg1DE3n52i+Uje2xyXPRwgCKZ0Ha0OLwiezKkVlUqc2gzSIQlKZ2Oy+9AE1knbCr5LVsarERUc17ux74fNQF8P6mCbbqvsgpX0KJK4yrjXPvkFVLcqmRXG+wyYuLLIAuNSG9N6rDgelBevTIqH+zZusXJm2du7mATgpEKBjYHlyS4tuf+gJaP26A2E1Eay5xxUKawm/PY71g/nMHlifYlnbz7fexQ/ObKCntLC0PP07xA6X8einCO81Q+8y0upa4hyzMkfHN4hcknXvj0= doppler@AKVA9454"
];
};
mib = {
description = "Michael Bedington";
home = "/home/mib";
group = "mib";
extraGroups = [
"users"
];
uid = 1017;
isNormalUser = true;
createHome = false;
useDefaultShell = true;
# shell = pkgs.fish;
openssh.authorizedKeys.keys = [
];
};
# @usr@
};
}