static ipv4 configuration for containers in the serv subnet

This commit is contained in:
Astro 2020-05-22 17:24:56 +02:00
parent 61f134d91f
commit 95b8272413
9 changed files with 19 additions and 8 deletions

View File

@ -25,6 +25,9 @@
htop htop
]; ];
networking.interfaces.eth0.ipv4.addresses = [ { address = "172.20.73.16"; prefixLength = 26; } ];
networking.defaultGateway = "172.20.73.1";
networking = { networking = {
hostName = "deployer"; hostName = "deployer";
# usePredictableInterfacenames = false; # usePredictableInterfacenames = false;

View File

@ -22,6 +22,7 @@
networking.interfaces.eth0.ipv4.addresses = [ { address = "172.20.73.8"; prefixLength = 26; } ]; networking.interfaces.eth0.ipv4.addresses = [ { address = "172.20.73.8"; prefixLength = 26; } ];
networking.defaultGateway = "172.20.73.1"; networking.defaultGateway = "172.20.73.1";
services.resolved.enable = false; services.resolved.enable = false;
networking.nameservers = [ "172.20.73.8" "172.20.72.6" "172.20.72.10" "9.9.9.9" ];
# Set your time zone. # Set your time zone.
time.timeZone = "Europe/Berlin"; time.timeZone = "Europe/Berlin";

View File

@ -17,6 +17,8 @@
networking = { networking = {
hostName = "elastic1"; hostName = "elastic1";
interfaces.eth0.ipv4.addresses = [ { address = "172.20.73.15"; prefixLength = 26; } ];
defaultGateway = "172.20.73.1";
firewall = { firewall = {
allowedTCPPorts = [ allowedTCPPorts = [
22 22

View File

@ -17,6 +17,8 @@
networking = { networking = {
hostName = "logging"; hostName = "logging";
interfaces.eth0.ipv4.addresses = [ { address = "172.20.73.13"; prefixLength = 26; } ];
defaultGateway = "172.20.73.1";
firewall = { firewall = {
allowedTCPPorts = [ allowedTCPPorts = [
22 22

View File

@ -18,6 +18,8 @@
networking = { networking = {
hostName = "mongo"; hostName = "mongo";
interfaces.eth0.ipv4.addresses = [ { address = "172.20.73.21"; prefixLength = 26; } ];
defaultGateway = "172.20.73.1";
firewall = { firewall = {
allowedTCPPorts = [ allowedTCPPorts = [
22 22

View File

@ -12,11 +12,9 @@ in
]; ];
networking.hostName = "mucbot"; networking.hostName = "mucbot";
networking.useNetworkd = true; networking.interfaces.eth0.ipv4.addresses = [ { address = "172.20.73.27"; prefixLength = 26; } ];
networking.useDHCP = false; networking.defaultGateway = "172.20.73.1";
networking.interfaces.eth0.useDHCP = true;
networking.nameservers = [ "172.20.73.8" "172.20.72.6" "172.20.72.10" "9.9.9.9" ]; networking.nameservers = [ "172.20.73.8" "172.20.72.6" "172.20.72.10" "9.9.9.9" ];
services.resolved.enable = false;
users.users.tigger = { users.users.tigger = {
createHome = true; createHome = true;

View File

@ -16,7 +16,8 @@
networking.hostName = "scrape"; networking.hostName = "scrape";
networking.useNetworkd = true; networking.interfaces.eth0.ipv4.addresses = [ { address = "172.20.73.32"; prefixLength = 26; } ];
networking.defaultGateway = "172.20.73.1";
# Required for krops # Required for krops
services.openssh.enable = true; services.openssh.enable = true;

View File

@ -13,9 +13,8 @@ in
]; ];
networking.hostName = "spaceapi"; networking.hostName = "spaceapi";
networking.useNetworkd = true; networking.interfaces.eth0.ipv4.addresses = [ { address = "172.20.73.25"; prefixLength = 26; } ];
networking.useDHCP = lib.mkForce true; networking.defaultGateway = "172.20.73.1";
networking.firewall.allowedTCPPorts = [ 3000 3001 ];
services.spaceapi = { services.spaceapi = {
enable = true; enable = true;

View File

@ -12,7 +12,10 @@
nix.useSandbox = false; nix.useSandbox = false;
nix.maxJobs = lib.mkDefault 1; nix.maxJobs = lib.mkDefault 1;
nix.buildCores = lib.mkDefault 4; nix.buildCores = lib.mkDefault 4;
networking.useNetworkd = true;
networking.useDHCP = false; networking.useDHCP = false;
services.resolved.enable = false;
networking.nameservers = [ "172.20.73.8" "172.20.72.6" "172.20.72.10" "9.9.9.9" ];
networking.interfaces.eth0 = { networking.interfaces.eth0 = {
useDHCP = true; useDHCP = true;