Commit graph

813 commits

Author SHA1 Message Date
Daniel Micay
bafb23d0ec deploy-bootloader: deploy systemd-boot-update.service.d 2025-11-06 11:59:13 -05:00
Daniel Micay
63b6247438 drop unnecessary inclusion of / in fstab 2025-11-06 11:59:13 -05:00
Daniel Micay
40351149bb add mkinitcpio.conf for servers with mdraid 2025-11-06 11:59:13 -05:00
Daniel Micay
a999a00c88 split metal and mdraid server types 2025-11-06 11:59:13 -05:00
Daniel Micay
76b88bbffa update mkinitcpio.conf 2025-11-06 11:59:13 -05:00
Daniel Micay
c9b84fdb79 logrotate: use better size+time rotation approach 2025-11-06 11:58:40 -05:00
Daniel Micay
5f2e4a45c3 logrotate: preserve existing file owner/group/mode
wmtp and btmp are reliably created by systemd at boot with the proper
permissions which also means missingok can be dropped.
2025-11-05 23:45:10 -05:00
Daniel Micay
eeb00c5bda logrotate: default to delayed compression with opt-in to no delay 2025-11-05 23:32:48 -05:00
Daniel Micay
04722cdd95 Revert "remove obsolete nvim tmpfiles.d configuration"
This reverts commit 2967eb02d7.
2025-11-05 20:24:57 -05:00
Daniel Micay
a0563b249b ssh: use AcceptEnv for COLORTERM 2025-11-05 20:23:39 -05:00
Daniel Micay
2b90bbc50a journald: reconfigure based on nginx logging split 2025-11-04 14:15:44 -05:00
Daniel Micay
9a864106d7 deploy-bootloader: no need to source ssh.sh 2025-11-04 14:03:21 -05:00
Daniel Micay
8af52e3498 journald: revert back to default SystemMaxFiles
This was raised to 10000 to work around 2 separate journald bugs causing
premature rotation which have been resolved for a long time.
2025-11-04 13:45:16 -05:00
Daniel Micay
7f0982f9d7 journald: disable ForwardToWall 2025-11-04 11:51:00 -05:00
Daniel Micay
2b9a6f4c59 disable TCP Fast Open for 3.releases.grapheneos.org
It currently causes issues with the TCP synproxy filter we may want to
use to mitigate DDoS attacks.
2025-11-04 11:27:25 -05:00
Daniel Micay
f1ff8ac931 phase out 2.releases.grapheneos.org 2025-11-04 11:19:13 -05:00
Daniel Micay
8697cf2a2d switch back to unified journald rotation/retention
Since we're no longer storing nginx logs in journald, we no longer need
to use journald configuration to control nginx log rotation/retention.

We switched from nginx to dnsdist for the authoritative DNS servers and
are therefore no longer logging any of the queries persistently since we
can rely on the PowerDNS and dnsdist in-memory buffers and stats.

We can use nginx-specific logrotate configuration on a per-server basis
based on balancing the usefulness of access logs with storage space and
getting rid of slightly sensitive data faster (mainly IP addresses).
2025-11-03 20:03:59 -05:00
Daniel Micay
9d68a079db logrotate: use specific log file paths
This avoids ending up with the glob path in the logrotate state file
when nothing matches the glob pattern.
2025-11-03 12:54:18 -05:00
Daniel Micay
39b6de58dd syslog-ng: add socket for nginx error logs
The error log is fairly quiet during regular use but can end up logging
one or more lines per request during DDoS attacks. Errors are logged for
worker_connections depletion and limit_conn rejections. There's also
currently an nginx bug with modern TLS and OpenSSL causing some client
side TLS errors to be logged as crit instead of info.
2025-11-03 12:53:24 -05:00
Daniel Micay
386d332aaf remove unused logrotate configurations 2025-11-03 00:33:30 -05:00
Daniel Micay
ca20c421a5 deploy-certbot: avoid syncing replicate.conf 2025-11-03 00:33:30 -05:00
Daniel Micay
934c5dbd53 logrotate: remove notifempty for nginx 2025-11-03 00:33:30 -05:00
Daniel Micay
b61c76c324 logrotate: remove nocreate for letsencrypt 2025-11-03 00:33:30 -05:00
Daniel Micay
cee00863e3 update servers haven't been on OVH for a while 2025-11-03 00:33:30 -05:00
Daniel Micay
39e701e9fb update pacreport.conf 2025-11-03 00:33:30 -05:00
Daniel Micay
944b4679c1 merge website and network servers
This provides more redundancy for both services through having 2
instances in each region. The network services have much higher
bandwidth usage and load so this will also delay us needing to obtain
new servers by making better use of the ones we have.
2025-11-03 00:33:30 -05:00
Daniel Micay
2caa67529a set up syslog-ng for nginx access log
This sets up the infrastructure for moving from storing nginx access
logs in journald to plain text files written by syslog-ng and rotated by
logrotate. This works around the poor performance, poor space efficiency
and lack of archived log compression for journald. Unlike writing access
logs directly with nginx, this continues avoiding blocking writes in the
event loop and sticks to asynchronous sends through a socket.

Since nginx only supports syslog via the RFC 3164 protocol rather than
the more modern RFC 5424 protocol, this leaves formatting timestamps up
to nginx rather than using the ones provided via the syslog protocol.
2025-11-03 00:33:28 -05:00
Daniel Micay
97d55a130e enable web services immediately 2025-11-01 20:14:35 -04:00
Daniel Micay
48bdeb4033 explicitly refer to nginx.service 2025-11-01 20:05:50 -04:00
Daniel Micay
3c4380370e logrotate: use zstd for compression 2025-11-01 20:04:53 -04:00
Daniel Micay
a346146625 reorder update servers 2025-11-01 20:04:51 -04:00
Daniel Micay
01305667bd remove legacy 2.releases.grapheneos.org IPv6 address 2025-10-31 00:38:22 -04:00
Daniel Micay
7fa179260f phase in new IPv6 address for 2.releases.grapheneos.org 2025-10-30 20:11:17 -04:00
Daniel Micay
4e771284f5 expand pacreport.conf 2025-10-30 17:09:11 -04:00
Daniel Micay
34a18b6a86 simplify deploy-primary 2025-10-30 17:06:07 -04:00
Daniel Micay
0d1705320f use consistent naming for session ticket key scripts/units 2025-10-30 17:06:07 -04:00
Daniel Micay
768cc9ada3 update LS_COLORS configuration
This is generated from the current standard dircolors database with the
addition of Brotli to the archive file types.
2025-10-30 16:17:33 -04:00
Daniel Micay
9fde84c877 add initial session ticket key synchronization 2025-10-30 14:22:55 -04:00
Daniel Micay
f9430a1aeb add script for deploying certbot replication setup 2025-10-30 14:22:32 -04:00
Daniel Micay
e6db6a15e6 add swap device timeout as a fallback
The previous commit works around a long term systemd bug which recently
began impacting us again. If the workaround stops working, the behavior
should not be stalling boot forever. Swap isn't needed for our servers
to function so it shouldn't break them if it can't be set up.
2025-10-29 22:47:01 -04:00
Daniel Micay
8340cf2813 add workaround for system encrypted swap race
This appeared to be solved a while ago but ended up returning.
2025-10-29 22:36:11 -04:00
Daniel Micay
2d87e13eb0 add bootloader deployment script 2025-10-29 18:32:52 -04:00
Daniel Micay
85c5ccc613 update IP addresses for 0.releases.grapheneos.org 2025-10-28 15:25:16 -04:00
Daniel Micay
848d4822e1 rotate-session-ticket-keys: replace is-enabled with is-active 2025-10-28 12:49:17 -04:00
Daniel Micay
0b519d6f5e set AccuracySec=1us for tcp-fastopen-rotate-keys 2025-10-28 12:33:10 -04:00
Daniel Micay
81147f1fbb rotate-session-ticket-keys: skip when synced 2025-10-28 02:59:00 -04:00
Daniel Micay
17f0ec527d cleanly phase in new TLS session ticket keys
This closes a small window where new workers could give keys not
accepted by the old workers before they're gracefully shut down. This
will also be needed when syncing keys across a cluster.
2025-10-28 02:48:49 -04:00
Daniel Micay
9ffcb3e648 minor rotate-session-ticket-keys improvements 2025-10-27 23:16:36 -04:00
Daniel Micay
9ed61cef61 reduce TLS session ticket key interval from 8h to 6h 2025-10-27 22:50:32 -04:00
Daniel Micay
ce0942702e add RemainAfterExit=yes to create-session-ticket-keys.service 2025-10-27 22:11:22 -04:00