All checks were successful
continuous-integration/drone/push Build is passing
80 lines
2.7 KiB
Markdown
80 lines
2.7 KiB
Markdown
---
|
|
title: "Internal Services"
|
|
geekdocDescription: "Documentation for Non-public applications"
|
|
weight: 30
|
|
---
|
|
This page provides some documenation on other services used within burble.dn42
|
|
that are not directly available for public use.
|
|
|
|
## rproxy.burble.dn42
|
|
|
|
Core nodes run an [nginx](https://nginx.com) container that acts as a reverse proxy
|
|
for services hosted in tier2.
|
|
|
|
The reverse proxy is distributed to improve local response times and is
|
|
anycast as rproxy.burble.dn42. Most web services provided by burble.dn42 are
|
|
simply CNAMEs to the reverse proxy which then balances and forwards the
|
|
request to the actual service.
|
|
|
|
As well as a reverse proxy, nginx also provides:
|
|
|
|
- TLS termination
|
|
- A local page cache to act as a poor man's CDN
|
|
- Static content server
|
|
|
|
## vault.burble.dn42
|
|
|
|
[Hashicorp Vault](https://www.vaultproject.io/) is used to handle secrets
|
|
across the burble.dn42 network.<br/>
|
|
Vault is deployed as a 3 node cluster across the Europe core nodes
|
|
and uses the internal vault database as a back end.
|
|
|
|
### TLS Certificate Authority
|
|
|
|
Vault acts as the main [certificate authority](/services/ca/) for burble.dn42
|
|
PKI.
|
|
|
|
Vault allows for regular, automated renewal of certificates on short timeframes
|
|
(typically a rolling week or monthly basis).
|
|
|
|
### SSH Certificate Authority
|
|
|
|
Vault also acts as an SSH certificate authority, verifying both users and servers
|
|
within the network.
|
|
|
|
Server certificates are generated during deployment, whilst user (or role)
|
|
certificates are short lived and generated on demand.
|
|
|
|
### Deployment Secrets
|
|
|
|
Vault holds secrets used during node and service deployments.
|
|
|
|
Most burble.dn42 are built as stateless container images and secrets are
|
|
pushed from vault in to the live containers at runtime. This ensures the
|
|
container images do not contain secrets and that secrets can be applied per
|
|
instance even when using a common image.
|
|
|
|
Vault also manages database credentials (using the mysql/mariadb integration),
|
|
and these are also automatically generated and pushed in to container
|
|
instances on deployment.
|
|
|
|
The authority to access deployment secrets is inherited, on demand, from the
|
|
user token during the deployment process. This ensures that even if access was
|
|
gained to the deployment server, secrets could still not be accessed without
|
|
also having access to a live user token.
|
|
|
|
## nats.burble.dn42
|
|
|
|
burble.dn42 operates a [nats.io](https://nats.io/) cluster as a distributed,
|
|
network wide, broadcast and RPC solution. The cluster uses Vault managed,
|
|
ephemeral TLS certs for authentication and encryption.
|
|
|
|
## ci.burble.dn42
|
|
|
|
The burble.dn42 [git](/services/public#git) has an associated CI/CD service
|
|
based on [drone](https://www.drone.io/).
|
|
|
|
The CI/CD service is used to manage DNS, build and publish applications and
|
|
the burble.dn42 website.
|
|
|