Files
HomeServerCTs/Readme.md
2022-03-11 17:59:46 +01:00

288 lines
10 KiB
Markdown

# Scripts for building containers for the Proxmox home server
# Initial Setup
The first step is to build the containers needed for building all other containers.
This can be done on a Minimal debian CT (make sure to enable nesting) on the new proxmox server or any other debian install
1. Clone this repo
2. cd in to cloned repo
3. run `bash Scripts/FirstSetup.sh`, to generate the container images
4. upload the `Debian-imgbuilder.tar.xz` to the proxmox server and create a privileged container
5. Follow the steps under Container Setup > imgbuilder
6. Upload the `Debian-Jenkins.tar.xz` to the proxmox server and create a container
7. Follow the steps under Container Setup > Jenkins
# List of containers
| Name | Distro | Description |
|------|:------:|:-----------:|
| minimal | All | Minimal installed packages |
| default | All | ssh-server and nano packages |
| elkarbackup(ALP/DEB) | ALL | ElkarBackup rsyncsnapshot server |
| jenkins | Debian | Jenkins server |
| jenkinsBuilder | Debian | Basic node for Jenkins |
| imgbuilder | Debian | LXC template builder node for Jenkins |
| mysql | Debian | Mysql server with PhpMyadmin |
| pihole | Debian | Pihole CT |
| collabora | Debian | CollaboraOffice WebService (CODE version) |
| jellyfin | Debian | Jellyfin in-home streaming server |
| domoticz | Debian | Domoticz home automation service |
| omadaV3 | Debian | TP-link Omada SDN controller(V3.2.14) |
| docker | Debian | Docker container service |
| smb | Debian | Samba server |
| tvheadend | Debian | Tvheadend server |
| x2go | Debian | Remote xfce desktop accessable via X2go |
| aptcacherng | Debian | Caching server for linux packages |
| nfs | Debian | NFS server |
| gitea | Alpine | Gitea server |
| nginx | Alpine | Nginx server for reverse-proxy use |
| ddns | Alpine | DDNS client configured for OVH/OVH-Cloud |
| transfersh | Alpine | transfer.sh instance |
| iscsi | Alpine | iSCSI server |
| z2mqtt | Alpine | Mqtt bridges for Zigbee and ZWave |
| nodered | Alpine | Node-Red |
| nodejs | Alpine | Basic nodejs install with pm2 |
| nextcloud | Alpine | Nextcloud |
| mqtt | Alpine | Mosquitto mqtt broker |
| hass | Alpine | HomeAssistant instance with HACS and mysql support |
| mailbackup | Alpine | Contains mail archive tools (MailBackup-sys) |
| heimdall | Alpine | Heimdall, A application dashboard/launcher |
## TODO
**Begin original list**
~Unifi~ Not supported in debian 11
~FileShelter~ Not supported in debian 11 /transfer.sh As alternative
**End original list**
# Container Setup
## imgbuilder
**This container should be set up as privileged**
1. Enable features: Fuse, Nesting and 'Create Device Nodes'
2. Add a mountpoint to /LXCBuild on a accessible place for the Proxmox Server
3. Add this location to datastore for LXC templates to Proxmox
4. Set the `jenkins` user password using `passwd jenkins` in the container
5. Create folders on mountpoint using `mkdir /LXCBuild/template/cache`
6. Set permissions on the folder `chmod o+w -R /LXCBuild`
7. Write down the ip of this server (for use in the jenkins container)
## jenkins
1. In the container configure the setup script `nano /opt/Setup/Scripts/FirstRun.sh`
2. In the container run the setup script `bash /opt/Setup/Scripts/FirstRun.sh`
3. Access Jenkins using `http://<ip>:8080`
4. Press the `X` to skip the fist time setup
5. Delete the `Admin` user go to 'Manage Jenkins' > 'Manage Users' > Admin > Delete
6. Add credentials for imgbuilder-CT go to 'Manage Jenkins' > 'Manage Nodes and Clouds' > LXCBuilder1 > configure
Under Credentials click 'Add', enter 'jenkins' as username, and set the password that was set in the imgbuilder CT
Then select the created credential and click save
7. Click 'Relaunch agent'
8. Now you can build container images
## mysql
* To configure the MySQL root password in the container run the setup script `bash /opt/Setup/Scripts/FirstRun.sh`
## gitea
1. Edit the parameters in the FistRun script in the container `vi /opt/Setup/Scripts/FirstRun.sh`
2. Run the FistRun script in the container `ash /opt/Setup/Scripts/FirstRun.sh`
## nginx
* Run the FistRun script in the container `ash /opt/Setup/Scripts/FirstRun.sh`
## pihole
* Run the FistRun script in the container `ash /opt/Setup/Scripts/FirstRun.sh`
## collabora
* Update the configuration in /etc/coolwsd/coolwsd.xml and reload the service `systemctl restart coolwsd`
## jellyfin
* To set-up the system follow the initial set-up wizard on http://`<ip>`:8096
## domoticz
* Available on http://`<ip>`:8080
## transfersh
* Available on http://`<ip>`:8080
## omadaV3
* To set-up the system follow the initial set-up wizard on http://`<ip>`:8088
## docker
* Run the FistRun script in the container `ash /opt/Setup/Scripts/FirstRun.sh`
This container can be set up in two ways
1. As controller with portainer
2. As remote with docker tcp on port 2375
3. BONUS if FistRun script is skipped the CT has clean docker
## iscsi
### In Proxmox
* Run following commands
```
modprobe target_core_mod
printf "#Load iSCSI module at boot\ntarget_core_mod" > /etc/modules-load.d/iSCSI-target.conf
```
* Add the following to /etc/pve/lxc/`<CT-ID>`.conf
```
lxc.apparmor.profile: unconfined
```
* Restart CT
### In CT
* in the targetcli shell (by using the `targetcli` command) run the following commands
```
cd /iscsi
create <iqn for this server,Example:(iqn.2021-09.lan.test:host)>
exit
```
## z2mqtt
* Enable feature on CT: 'Create Device Nodes'
**Do not start this container after creation, follow these steps first**
* Recommended to give CT 1-2GB of RAM (Required for updating)
### In Proxmox
* Add the following to `/etc/udev/rules.d/99-CustomHome.rules`
#### Always add (to set the device permissions)**
```
KERNEL=="ttyUSB[0-9]*", MODE="0666"
KERNEL=="ttyACM[0-9]*", MODE="0666"
```
#### Add for Sonoff Zigbee 3.0 USB (CC2652P + CP2102N)
```
SUBSYSTEM=="tty", ACTION=="change", ATTRS{idVendor}=="10c4", ATTRS{idProduct}=="ea60", SYMLINK+="ttyACM-Zigbee"
SUBSYSTEM=="tty", ACTION=="add", ATTRS{idVendor}=="10c4", ATTRS{idProduct}=="ea60", SYMLINK+="ttyACM-Zigbee"
```
#### Add for Zigbee CC2531 USB
```
SUBSYSTEM=="tty", ACTION=="change", ATTRS{idVendor}=="0451", ATTRS{idProduct}=="16a8", SYMLINK+="ttyACM-Zigbee"
SUBSYSTEM=="tty", ACTION=="add", ATTRS{idVendor}=="0451", ATTRS{idProduct}=="16a8", SYMLINK+="ttyACM-Zigbee"
```
#### Add for Zwave Aeotec Z-Stick Gen5
```
SUBSYSTEM=="tty", ACTION=="change", ATTRS{idVendor}=="0658", ATTRS{idProduct}=="0200", SYMLINK+="ttyACM-Zwave"
SUBSYSTEM=="tty", ACTION=="add", ATTRS{idVendor}=="0658", ATTRS{idProduct}=="0200", SYMLINK+="ttyACM-Zwave"
```
* Run `udevadm trigger`
* Add the following to /etc/pve/lxc/`<CT-ID>`.conf
```
lxc.cgroup2.devices.allow: c 166:* rwm
lxc.cgroup2.devices.allow: c 188:* rwm
lxc.mount.entry: /dev/ttyACM-Zigbee dev/ttyACM-Zigbee none bind,optional,create=file
lxc.mount.entry: /dev/ttyACM-Zwave dev/ttyACM-Zwave none bind,optional,create=file
```
* Zigbee2mqtt Available on http://`<ip>`:5002
* ZWave2mqtt Available on http://`<ip>`:8091
* in the ZWave2mqtt web ui set the Zwave serial port to /dev/ttyACM-Zwave
* If a `Cannot lock port` error shows, please reboot the CT, if that does not fix it try rebooting the Proxmox server
## nodered
* Available on http://`<ip>`:1880
## nextcloud
**MountPoint for data folder `/var/nextcloud`**
1. Edit the parameters in the FistRun script in the container `vi /opt/Setup/Scripts/FirstRun.sh`
2. Run the FistRun script in the container `ash /opt/Setup/Scripts/FirstRun.sh`
3. Available on http://`<ip>`
## smb
* Webmin available on http://`<ip/hostname>`
* Samba server Available
## tvheadend
**Do first login and setup wizard in a incognito/Private window, since the authentication system can get confused after setting the new username**
* Tvheadend Available on http://`<ip>`:9981
* Default credentials: setup/setup
* Follow the setup wizzard after login, otherwise authentication will be disabled
## hass
* After first start of CT HomeAssistant will finish its installation this will take at least 10 minutes
* HomeAssistant available on http://`<ip>`:8123
## aptcacherng
* Available on http://`<ip>`:80
## nfs
**This container should be set up as privileged**
* Enable feature on CT: 'NFS'
* Webmin available on http://`<ip/hostname>`
* NFS server Available
## mailbackup
* Info html page available on http://`<ip>`:80
* Add user/storage space by running `ash /opt/AddMailBox.sh`
## elkarbackup
1. Edit the parameters in the FistRun script in the container `vi /opt/Setup/Scripts/FirstRun.sh`
2. Run the FistRun script in the container `ash /opt/Setup/Scripts/FirstRun.sh`
3. Available on http://`<ip>` (Default username/password: root/root
4. Click cogwheel/settings icon > Manage backup locations >New (make sure to create this directory and set ngix as the owner)
5. Add a retention policy under the `Policies` tab
## heimdal
* Available on http://`<ip>`:80, first time loading the page may take a while
# Further CT documentation
## iscsi
### Allow Remote
Set the iqn of the client to one of the server:hostname/nickname
### In CT
* in the targetcli shell (by using the `targetcli` command) run the following commands
```
cd /iscsi/<server-iqn>/tpg1/acls/
create <client-iqn>
exit
```
### Add Drive
#### In Proxmox
* Create LVM Volume (Available @ /dev/`<poolName>`/`<VolumeName>`)
```
lvcreate --name <name> --size <VolumeSize>G <PoolName>
```
* Create ZFS Volume (Available @ /dev/`<poolName>`/`<VolumeName>`)
```
zfs create -o volblocksize=32k -V <VolumeSize>G <poolName>/<VolumeName>
zfs set sync=disabled <poolName>/<VolumeName>
```
* Get id by using ls -l /dev/`<devicename>`
* Add the following to /etc/pve/lxc/`<CT-ID>`.conf
```
lxc.cgroup2.devices.allow: b <id>:<Subid> rwm
lxc.mount.entry: /dev/<devicename> dev/<device> none bind,optional,create=file
```
* Restart CT
#### In CT
* in the targetcli shell (by using the `targetcli` command) run the following commands
```
cd /backstores/block
create <name> /dev/<device>
cd /iscsi/<server-iqn>/tpg1/luns
create <device>
exit
```
## x2go
* Add a user by typing `adduser <username>`
* Set key auth only `sed -i -e '/PasswordAuthentication/c\PasswordAuthentication no' -e '/ChallengeResponseAuthentication/c\ChallengeResponseAuthentication no' /etc/ssh/sshd_config`
* Set ssh port `sed -i -e '/Port 22/c\Port <PortNr>' /etc/ssh/sshd_config`