My VyOs is archived for the following reasons:
- Chineesium router blew its SSD and took down entire network
- VyOS is really not welcoming of individuals. Rolling releases are often hard/dont upgrade, workarounds are requird and they are making it more and more difficult to build without buying a license for stable
- I want my DNS/router to just work and continuing to run VyOS feels like a losing deal with more and more worarounds.
- Now just running my UDMP and DNS is replaced by my 'old' UDM pro and https://github.com/truxnell/nix-config.
- Running 'cusotm' DNS and some containers now on nixOS on two devices for redundancy
My VyOS config.
Thanks to bjw-s for the framework for setting up VyOS in a iac/gitops fashion! https://github.com/bjw-s/vyos-config
Will need to install vyos-rolling - easiest if its modified with git (like onedr0ps image)
To install from live image, install image
and follow prompts.
Get basic network running in installed image
Some good info here on setup/config concepts:
https://blog.kroy.io/2020/05/04/vyos-from-scratch-edition-1/#Basic_Configuration
Use commit-confirm
when doing things that might lock you out - this reboots in 10 mins by defualt if you dont enter confirm
into the configure mode. As you haven't saved it, when it reboots it will pick up your last known working config.
configure
set networks ethernet eth1 dhcp
set system name-server 1.1.1.1
cd /config
mkdir secrets
scp ~/.config/sops/age/keys.txt vyos@<VYOS-IP>:/config/secrets/age.key
git init
git remote add origin [email protected]:<repo>.git
git branch --set-upstream-to=origin/main main # not 100% certain this is required
git checkout main -f
git log
scp age key to folder
scp ~/.config/sops/age/keys.txt vyos@<ip>:/config/secrets/age.txt
First create servers wg keypair
generate pki wireguard key-pair install <interface>
from the output, put the public key in the sops file (to gitops the vyos interface private key) and note the public key for your remote device
generate a keypair for your remote device
generate pki wireguard key-pair
Note them for remote device. Add the private key into the wg01 in interfaces.sh