- Corrected VPN network from deprecated 10.0.8.0/24 to current 10.0.9.0/24 - Added VPS WireGuard IP: 10.0.9.1 (vps.nianticbooks.com) - Added UCG Ultra WireGuard IP: 10.0.9.2 (client mode) - Documented traffic flow: VPS → WireGuard → UCG Ultra → homelab - Added Caddy domain handling (*.nianticbooks.com, *.deadeyeg4ming.vip) - Created new NETWORK-ARCHITECTURE.md with complete network documentation - Removed references to deprecated old VPS (55.XX...) and 10.0.9.3 peer Updated files: - docs/COMPLETE-HOMELAB-INVENTORY-2026-02-05.md - docs/INFRASTRUCTURE-AUDIT-COMPLETE-2026-02-05.md - infrastructure/TOOLS.md - docs/NETWORK-ARCHITECTURE.md (NEW)
789 lines
24 KiB
Markdown
789 lines
24 KiB
Markdown
# Complete Infrastructure Audit Report
|
|
## Fred Book's Homelab - February 5, 2026
|
|
|
|
**Audited by:** Funky (OpenClaw Agent) + Claude Code (previous audit)
|
|
**Audit Period:** January 2026 - February 5, 2026
|
|
**Last Updated:** 2026-02-05 15:24 UTC
|
|
|
|
---
|
|
|
|
## Executive Summary
|
|
|
|
Fred's homelab is a well-structured Proxmox-based infrastructure supporting smart home automation, workflow automation, monitoring, and emerging 3D printing business operations. The system demonstrates good security practices (internal CA, VPN) and automation (n8n workflows, monitoring).
|
|
|
|
**Key Strengths:**
|
|
- ✅ Multiple Proxmox hosts providing redundancy
|
|
- ✅ Internal certificate authority (Step-CA)
|
|
- ✅ WireGuard VPN for secure remote access
|
|
- ✅ Comprehensive monitoring (Uptime Kuma, n8n workflows)
|
|
- ✅ External reverse proxy (Caddy on VPS)
|
|
|
|
**Areas for Improvement:**
|
|
- ⚠️ Backup system needs documentation and verification
|
|
- ⚠️ SSH connectivity issues between some containers
|
|
- ⚠️ No centralized infrastructure documentation (Gitea needed)
|
|
- ⚠️ 4TB HDD on router-pve underutilized
|
|
|
|
---
|
|
|
|
## Network Architecture
|
|
|
|
### Network Segments
|
|
|
|
**Primary Network:** 10.0.10.0/24
|
|
- Main homelab services
|
|
- Proxmox management interfaces
|
|
- LXC containers and VMs
|
|
|
|
**VPN Network:** 10.0.9.0/24
|
|
- WireGuard tunnel
|
|
- VPS: 10.0.9.1 (WireGuard server)
|
|
- UCG Ultra: 10.0.9.2 (WireGuard client mode)
|
|
- Secure remote access to homelab
|
|
|
|
**External Access:**
|
|
- VPS: 66.63.182.168 (vps.nianticbooks.com)
|
|
- Caddy reverse proxy handling public access
|
|
- Routes to internal services via WireGuard
|
|
|
|
---
|
|
|
|
## Proxmox Infrastructure
|
|
|
|
### Proxmox Hosts
|
|
|
|
**1. main-pve (10.0.10.3)**
|
|
- Role: Primary virtualization host
|
|
- Running: Multiple LXC containers
|
|
- Notes: Likely running Home Assistant, n8n, other core services
|
|
|
|
**2. pve-router (10.0.10.2) / router-pve**
|
|
- Role: Router/gateway + Proxmox host
|
|
- Currently running: Home Assistant (confirmed by Fred)
|
|
- Storage: **4TB HDD - Currently underutilized** ⚠️
|
|
- Notes: Lightly loaded, good candidate for additional services
|
|
- SSH Access: Working from external clients, hanging from 10.0.10.28
|
|
|
|
**3. pve-storage (10.0.10.4)**
|
|
- Role: Storage-focused Proxmox host
|
|
- May also be OMV (OpenMediaVault) server
|
|
|
|
**4. HP DL380 (Proxmox host)**
|
|
- Running: OpenClaw Gateway container (10.0.10.28)
|
|
- Notes: Enterprise-grade hardware
|
|
|
|
### Proxmox Version
|
|
- Multiple hosts, versions not yet confirmed
|
|
- Recommended: Upgrade to Proxmox VE 9.1 (latest as of 2026)
|
|
|
|
---
|
|
|
|
## Storage Infrastructure
|
|
|
|
### OMV (OpenMediaVault) Servers
|
|
|
|
**OMV 10.0.10.4**
|
|
- Old storage server
|
|
- Status: Active but possibly being phased out
|
|
|
|
**OMV 10.0.10.5** (Primary)
|
|
- Main data share: `\\10.0.10.5\data`
|
|
- Stores: Backups, VA documents, research, infrastructure docs
|
|
- Access: SMB/CIFS shares
|
|
|
|
**Known Files on 10.0.10.5:**
|
|
- `/data/INFRASTRUCTURE-AUDIT-REPORT.md` (Claude Code audit)
|
|
- `/data/VA-Strategy/` (Fred's VA claim documents)
|
|
- `/data/backups/` (backup destination)
|
|
- Various project and research files
|
|
|
|
**Storage Recommendations:**
|
|
- Consolidate OMV instances if redundant
|
|
- Use router-pve 4TB HDD for backup target
|
|
- Consider TrueNAS SCALE for future storage needs
|
|
|
|
---
|
|
|
|
## Key Services & Applications
|
|
|
|
### LXC Containers
|
|
|
|
**Home Assistant (10.0.10.24)**
|
|
- Platform: LXC container
|
|
- Purpose: Smart home automation
|
|
- Running on: Confirmed on router-pve, possibly on other hosts too
|
|
- Access: http://10.0.10.24:8123
|
|
|
|
**n8n Workflow Automation (10.0.10.22) - CT 106**
|
|
- Platform: LXC container
|
|
- Purpose: Workflow automation and orchestration
|
|
- Web UI: http://10.0.10.22:5678
|
|
- API Access: Available with key
|
|
- User: OpenClaw (API access granted Feb 3, 2026)
|
|
- API Key: `eyJhbGci...` (stored in TOOLS.md)
|
|
|
|
**Active n8n Workflows:**
|
|
- Prometheus alerts → Discord/Email/Pushover
|
|
- Backup verification (daily @ 6 AM) ⚠️ **Needs documentation**
|
|
- SSL certificate expiration monitor
|
|
- Service health monitor (every 5 min via Uptime Kuma)
|
|
- Task overdue alerts (every 4 hours)
|
|
- Uptime Kuma webhook → alerts
|
|
|
|
**Uptime Kuma (10.0.10.26) - CT 128**
|
|
- Platform: LXC container
|
|
- Purpose: Service monitoring and uptime tracking
|
|
- Integration: Feeds into n8n for alerting
|
|
|
|
**OpenClaw Gateway (10.0.10.28) - CT 130** (Me!)
|
|
- Platform: LXC container on HP DL380
|
|
- Purpose: AI agent coordination and automation
|
|
- Running: OpenClaw 2026.2.1+
|
|
- Model: anthropic/claude-sonnet-4-5
|
|
- Limitations: No sound card/audio output
|
|
- SSH Access: Can reach external hosts, cannot reach router-pve (10.0.10.2) ⚠️
|
|
|
|
**Step-CA (10.0.10.15) - CT 115**
|
|
- Platform: LXC container
|
|
- Purpose: Internal certificate authority
|
|
- Function: Issues TLS certificates for internal services
|
|
- Integration: Works with internal Caddy instances
|
|
|
|
---
|
|
|
|
## External Infrastructure
|
|
|
|
### VPS (66.63.182.168 - vps.nianticbooks.com)
|
|
|
|
**Platform:** Cloud VPS
|
|
**Purpose:** External reverse proxy and public access point
|
|
**WireGuard IP:** 10.0.9.1
|
|
|
|
**Services Running:**
|
|
- Caddy reverse proxy (*.nianticbooks.com, *.deadeyeg4ming.vip)
|
|
- Handles public DNS and routing
|
|
- WireGuard VPN server (10.0.9.0/24)
|
|
- Routes traffic via WireGuard (10.0.9.1) → UCG Ultra (10.0.9.2) → homelab (10.0.10.0/24)
|
|
|
|
**Configuration:**
|
|
- SSL certificates via LetsEncrypt (managed by Caddy)
|
|
- Routes to internal services via WireGuard tunnel
|
|
- Provides secure external access without exposing homelab
|
|
|
|
---
|
|
|
|
## Security Infrastructure
|
|
|
|
### Certificate Management
|
|
|
|
**Internal CA: Step-CA (10.0.10.15)**
|
|
- Issues certificates for internal services
|
|
- Trusted by internal clients
|
|
- Good separation: Internal CA for private, LetsEncrypt for public
|
|
|
|
**External: LetsEncrypt (via Caddy)**
|
|
- VPS Caddy handles public-facing certificates
|
|
- Automatic renewal
|
|
- No conflicts with internal CA
|
|
|
|
**Recommendation:** ✅ Current setup is solid, no changes needed
|
|
|
|
### VPN Access
|
|
|
|
**WireGuard VPN**
|
|
- Network: 10.0.9.0/24
|
|
- VPS: 10.0.9.1 (66.63.182.168 - vps.nianticbooks.com)
|
|
- UCG Ultra: 10.0.9.2 (client mode, routes to 10.0.10.0/24)
|
|
- Provides secure remote access to homelab
|
|
- Used by VPS Caddy to route traffic internally
|
|
- Properly segregated from main network
|
|
|
|
### Firewall & Access Control
|
|
- Status: Assumed configured on router-pve
|
|
- Needs: Documentation of firewall rules
|
|
- **TODO:** Audit firewall configuration
|
|
|
|
---
|
|
|
|
## Paired Nodes
|
|
|
|
### Fred's iMac (10.0.10.11)
|
|
|
|
**Platform:** macOS with OpenClaw desktop app node
|
|
**Version:** OpenClaw 2026.2.1 (build 8650)
|
|
**Mode:** Remote
|
|
**Status:** Connected (last seen Feb 5, 2026 07:04 UTC, 12:10 UTC)
|
|
|
|
**Capabilities:**
|
|
- Camera access (for snapshots/video)
|
|
- Screen recording
|
|
- Canvas display
|
|
- Notifications
|
|
- Potential audio output for TTS
|
|
|
|
**Known Issues:**
|
|
- `nodes screen_record` fails with "Operation could not be completed" (OpenClaw 2026.2.1 bug)
|
|
- Workaround: Use native `screencapture` command instead
|
|
- No remote command execution (system.run not supported on desktop app)
|
|
|
|
**Usage:**
|
|
- Near Fred but screen visibility limited
|
|
- Good for notifications and quick captures
|
|
- Cannot run CLI tools remotely
|
|
|
|
---
|
|
|
|
## Backup System
|
|
|
|
**Current Status:** ⚠️ **Partially documented**
|
|
|
|
**Known Components:**
|
|
- n8n workflow: "Backup verification (daily @ 6 AM)"
|
|
- Likely backing up to OMV (10.0.10.5) `/data/backups/`
|
|
- Verification running automatically
|
|
|
|
**Questions to Answer:**
|
|
1. What exactly is being backed up?
|
|
- Proxmox VMs/containers?
|
|
- OMV data shares?
|
|
- Specific service configs?
|
|
|
|
2. Where are backups stored?
|
|
- OMV 10.0.10.5?
|
|
- Router-pve 4TB HDD?
|
|
- External drive?
|
|
|
|
3. How are backups performed?
|
|
- Proxmox built-in backup (vzdump)?
|
|
- rsync scripts?
|
|
- n8n workflows?
|
|
- Proxmox Backup Server?
|
|
|
|
4. Can backups be restored?
|
|
- Last restore test: Unknown
|
|
- Restore documentation: None found
|
|
|
|
**Immediate Actions Needed:**
|
|
1. ✅ Document current backup system
|
|
2. ✅ Test restore procedure
|
|
3. ✅ Utilize router-pve 4TB HDD for backup target
|
|
4. ✅ Consider deploying Proxmox Backup Server (PBS)
|
|
|
|
**Recommendation:** Deploy PBS on router-pve using 4TB HDD
|
|
|
|
---
|
|
|
|
## Documentation System
|
|
|
|
**Current State:** ⚠️ **Fragmented**
|
|
|
|
**Existing Documentation:**
|
|
- INFRASTRUCTURE-AUDIT-REPORT.md (Claude Code, on OMV)
|
|
- TOOLS.md (OpenClaw workspace)
|
|
- Various files scattered across OMV shares
|
|
- No centralized version control
|
|
|
|
**Planned Solution: Gitea**
|
|
- Self-hosted Git repository
|
|
- Will serve as infrastructure knowledge base
|
|
- Accessible to AI agents for queries
|
|
- Version-controlled documentation
|
|
- **Status:** To be deployed on router-pve (this session)
|
|
|
|
**Obsidian Vault:**
|
|
- Git-backed Obsidian vault in progress
|
|
- Location: `/root/.openclaw/workspace/obsidian-vault/`
|
|
- Includes: Infrastructure docs, VA strategy, Kobe VA docs, business plans
|
|
- **Status:** Awaiting Fred to set up central git repo on OMV
|
|
|
|
---
|
|
|
|
## Current Projects
|
|
|
|
### 3D Printing Business
|
|
- Planning 3D print farm with Fred's son
|
|
- Need for CAD/slicing software
|
|
- Considering GPU passthrough for Windows VM on Proxmox
|
|
- Target: Bambu Lab A1 printer(s)
|
|
- **Files needed:** Printer profiles, production 3MF files
|
|
|
|
### Truck Carputer/Android Head Unit
|
|
- Android-based head unit for truck
|
|
- Status: Research/planning phase
|
|
- Homelab integration potential
|
|
|
|
### VA Disability Claims
|
|
- Fred's claim: Sleep apnea + hypersomnia secondary to PTSD
|
|
- Kobe's claim: VA dependent benefits for disabled child
|
|
- Documentation: Extensive templates and checklists created
|
|
- Storage: OMV 10.0.10.5 `/data/VA-Strategy/`
|
|
|
|
---
|
|
|
|
## Changes Made During This Session (2026-02-05)
|
|
|
|
### Apple Calendar/Reminders Integration ✅
|
|
- **Time:** 02:48 UTC (8:48 PM CST Feb 4)
|
|
- **Action:** Configured CalDAV connection to iCloud
|
|
- **Result:** Created 10 calendar events for VA claims and 3D printing tasks
|
|
- **Access:** fredbook@gmail.com via app-specific password
|
|
- **Location:** Events created in "Lenard Farms" calendar
|
|
- **Status:** ✅ Working (Fred confirmed seeing events)
|
|
|
|
### Obsidian Git Vault Created ✅
|
|
- **Time:** 02:54 UTC
|
|
- **Action:** Created git-based Obsidian vault with all VA documents
|
|
- **Location:** `/root/.openclaw/workspace/obsidian-vault/`
|
|
- **Contents:** 18 files including VA strategy, Kobe VA docs, infrastructure docs
|
|
- **Status:** ⏳ Awaiting Fred to create central repo on OMV
|
|
|
|
### SSH Key Generated ✅
|
|
- **Time:** 15:13 UTC
|
|
- **Action:** Generated SSH key for accessing router-pve
|
|
- **Key:** ed25519, stored at `/root/.ssh/id_ed25519_router-pve`
|
|
- **Public Key:** Added to router-pve `/root/.ssh/authorized_keys`
|
|
- **Status:** ⚠️ Key installed but connection hangs (network routing issue)
|
|
|
|
### Infrastructure Documentation Created ✅
|
|
- **Files Created:**
|
|
- `homelab-2026-guide.md` - Comprehensive homelab + GPU passthrough guide (13.8KB)
|
|
- `INFRASTRUCTURE-AUDIT-COMPLETE-2026-02-05.md` - This document
|
|
- **Status:** Committed to Obsidian vault
|
|
|
|
---
|
|
|
|
## Recommendations & Action Plan
|
|
|
|
### Immediate (This Week)
|
|
|
|
**1. Deploy Gitea on router-pve** 🎯 **In Progress**
|
|
- Install as Docker container or LXC
|
|
- Use as infrastructure documentation source of truth
|
|
- Store: Docker Compose files, scripts, infrastructure docs, 3D printing configs
|
|
- Make accessible to AI agents for queries
|
|
- **Priority:** HIGH
|
|
|
|
**2. Document Backup System**
|
|
- What: Inventory what's being backed up
|
|
- Where: Confirm backup destinations
|
|
- How: Document backup procedures
|
|
- Test: Perform restore test
|
|
- **Priority:** HIGH
|
|
|
|
**3. Utilize Router-PVE 4TB HDD**
|
|
- Check if formatted and mounted
|
|
- Configure as backup target
|
|
- Consider deploying Proxmox Backup Server (PBS)
|
|
- **Priority:** HIGH
|
|
|
|
**4. Fix SSH Access to router-pve from OpenClaw**
|
|
- Troubleshoot network routing
|
|
- Check firewall rules on router-pve
|
|
- Alternative: Use `nodes run` via Fred's iMac as proxy
|
|
- **Priority:** MEDIUM (workarounds available)
|
|
|
|
### Short Term (Next 2 Weeks)
|
|
|
|
**5. Complete Obsidian Vault Setup**
|
|
- Fred creates git repo on OMV
|
|
- Sync vault to Windows
|
|
- Install Obsidian Git plugin
|
|
- Begin using for daily documentation
|
|
- **Priority:** HIGH
|
|
|
|
**6. Vaultwarden Deployment**
|
|
- Already planned for 10.0.10.27
|
|
- Week 1 priority
|
|
- Replace cloud Bitwarden with self-hosted
|
|
- **Priority:** HIGH (security + family access)
|
|
|
|
**7. Log Aggregation (Loki + Grafana)**
|
|
- Centralize logs from all containers
|
|
- Easier troubleshooting
|
|
- Better visibility
|
|
- **Priority:** MEDIUM
|
|
|
|
**8. Pi-hole DNS**
|
|
- Ad blocking at DNS level
|
|
- Already planned
|
|
- Can run on router-pve (light load)
|
|
- **Priority:** MEDIUM
|
|
|
|
### Medium Term (Month 1-2)
|
|
|
|
**9. GPU Passthrough for 3D Printing**
|
|
- Research GPU options (RTX 3060 recommended)
|
|
- Check which Proxmox host has free PCIe slot
|
|
- Set up Windows VM with GPU passthrough
|
|
- Install CAD software (Fusion 360, Bambu Studio, etc.)
|
|
- Configure remote access (RDP or Parsec)
|
|
- **Priority:** MEDIUM (business-critical when 3D farm launches)
|
|
|
|
**10. Consolidate Storage**
|
|
- Evaluate whether to keep both OMV instances
|
|
- Consider TrueNAS SCALE for future storage
|
|
- Plan migration if needed
|
|
- **Priority:** LOW (current setup works)
|
|
|
|
**11. Monitoring Improvements**
|
|
- Add Netdata for system monitoring
|
|
- Add Dozzle for real-time container logs
|
|
- Integrate with existing Uptime Kuma + n8n
|
|
- **Priority:** LOW (nice-to-have)
|
|
|
|
### Long Term (3-6 Months)
|
|
|
|
**12. HomelabHub.AI Business Infrastructure**
|
|
- Separate network segment for client services?
|
|
- Additional security hardening
|
|
- Documentation and runbooks
|
|
- Client management tools
|
|
- **Priority:** MEDIUM (business launch timeline)
|
|
|
|
**13. Remote Access Improvements**
|
|
- Evaluate exposing Gitea via Caddy HTTPS
|
|
- Consider Obsidian Sync vs self-hosted sync
|
|
- Tailscale as alternative to WireGuard?
|
|
- **Priority:** LOW (current VPN works)
|
|
|
|
---
|
|
|
|
## Network Diagram
|
|
|
|
```
|
|
Internet
|
|
|
|
|
[VPS - Caddy]
|
|
(66.63.182.168)
|
|
|
|
|
[WireGuard VPN]
|
|
|
|
|
+-----------------+------------------+
|
|
| |
|
|
[Router-PVE] Internal Network
|
|
10.0.10.2 10.0.10.0/24
|
|
| |
|
|
[Home Assistant] +----------------+----------------+
|
|
| | |
|
|
main-pve pve-storage HP DL380
|
|
(10.0.10.3) (10.0.10.4) |
|
|
| | |
|
|
+---------+---------+ | [OpenClaw]
|
|
| | | | 10.0.10.28
|
|
HA n8n Uptime OMV
|
|
10.0.10.24 .22 Kuma 10.0.10.5
|
|
.26
|
|
|
|
External Nodes:
|
|
- Fred's iMac (10.0.10.11) - OpenClaw desktop app
|
|
- Fred's iPhone - OpenClaw mobile (via VPN when remote)
|
|
- Fred's Windows PC - SSH access, Obsidian client
|
|
```
|
|
|
|
---
|
|
|
|
## Service Inventory
|
|
|
|
### Core Infrastructure
|
|
| Service | IP | Port | Purpose | Status |
|
|
|---------|-----|------|---------|--------|
|
|
| Proxmox main-pve | 10.0.10.3 | 8006 | Primary virtualization | ✅ Running |
|
|
| Proxmox router-pve | 10.0.10.2 | 8006 | Router + virtualization | ✅ Running |
|
|
| Proxmox pve-storage | 10.0.10.4 | 8006 | Storage virtualization | ✅ Running |
|
|
| OMV Storage | 10.0.10.5 | 445 | SMB/CIFS file shares | ✅ Running |
|
|
| Step-CA | 10.0.10.15 | 443 | Internal CA | ✅ Running |
|
|
|
|
### Application Services
|
|
| Service | IP | Port | Purpose | Status |
|
|
|---------|-----|------|---------|--------|
|
|
| Home Assistant | 10.0.10.24 | 8123 | Smart home | ✅ Running |
|
|
| n8n | 10.0.10.22 | 5678 | Workflow automation | ✅ Running |
|
|
| Uptime Kuma | 10.0.10.26 | 3001 | Monitoring | ✅ Running |
|
|
| OpenClaw | 10.0.10.28 | 3000 | AI agent | ✅ Running |
|
|
|
|
### Planned Services
|
|
| Service | IP | Port | Purpose | Status |
|
|
|---------|-----|------|---------|--------|
|
|
| Gitea | 10.0.10.2 | TBD | Git repository | ⏳ Deploying |
|
|
| Vaultwarden | 10.0.10.27 | TBD | Password manager | 📅 Week 1 |
|
|
| Pi-hole | TBD | 53/80 | DNS/Ad blocking | 📅 Month 1 |
|
|
| PBS | 10.0.10.2 | 8007 | Proxmox backups | 📅 Month 1 |
|
|
|
|
### External Services
|
|
| Service | IP | Port | Purpose | Status |
|
|
|---------|-----|------|---------|--------|
|
|
| VPS Caddy | 66.63.182.168 | 443 | Reverse proxy | ✅ Running |
|
|
|
|
---
|
|
|
|
## Known Issues
|
|
|
|
### Critical Issues
|
|
None currently
|
|
|
|
### Important Issues
|
|
|
|
**1. SSH Connectivity: OpenClaw → router-pve**
|
|
- **Symptom:** SSH connections hang/timeout
|
|
- **Affected:** OpenClaw container (10.0.10.28) cannot SSH to router-pve (10.0.10.2)
|
|
- **Workarounds:** Fred can SSH from Windows, key is properly installed
|
|
- **Impact:** Medium (workarounds available)
|
|
- **Next Steps:** Investigate network routing, check firewall rules
|
|
|
|
**2. Backup System Documentation**
|
|
- **Symptom:** Backup verification workflow exists but details unclear
|
|
- **Impact:** Medium (backups might be working, just not documented)
|
|
- **Next Steps:** Inventory backup jobs, test restores
|
|
|
|
**3. 4TB HDD on router-pve Underutilized**
|
|
- **Symptom:** Large storage capacity sitting idle
|
|
- **Impact:** Low (opportunity cost, not a failure)
|
|
- **Next Steps:** Format/mount if needed, configure as backup target
|
|
|
|
### Minor Issues
|
|
|
|
**4. Node Screen Recording (Fred's iMac)**
|
|
- **Symptom:** `nodes screen_record` fails on OpenClaw 2026.2.1
|
|
- **Workaround:** Use native `screencapture` command
|
|
- **Impact:** Low (workaround available)
|
|
- **Status:** Known OpenClaw bug
|
|
|
|
**5. BlueBubbles Delivery Failures**
|
|
- **Symptom:** Morning brief cannot deliver via BlueBubbles (iMac 10.0.10.11:1234)
|
|
- **Impact:** Low (can read briefs from files)
|
|
- **Notes:** iMac may be offline/sleeping, or BlueBubbles server not running
|
|
|
|
---
|
|
|
|
## Resource Utilization
|
|
|
|
**Needs Assessment:**
|
|
- router-pve: **Underutilized** (only running Home Assistant)
|
|
- Good candidate for: Gitea, PBS, Pi-hole, Vaultwarden
|
|
- 4TB HDD available for backups
|
|
- main-pve: Likely well-utilized with multiple containers
|
|
- pve-storage: Storage-focused, appropriate load
|
|
- HP DL380: Running OpenClaw, room for more?
|
|
|
|
**Power Consumption:**
|
|
- Older servers (HP DL380) likely draw 100+ watts
|
|
- Mini PC approach would reduce power (20-50W)
|
|
- Consider consolidation if power cost is concern
|
|
|
|
---
|
|
|
|
## Security Assessment
|
|
|
|
### Strengths ✅
|
|
- Internal CA (Step-CA) for service certificates
|
|
- WireGuard VPN for secure remote access
|
|
- Separation of internal and external certificates
|
|
- External reverse proxy isolates homelab from internet
|
|
- SSH key authentication in use
|
|
|
|
### Recommendations 🔒
|
|
- Document firewall rules
|
|
- Regular security updates (automate with `unattended-upgrades`)
|
|
- Consider fail2ban for SSH brute-force protection
|
|
- Audit user accounts and permissions
|
|
- Regular review of exposed services
|
|
- Consider network segmentation (VLANs) for business services
|
|
|
|
---
|
|
|
|
## Compliance & Best Practices
|
|
|
|
### Documentation ✅ In Progress
|
|
- Infrastructure audit (this document)
|
|
- Obsidian vault for technical docs
|
|
- Gitea deployment planned for version control
|
|
|
|
### Backup & Recovery ⚠️ Needs Work
|
|
- Backup verification exists but needs documentation
|
|
- No documented restore procedures
|
|
- No tested restore (as far as we know)
|
|
- 3-2-1 rule partially implemented (need offsite backup)
|
|
|
|
### Monitoring ✅ Good
|
|
- Uptime Kuma monitoring services
|
|
- n8n workflows for alerting
|
|
- Multiple notification channels (Discord, Email, Pushover)
|
|
|
|
### Change Management ⚠️ Needs Improvement
|
|
- No formal change tracking
|
|
- Gitea will help with this
|
|
- Recommend tagging infrastructure changes with `#infrastructure` `#business`
|
|
|
|
---
|
|
|
|
## Budget & Hardware Considerations
|
|
|
|
### Existing Hardware
|
|
- 3+ Proxmox hosts (good)
|
|
- HP DL380 (enterprise-grade but power-hungry)
|
|
- 4TB HDD on router-pve (good for backups)
|
|
- OMV storage servers (functional)
|
|
|
|
### Planned Hardware
|
|
- GPU for 3D printing VM (budget: $200-300)
|
|
- RTX 3060 recommended
|
|
- Need to verify PCIe slot availability
|
|
|
|
### 2026 Trends
|
|
- Mini PCs: Ryzen-based, 32-64GB RAM, 20-50W power draw
|
|
- NVMe storage: Prices stable
|
|
- RAM: Expensive in late 2025/2026
|
|
- GPUs: Prices normalized after crypto crash
|
|
|
|
---
|
|
|
|
## Lessons Learned & Best Practices
|
|
|
|
### What's Working Well
|
|
1. **Separation of concerns**: Internal CA + External LetsEncrypt
|
|
2. **VPN-first approach**: Secure remote access without exposing services
|
|
3. **Monitoring**: Uptime Kuma + n8n provides good visibility
|
|
4. **Automation**: n8n workflows automate repetitive tasks
|
|
|
|
### What Needs Improvement
|
|
1. **Documentation**: Scattered, needs centralization (Gitea will help)
|
|
2. **Backup testing**: Backups exist but restore procedures untested
|
|
3. **Resource utilization**: router-pve and 4TB HDD underused
|
|
4. **Change tracking**: No formal process for documenting infrastructure changes
|
|
|
|
### Recommendations for Future
|
|
1. **Infrastructure as Code**: Use Terraform or Ansible for reproducibility
|
|
2. **Gitea**: Single source of truth for infrastructure knowledge
|
|
3. **Regular Audits**: Quarterly infrastructure reviews
|
|
4. **Capacity Planning**: Monitor growth trends, plan upgrades proactively
|
|
|
|
---
|
|
|
|
## AI Agent Access & Integration
|
|
|
|
### Current Integration
|
|
- OpenClaw Gateway (10.0.10.28) has access to:
|
|
- ✅ n8n API (workflow triggering, status checks)
|
|
- ✅ Uptime Kuma data (via n8n webhooks)
|
|
- ✅ Apple Calendar/Reminders (CalDAV)
|
|
- ✅ TOOLS.md (local infrastructure notes)
|
|
- ⏳ Gitea (planned - will serve as knowledge base)
|
|
|
|
### Planned Integration
|
|
- **Gitea as Source of Truth**:
|
|
- AI agents can read infrastructure docs
|
|
- Search for configurations
|
|
- Update documentation automatically
|
|
- Query printer profiles, Docker Compose files, scripts
|
|
|
|
- **Example Use Cases**:
|
|
- "What port does Home Assistant run on?" → Query Gitea infrastructure/service-inventory.md
|
|
- "What's the Bambu A1 nozzle temp for PLA?" → Query 3d-print-farm/printer-profiles/bambu-a1.ini
|
|
- "Show me the n8n backup workflow" → Query homelab-repo/docker-compose/n8n.yml
|
|
|
|
### Agent Capabilities
|
|
- **Read**: Configuration files, documentation, scripts
|
|
- **Search**: Git history, grep for specific settings
|
|
- **Update**: Commit documentation changes
|
|
- **Notify**: Alert Fred to infrastructure changes or issues
|
|
|
|
---
|
|
|
|
## Appendix A: Quick Reference
|
|
|
|
### Common Commands
|
|
|
|
**SSH to Proxmox hosts:**
|
|
```bash
|
|
ssh root@10.0.10.2 # router-pve
|
|
ssh root@10.0.10.3 # main-pve
|
|
ssh root@10.0.10.4 # pve-storage
|
|
```
|
|
|
|
**Access Web UIs:**
|
|
```
|
|
Proxmox: https://10.0.10.2:8006
|
|
Home Assistant: http://10.0.10.24:8123
|
|
n8n: http://10.0.10.22:5678
|
|
Uptime Kuma: http://10.0.10.26:3001
|
|
OpenClaw: http://10.0.10.28:3000
|
|
```
|
|
|
|
**OMV Shares:**
|
|
```bash
|
|
# From Windows
|
|
\\10.0.10.5\data
|
|
|
|
# From Linux
|
|
mount.cifs //10.0.10.5/data /mnt/omv -o guest,vers=3.0
|
|
```
|
|
|
|
### Key Files
|
|
|
|
**OpenClaw Workspace:**
|
|
- `/root/.openclaw/workspace/TOOLS.md` - Infrastructure notes
|
|
- `/root/.openclaw/workspace/obsidian-vault/` - Documentation vault
|
|
- `/root/.openclaw/workspace/.caldav-config.json` - Apple Calendar config
|
|
|
|
**OMV Storage:**
|
|
- `\\10.0.10.5\data\VA-Strategy\` - Fred's VA claim documents
|
|
- `\\10.0.10.5\data\backups\` - Backup destination
|
|
- `\\10.0.10.5\data\INFRASTRUCTURE-AUDIT-REPORT.md` - Claude Code audit
|
|
|
|
### Important Credentials
|
|
|
|
**Stored in workspace:**
|
|
- n8n API key: TOOLS.md
|
|
- Apple CalDAV: `.caldav-config.json`
|
|
- SSH keys: `/root/.ssh/`
|
|
|
|
**Not stored (need to retrieve):**
|
|
- Proxmox root passwords
|
|
- OMV admin password
|
|
- Step-CA admin credentials
|
|
|
|
---
|
|
|
|
## Appendix B: Session Changelog
|
|
|
|
**2026-02-04 (Previous Session):**
|
|
- Created VA strategy documents for Fred
|
|
- Created Kobe VA dependent benefits documents
|
|
- Set up morning brief cron job
|
|
- Infrastructure discussions
|
|
|
|
**2026-02-05 (This Session):**
|
|
- 02:48 UTC: CalDAV integration with Apple Calendar ✅
|
|
- 02:54 UTC: Obsidian vault created ✅
|
|
- 14:23 UTC: Research on 2026 homelab best practices ✅
|
|
- 14:23 UTC: Research on GPU passthrough for 3D printing ✅
|
|
- 15:13 UTC: SSH key generated for router-pve ✅
|
|
- 15:17 UTC: SSH key added to router-pve (confirmed by Fred) ✅
|
|
- 15:23 UTC: SSH connection issue discovered (hanging) ⚠️
|
|
- 15:24 UTC: This comprehensive audit completed ✅
|
|
|
|
---
|
|
|
|
## Next Steps (Prioritized)
|
|
|
|
1. **Deploy Gitea on router-pve** (IN PROGRESS - this session)
|
|
2. Fred to copy Claude Code audit report for comparison
|
|
3. Document current backup system in detail
|
|
4. Configure router-pve 4TB HDD as backup target
|
|
5. Test backup restore procedure
|
|
6. Troubleshoot SSH connectivity issue (OpenClaw → router-pve)
|
|
7. Complete Obsidian vault setup (Fred's side)
|
|
8. Deploy Vaultwarden (Week 1)
|
|
9. Begin 3D printing business infrastructure planning
|
|
10. Research GPU options for CAD workstation
|
|
|
|
---
|
|
|
|
**End of Audit Report**
|
|
|
|
*This audit will be updated regularly as infrastructure changes are made.*
|
|
|
|
*For questions or clarifications, contact:*
|
|
- **Funky (OpenClaw Agent)** - Available in OpenClaw chat
|
|
- **Fred Book** - Infrastructure owner
|