====== Host006 ====== ===== Purpose ===== ''host006.hackeriet.no'' is a Proxmox VE hypervisor in the ''klynge001'' cluster. For inventory details, use the NetBox/IPAM entry ''host006'' (device ID ''75''). NetBox is the source of truth for device model, rack/location, cabling, IP assignments, tenant, and current inventory state. ===== Emergency Access ===== Normal access: * ''ssh root@host006.hackeriet.no'' * Proxmox web UI: ''https://host006.hackeriet.no:8006/'' or ''https://10.10.50.26:8006/'' Access notes: * Proxmox access requires Hackeriet VPN/internal connectivity. * The Proxmox HTTPS certificate may have issues; browser/curl certificate warnings can be expected until fixed. * If DNS or public routing is confusing, NetBox currently documents the management address as ''10.10.50.26/24''. ===== Credentials ===== Do not paste secrets into the wiki. Relevant ''hackeriet/pass'' entries: * ''root@host006.hackeriet.no.gpg'' * ''host006-backup-age-key.gpg'' Keep decrypted values out of the wiki. ===== Operating System ===== Observed over SSH on 2026-05-20: * OS: ''Debian GNU/Linux 12 (bookworm)'' * Kernel: ''6.8.12-9-pve'' * Proxmox VE: ''pve-manager/8.3.5'' Treat this as emergency orientation only. Live state may differ. ===== Cluster ===== Observed over SSH on 2026-05-20: * Cluster: ''klynge001'' * Local node IP: ''10.10.50.26'' * Quorum: yes * Observed members: ''10.10.50.26'' and ''10.10.50.27'' * Expected votes: ''3'' * Total votes observed: ''2'' If cluster state matters during an incident, verify it live with ''pvecm status''. ===== Network ===== NetBox and LibreNMS currently agree on the physical uplink: * NetBox interface: ''host006'' / ''LAN'' * NetBox cable: ''#38'' * Switch: ''pit-sw'' * Switch port: ''GigabitEthernet0/30'' Observed host-level bridges include: * ''vmbr50'' for infra hosts / management, address ''10.10.50.26/24'' * ''vmbr130'' for server network / public-facing VM traffic * ''vmbr3'' for Hackeriet wired network Do not treat this page as the source of truth for network inventory. Use NetBox for that. ===== Host-Level Backups ===== The host has a Proxmox ''vzdump'' backup job named ''backup-5b87a3ab-9074''. Observed configuration on 2026-05-20: * Schedule: ''sun 03:00'' * Storage: ''local'' * Mode: ''snapshot'' * Compression: ''zstd'' * Retention: ''keep-last=1'' * Mail: failure notifications to ''backupmail@hackeriet.no'' Recent observed failure pattern: * Some backups fail with ''vma_queue_write: write error - Broken pipe''. * Root filesystem and local Proxmox storage were nearly full during observation. Do not delete backups or ISOs without operator approval. ===== Known Issues To Check ===== * Root filesystem pressure: ''/'' was observed at 94% used on 2026-05-20. * Local Proxmox storage: ''local'' was observed at 88.33% used on 2026-05-20. * Failed service observed: ''munin-node.service''. * ACME renewal failures for ''host006.hackeriet.no'' were seen in Proxmox logs/config during earlier investigation. ===== Useful Paths ===== Paths commonly useful during incident response: * ''/etc/pve/jobs.cfg'' * ''/etc/vzdump.conf'' * ''/var/log/vzdump'' * ''/var/lib/vz/dump'' * ''/var/lib/vz/template/iso'' * ''/etc/network/interfaces'' * ''/etc/pve/nodes/host006/config'' ===== Checks During Incidents ===== Basic host checks: hostname -f pveversion pvecm status systemctl --failed df -h -x tmpfs -x devtmpfs pvesm status ip -br addr show scope global Backup checks: sed -n '1,220p' /etc/pve/jobs.cfg sed -n '1,220p' /etc/vzdump.conf find /var/log/vzdump -maxdepth 1 -type f -printf '%TY-%Tm-%Td %TH:%TM %p\n' | sort | tail -20 find /var/lib/vz/dump -maxdepth 1 -type f -printf '%TY-%Tm-%Td %TH:%TM %10s %f\n' | sort Service checks: systemctl status pve-cluster pvedaemon pveproxy pvestatd pvescheduler systemctl status pve-firewall proxmox-firewall corosync systemctl status munin-node journalctl -u munin-node --since "1 hour ago"