All checks were successful
ci/woodpecker/push/woodpecker Pipeline was successful
116 lines
2.8 KiB
Markdown
116 lines
2.8 KiB
Markdown
# Agent Service Account Credentials
|
|
|
|
**Created:** 2026-01-22
|
|
**Purpose:** Read-only service account for Slurp'it network discovery and monitoring
|
|
|
|
> ⚠️ **SECURITY NOTE:** This file contains sensitive credentials. Ensure the repository has appropriate access controls.
|
|
|
|
---
|
|
|
|
## Account Details
|
|
|
|
| Property | Value |
|
|
|----------|-------|
|
|
| Username | `agent` |
|
|
| Password | `LOQWhsIzeGmWcsbO7dMI` |
|
|
| SSH Key | Ed25519 (see below) |
|
|
|
|
---
|
|
|
|
## Configured Devices
|
|
|
|
| Device | IP | SSH Port | Auth Method | Status |
|
|
|--------|-----|----------|-------------|--------|
|
|
| Unraid Server | 192.168.31.2 | 422 | SSH Key | ✅ Configured |
|
|
| MikroTik Router (hAP ax³) | 192.168.31.1 | 2222 | SSH Key | ✅ Configured |
|
|
| MikroTik AP (cAP ac) | 192.168.31.6 | 2222 | Password | ✅ Configured |
|
|
| MikroTik Switch (CSS326) | 192.168.31.9 | - | N/A | ⚠️ SwOS - No SSH |
|
|
|
|
---
|
|
|
|
## SSH Keys
|
|
|
|
### Private Key (`/root/.ssh/agent_key` on Unraid)
|
|
|
|
```
|
|
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
QyNTUxOQAAACCoNicuNDnSBn5pcK+uFL2x6/TsIQ5NE0qr7JW3HRM3lAAAAJCM4urpjOLq
|
|
6QAAAAtzc2gtZWQyNTUxOQAAACCoNicuNDnSBn5pcK+uFL2x6/TsIQ5NE0qr7JW3HRM3lA
|
|
AAAECfei47vy1Gcg+zpr+8QGN/27rV2MMAPCL+MlKtt2G0sqg2Jy40OdIGfmlwr64UvbHr
|
|
9OwhDk0TSqvslbcdEzeUAAAADWFnZW50QHNsdXJwaXQ=
|
|
-----END OPENSSH PRIVATE KEY-----
|
|
```
|
|
|
|
### Public Key
|
|
|
|
```
|
|
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKg2Jy40OdIGfmlwr64UvbHr9OwhDk0TSqvslbcdEzeU agent@slurpit
|
|
```
|
|
|
|
---
|
|
|
|
## Permissions
|
|
|
|
### Unraid
|
|
- Shell: `/bin/bash`
|
|
- Home: `/home/agent`
|
|
- Groups: `agent`
|
|
- SSH: Key-based auth
|
|
|
|
### MikroTik Router & AP
|
|
- Group: `read` (read-only access)
|
|
- Router: SSH Key Auth
|
|
- AP: Password Auth
|
|
|
|
---
|
|
|
|
## Slurp'it Vault Configuration
|
|
|
|
Add these credentials in **Slurp'it Portal** → **Vault** → **Credentials**:
|
|
|
|
### For Unraid (Linux):
|
|
| Field | Value |
|
|
|-------|-------|
|
|
| Group | default |
|
|
| Username | agent |
|
|
| Password | LOQWhsIzeGmWcsbO7dMI |
|
|
| Device OS | linux |
|
|
| SSH Port | 422 |
|
|
| Comment | Unraid agent |
|
|
|
|
### For MikroTik Router:
|
|
| Field | Value |
|
|
|-------|-------|
|
|
| Group | default |
|
|
| Username | agent |
|
|
| SSH Key | (paste private key above) |
|
|
| Device OS | mikrotik_routeros |
|
|
| Comment | MikroTik router agent |
|
|
|
|
### For MikroTik AP:
|
|
| Field | Value |
|
|
|-------|-------|
|
|
| Group | default |
|
|
| Username | agent |
|
|
| Password | LOQWhsIzeGmWcsbO7dMI |
|
|
| Device OS | mikrotik_routeros |
|
|
| SSH Port | 2222 |
|
|
| Comment | MikroTik AP agent |
|
|
|
|
---
|
|
|
|
## Testing Access
|
|
|
|
```bash
|
|
# Test Unraid SSH (key-based)
|
|
ssh -i /root/.ssh/agent_key -p 422 agent@192.168.31.2 'hostname'
|
|
|
|
# Test MikroTik Router SSH (key-based)
|
|
ssh -i /root/.ssh/agent_key -p 2222 agent@192.168.31.1 '/system identity print'
|
|
|
|
# Test MikroTik AP SSH (password-based)
|
|
ssh -p 2222 agent@192.168.31.6 '/system identity print'
|
|
# Password: LOQWhsIzeGmWcsbO7dMI
|
|
```
|