Files
infrastructure/docs/archive/AGENT-CREDENTIALS.md
XTRM-Unraid b250493d5a
All checks were successful
ci/woodpecker/push/woodpecker Pipeline was successful
Major documentation restructure - consolidated docs
New Structure:
- 01-NETWORK-MAP.md - Network topology, IPs, Docker networks, services
- 02-SERVICES-CRITICAL.md - DNS, Auth, Routing (P0/P1 services)
- 03-SERVICES-OTHER.md - All non-critical services
- 04-HARDWARE-INVENTORY.md - Physical devices and specs
- 05-CHANGELOG.md - Major events only

New Folders:
- docs/archive/ - Legacy docs (read-only reference)
- docs/wip/ - Planned changes and ideas
  - UPGRADE-2026-HARDWARE.md - N5 Air + N100 migration plan
  - GITOPS-CONTAINERS.md - Phase 2 container GitOps

Changes:
- Moved all 22 legacy docs to archive/
- Consolidated container IPs, physical map, and services into single network map
- Extracted critical vs non-critical service classification
- Simplified changelog to major events only

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
2026-01-25 11:17:33 +02:00

116 lines
2.8 KiB
Markdown

# Agent Service Account Credentials
**Created:** 2026-01-22
**Purpose:** Read-only service account for Slurp'it network discovery and monitoring
> ⚠️ **SECURITY NOTE:** This file contains sensitive credentials. Ensure the repository has appropriate access controls.
---
## Account Details
| Property | Value |
|----------|-------|
| Username | `agent` |
| Password | `LOQWhsIzeGmWcsbO7dMI` |
| SSH Key | Ed25519 (see below) |
---
## Configured Devices
| Device | IP | SSH Port | Auth Method | Status |
|--------|-----|----------|-------------|--------|
| Unraid Server | 192.168.31.2 | 422 | SSH Key | ✅ Configured |
| MikroTik Router (hAP ax³) | 192.168.31.1 | 2222 | SSH Key | ✅ Configured |
| MikroTik AP (cAP ac) | 192.168.31.6 | 2222 | Password | ✅ Configured |
| MikroTik Switch (CSS326) | 192.168.31.9 | - | N/A | ⚠️ SwOS - No SSH |
---
## SSH Keys
### Private Key (`/root/.ssh/agent_key` on Unraid)
```
-----BEGIN OPENSSH PRIVATE KEY-----
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
QyNTUxOQAAACCoNicuNDnSBn5pcK+uFL2x6/TsIQ5NE0qr7JW3HRM3lAAAAJCM4urpjOLq
6QAAAAtzc2gtZWQyNTUxOQAAACCoNicuNDnSBn5pcK+uFL2x6/TsIQ5NE0qr7JW3HRM3lA
AAAECfei47vy1Gcg+zpr+8QGN/27rV2MMAPCL+MlKtt2G0sqg2Jy40OdIGfmlwr64UvbHr
9OwhDk0TSqvslbcdEzeUAAAADWFnZW50QHNsdXJwaXQ=
-----END OPENSSH PRIVATE KEY-----
```
### Public Key
```
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKg2Jy40OdIGfmlwr64UvbHr9OwhDk0TSqvslbcdEzeU agent@slurpit
```
---
## Permissions
### Unraid
- Shell: `/bin/bash`
- Home: `/home/agent`
- Groups: `agent`
- SSH: Key-based auth
### MikroTik Router & AP
- Group: `read` (read-only access)
- Router: SSH Key Auth
- AP: Password Auth
---
## Slurp'it Vault Configuration
Add these credentials in **Slurp'it Portal****Vault****Credentials**:
### For Unraid (Linux):
| Field | Value |
|-------|-------|
| Group | default |
| Username | agent |
| Password | LOQWhsIzeGmWcsbO7dMI |
| Device OS | linux |
| SSH Port | 422 |
| Comment | Unraid agent |
### For MikroTik Router:
| Field | Value |
|-------|-------|
| Group | default |
| Username | agent |
| SSH Key | (paste private key above) |
| Device OS | mikrotik_routeros |
| Comment | MikroTik router agent |
### For MikroTik AP:
| Field | Value |
|-------|-------|
| Group | default |
| Username | agent |
| Password | LOQWhsIzeGmWcsbO7dMI |
| Device OS | mikrotik_routeros |
| SSH Port | 2222 |
| Comment | MikroTik AP agent |
---
## Testing Access
```bash
# Test Unraid SSH (key-based)
ssh -i /root/.ssh/agent_key -p 422 agent@192.168.31.2 'hostname'
# Test MikroTik Router SSH (key-based)
ssh -i /root/.ssh/agent_key -p 2222 agent@192.168.31.1 '/system identity print'
# Test MikroTik AP SSH (password-based)
ssh -p 2222 agent@192.168.31.6 '/system identity print'
# Password: LOQWhsIzeGmWcsbO7dMI
```