All checks were successful
ci/woodpecker/push/woodpecker Pipeline was successful
New Structure: - 01-NETWORK-MAP.md - Network topology, IPs, Docker networks, services - 02-SERVICES-CRITICAL.md - DNS, Auth, Routing (P0/P1 services) - 03-SERVICES-OTHER.md - All non-critical services - 04-HARDWARE-INVENTORY.md - Physical devices and specs - 05-CHANGELOG.md - Major events only New Folders: - docs/archive/ - Legacy docs (read-only reference) - docs/wip/ - Planned changes and ideas - UPGRADE-2026-HARDWARE.md - N5 Air + N100 migration plan - GITOPS-CONTAINERS.md - Phase 2 container GitOps Changes: - Moved all 22 legacy docs to archive/ - Consolidated container IPs, physical map, and services into single network map - Extracted critical vs non-critical service classification - Simplified changelog to major events only Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
2.8 KiB
2.8 KiB
Agent Service Account Credentials
Created: 2026-01-22 Purpose: Read-only service account for Slurp'it network discovery and monitoring
⚠️ SECURITY NOTE: This file contains sensitive credentials. Ensure the repository has appropriate access controls.
Account Details
| Property | Value |
|---|---|
| Username | agent |
| Password | LOQWhsIzeGmWcsbO7dMI |
| SSH Key | Ed25519 (see below) |
Configured Devices
| Device | IP | SSH Port | Auth Method | Status |
|---|---|---|---|---|
| Unraid Server | 192.168.31.2 | 422 | SSH Key | ✅ Configured |
| MikroTik Router (hAP ax³) | 192.168.31.1 | 2222 | SSH Key | ✅ Configured |
| MikroTik AP (cAP ac) | 192.168.31.6 | 2222 | Password | ✅ Configured |
| MikroTik Switch (CSS326) | 192.168.31.9 | - | N/A | ⚠️ SwOS - No SSH |
SSH Keys
Private Key (/root/.ssh/agent_key on Unraid)
-----BEGIN OPENSSH PRIVATE KEY-----
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
QyNTUxOQAAACCoNicuNDnSBn5pcK+uFL2x6/TsIQ5NE0qr7JW3HRM3lAAAAJCM4urpjOLq
6QAAAAtzc2gtZWQyNTUxOQAAACCoNicuNDnSBn5pcK+uFL2x6/TsIQ5NE0qr7JW3HRM3lA
AAAECfei47vy1Gcg+zpr+8QGN/27rV2MMAPCL+MlKtt2G0sqg2Jy40OdIGfmlwr64UvbHr
9OwhDk0TSqvslbcdEzeUAAAADWFnZW50QHNsdXJwaXQ=
-----END OPENSSH PRIVATE KEY-----
Public Key
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKg2Jy40OdIGfmlwr64UvbHr9OwhDk0TSqvslbcdEzeU agent@slurpit
Permissions
Unraid
- Shell:
/bin/bash - Home:
/home/agent - Groups:
agent - SSH: Key-based auth
MikroTik Router & AP
- Group:
read(read-only access) - Router: SSH Key Auth
- AP: Password Auth
Slurp'it Vault Configuration
Add these credentials in Slurp'it Portal → Vault → Credentials:
For Unraid (Linux):
| Field | Value |
|---|---|
| Group | default |
| Username | agent |
| Password | LOQWhsIzeGmWcsbO7dMI |
| Device OS | linux |
| SSH Port | 422 |
| Comment | Unraid agent |
For MikroTik Router:
| Field | Value |
|---|---|
| Group | default |
| Username | agent |
| SSH Key | (paste private key above) |
| Device OS | mikrotik_routeros |
| Comment | MikroTik router agent |
For MikroTik AP:
| Field | Value |
|---|---|
| Group | default |
| Username | agent |
| Password | LOQWhsIzeGmWcsbO7dMI |
| Device OS | mikrotik_routeros |
| SSH Port | 2222 |
| Comment | MikroTik AP agent |
Testing Access
# Test Unraid SSH (key-based)
ssh -i /root/.ssh/agent_key -p 422 agent@192.168.31.2 'hostname'
# Test MikroTik Router SSH (key-based)
ssh -i /root/.ssh/agent_key -p 2222 agent@192.168.31.1 '/system identity print'
# Test MikroTik AP SSH (password-based)
ssh -p 2222 agent@192.168.31.6 '/system identity print'
# Password: LOQWhsIzeGmWcsbO7dMI