Files
infrastructure/docs/archive/AGENT-CREDENTIALS.md
XTRM-Unraid b250493d5a
All checks were successful
ci/woodpecker/push/woodpecker Pipeline was successful
Major documentation restructure - consolidated docs
New Structure:
- 01-NETWORK-MAP.md - Network topology, IPs, Docker networks, services
- 02-SERVICES-CRITICAL.md - DNS, Auth, Routing (P0/P1 services)
- 03-SERVICES-OTHER.md - All non-critical services
- 04-HARDWARE-INVENTORY.md - Physical devices and specs
- 05-CHANGELOG.md - Major events only

New Folders:
- docs/archive/ - Legacy docs (read-only reference)
- docs/wip/ - Planned changes and ideas
  - UPGRADE-2026-HARDWARE.md - N5 Air + N100 migration plan
  - GITOPS-CONTAINERS.md - Phase 2 container GitOps

Changes:
- Moved all 22 legacy docs to archive/
- Consolidated container IPs, physical map, and services into single network map
- Extracted critical vs non-critical service classification
- Simplified changelog to major events only

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
2026-01-25 11:17:33 +02:00

2.8 KiB

Agent Service Account Credentials

Created: 2026-01-22 Purpose: Read-only service account for Slurp'it network discovery and monitoring

⚠️ SECURITY NOTE: This file contains sensitive credentials. Ensure the repository has appropriate access controls.


Account Details

Property Value
Username agent
Password LOQWhsIzeGmWcsbO7dMI
SSH Key Ed25519 (see below)

Configured Devices

Device IP SSH Port Auth Method Status
Unraid Server 192.168.31.2 422 SSH Key Configured
MikroTik Router (hAP ax³) 192.168.31.1 2222 SSH Key Configured
MikroTik AP (cAP ac) 192.168.31.6 2222 Password Configured
MikroTik Switch (CSS326) 192.168.31.9 - N/A ⚠️ SwOS - No SSH

SSH Keys

Private Key (/root/.ssh/agent_key on Unraid)

-----BEGIN OPENSSH PRIVATE KEY-----
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
QyNTUxOQAAACCoNicuNDnSBn5pcK+uFL2x6/TsIQ5NE0qr7JW3HRM3lAAAAJCM4urpjOLq
6QAAAAtzc2gtZWQyNTUxOQAAACCoNicuNDnSBn5pcK+uFL2x6/TsIQ5NE0qr7JW3HRM3lA
AAAECfei47vy1Gcg+zpr+8QGN/27rV2MMAPCL+MlKtt2G0sqg2Jy40OdIGfmlwr64UvbHr
9OwhDk0TSqvslbcdEzeUAAAADWFnZW50QHNsdXJwaXQ=
-----END OPENSSH PRIVATE KEY-----

Public Key

ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKg2Jy40OdIGfmlwr64UvbHr9OwhDk0TSqvslbcdEzeU agent@slurpit

Permissions

Unraid

  • Shell: /bin/bash
  • Home: /home/agent
  • Groups: agent
  • SSH: Key-based auth

MikroTik Router & AP

  • Group: read (read-only access)
  • Router: SSH Key Auth
  • AP: Password Auth

Slurp'it Vault Configuration

Add these credentials in Slurp'it PortalVaultCredentials:

For Unraid (Linux):

Field Value
Group default
Username agent
Password LOQWhsIzeGmWcsbO7dMI
Device OS linux
SSH Port 422
Comment Unraid agent

For MikroTik Router:

Field Value
Group default
Username agent
SSH Key (paste private key above)
Device OS mikrotik_routeros
Comment MikroTik router agent

For MikroTik AP:

Field Value
Group default
Username agent
Password LOQWhsIzeGmWcsbO7dMI
Device OS mikrotik_routeros
SSH Port 2222
Comment MikroTik AP agent

Testing Access

# Test Unraid SSH (key-based)
ssh -i /root/.ssh/agent_key -p 422 agent@192.168.31.2 'hostname'

# Test MikroTik Router SSH (key-based)
ssh -i /root/.ssh/agent_key -p 2222 agent@192.168.31.1 '/system identity print'

# Test MikroTik AP SSH (password-based)
ssh -p 2222 agent@192.168.31.6 '/system identity print'
# Password: LOQWhsIzeGmWcsbO7dMI