And that HomeAssistant config, which you so carefully compiled, refers to each device by IP/DNS name, so youβd better make sure you recreate it consistently!
+
Enter phpIPAM. A tool designed to help home keeps as well as large organisations keep track of their IP (and VLAN, VRF, and AS number) allocations.
Additionally, create phpipam-backup.env, and populate with the following variables:
+
# For MariaDB/MySQL database
+MYSQL_ROOT_PASSWORD=imtoosecretformyshorts
+MYSQL_DATABASE=phpipam
+MYSQL_USER=phpipam
+MYSQL_PASSWORD=secret
+
+# For backup
+BACKUP_NUM_KEEP=7
+BACKUP_FREQUENCY=1d
+
Create nginx.conf
+
I usually protect my stacks using an oauth proxy container in front of the app. This protects me from either accidentally exposing a platform to the world, or having a insecure platform accessed and abused.
+
In the case of phpIPAM, the oauth_proxy creates an additional complexity, since it passes the βAuthorizationβ HTTP header to the phpIPAM container. phpIPAH then examines the header, determines that the provided username (my email address associated with my oauth provider) doesnβt match a local user account, and denies me access without the opportunity to retry.
+
The (dirty) solution Iβve come up with is to insert an Nginx instance in the path between the oauth_proxy and the phpIPAM container itself. Nginx can remove the authorization header, so that phpIPAM can prompt me to login with a web-based form.
+
Create /var/data/phpipam/nginx.conf as follows:
+
upstream app-upstream {
+ server app:80;
+}
+
+server {
+ listen 80;
+ server_name ~.;
+
+ # Just redirect everything to the upstream
+ # Yes, it's embarassing. We are just a mechanism to strip an AUTH header :(
+ location ^~ / {
+ proxy_pass http://app-upstream;
+ proxy_set_header Authorization "";
+ }
+
+}
+
Setup Docker Swarm
+
Create a docker swarm config file in docker-compose syntax (v3), something like this:
+
!!! tip I share (with my patreon patrons) a private βpremixβ git repository, which includes necessary docker-compose and env files for all published recipes. This means that patrons can launch any recipe with just a git pull and a docker stack deploy π
+
version: '3'
+
+services:
+
+ db:
+ image: mariadb:10
+ env_file: /var/data/config/phpipam/phpipam.env
+ networks:
+ - internal
+ volumes:
+ - /var/data/runtime/phpipam/db:/var/lib/mysql
+
+ proxy:
+ image: funkypenguin/oauth2_proxy
+ env_file: /var/data/config/phpipam/phpipam.env
+ networks:
+ - internal
+ - traefik_public
+ deploy:
+ labels:
+ - traefik.frontend.rule=Host:phpipam.example.com
+ - traefik.docker.network=traefik_public
+ - traefik.port=4180
+ volumes:
+ - /var/data/config/phpipam/authenticated-emails.txt:/authenticated-emails.txt
+ command: |
+ -cookie-secure=false
+ -upstream=http://nginx
+ -redirect-url=https://phpipam.example.com
+ -http-address=http://0.0.0.0:4180
+ -email-domain=example.com
+ -provider=github
+ -authenticated-emails-file=/authenticated-emails.txt
+
+ # Wait, what? Why do we have an oauth_proxy _and_ an nginx frontend for a simple webapp?
+ # Well, it's a long story. Basically, the phpipam container sees the "auth" headers passed by the
+ # oauth_proxy, and decides to use these exclusively to authenticate users. So no web-based login form, just "access denied"
+ # To work around this, we add nginx reverse proxy to the mix. A PITA, but an easy way to solve without altering the PHPIPAM code
+ nginx:
+ image: nginx:latest
+ networks:
+ - internal
+ volumes:
+ - /var/data/phpipam/nginx.conf:/etc/nginx/conf.d/default.conf:ro
+
+ app:
+ image: pierrecdn/phpipam
+ env_file: /var/data/config/phpipam/phpipam.env
+ networks:
+ - internal
+
+ db-backup:
+ image: mariadb:10
+ env_file: /var/data/config/phpipam/phpipam.env
+ volumes:
+ - /var/data/phpipam/database-dump:/dump
+ - /etc/localtime:/etc/localtime:ro
+ entrypoint: |
+ bash -c 'bash -s <<EOF
+ trap "break;exit" SIGHUP SIGINT SIGTERM
+ sleep 2m
+ while /bin/true; do
+ mysqldump -h db --all-databases | gzip -c > /dump/dump_\`date +%d-%m-%Y"_"%H_%M_%S\`.sql.gz
+ (ls -t /dump/dump*.sql.gz|head -n $$BACKUP_NUM_KEEP;ls /dump/dump*.sql.gz)|sort|uniq -u|xargs rm -- {}
+ sleep $$BACKUP_FREQUENCY
+ done
+ EOF'
+ networks:
+ - internal
+
+networks:
+ traefik_public:
+ external: true
+ internal:
+ driver: overlay
+ ipam:
+ config:
+ - subnet: 172.16.47.0/24
+
!!! note Setup unique static subnets for every stack you deploy. This avoids IP/gateway conflicts which can otherwise occur when youβre creating/removing stacks a lot. See my list here.
+
Serving
+
Launch phpIPAM stack
+
Launch the phpIPAM stack by running docker stack deploy phpipam -c <path -to-docker-compose.yml>
+
Log into your new instance at https://YOUR-FQDN, and follow the on-screen prompts to set your first user/password.
+
Chefβs Notes
+
+
If you wanted to expose the phpIPAM UI directly, you could remove the oauth2_proxy and the nginx services from the design, and move the traefik_public-related labels directly to the phpipam container. Youβd also need to add the traefik_public network to the phpipam container.
+
+
Tip your waiter (support me) π
+
Did you receive excellent service? Want to make your waiter happy? (..and support development of current and future recipes!) See the support page for (free or paid) ways to say thank you! π