User Details
- User Since
- Jan 29 2026, 16:43 (9 w, 13 h)
- Availability
- Available
Wed, Apr 1
Tue, Mar 31
Mon, Mar 30
removed white lline
repair branch
Wed, Mar 25
Configuration deployed and running on router-002/router-003 and WindRiver
Mon, Mar 23
removed canonical ipv4 from network.sls and corrected node function
better variable name
removed for loop
testing list format for routers
added router parameter
Light modifications
updated for loop syntax
Added router-002
Removed cloudhugger
Fri, Mar 20
Thu, Mar 19
Wed, Mar 18
The tunnel from router-001 to cloudhugger has been destroyed.
improved indentation
Added IP canonical IP addresses to router-002 and router-003
testing
- modified network.sls
Tue, Mar 17
Mon, Mar 16
using for loop to create GRE tunnel on router-002 and 003
Fri, Mar 13
Cleaning diff
- Roles: update network pillar
- Modified to create tunnels from router-003
changed syntax
public address
corrected syntax
Thu, Mar 12
ALigned ip adresses
- Added private_ipv4 to be able to display on the MOTD files
Using correct parameters to display IPs
Wed, Mar 11
Now using node.resolve_network
Fixed spaced
- Add Nginx directive to accept files less 100M
Added more details in README.md
Tue, Mar 10
Added software.sls and modified init.sls
Improved configuration files and headers
Updated config files to use node.resolve_gre_tunnels
Fri, Mar 6
Thu, Mar 5
Modified Ysul IP adress in network.sls
Added service.sls file
Updated strongswan config files and using a for loop for a more readable code
Wed, Mar 4
More detailed README.md
Mar 3 2026
- Added an init.sls pour strongswan
resolved here
Ref T1695
Mar 2 2026
$ sudo salt complector state.sls_id salt-node-cloudhugger roles/vault/policies test=True complector: ---------- ID: salt-node-cloudhugger Function: vault.policy_present Result: None Comment: Policy would be changed Started: 18:09:21.668208 Duration: 841.275 ms Changes: ---------- salt-node-cloudhugger: ---------- change: --- +++ @@ -10,3 +10,7 @@ path "ops/data/secrets/nasqueron/opensearch/infra-logs/internal_users/dashboards" { capabilities = [ "read" ] } + +path "ops/data/secrets/network/ipsec/key" { + capabilities = [ "read" ] +}