Homelab - setup main machine#
Introduction#
When starting my homelab journey, I needed a main machine to manage all devices and services in my network. Many homelab enthusiasts typically choose Linux for this purpose. However, my primary computer runs Windows 11, so I decided to use WSL2 with an Ubuntu distribution to fulfill this role.
Installing WSL2#
I followed the instructions provided in the official documentation to install WSL2 and had Ubuntu up and running quickly.
Network configuration#
By default, WSL2 uses NAT
networking mode, assigning dynamic IP addresses, which prevents access to other devices in the local network, like routers and Raspberry Pis. To solve this, I switched WSL2 to mirrored
network mode via the WSL Settings
. After shutting down (wsl --shutdown
) and restarting WSL2 (wsl
), I could successfully ping other devices in my network:
ping router.local
ping rpi3.local
Using VS Code Remote - WSL#
I found the easiest way to interact with files inside WSL2 was to use the VS Code Remote - WSL extension. Installing this extension allowed me to seamlessly edit files inside the Ubuntu distribution directly through VS Code’s interface.
Installing Ansible#
To automate the configuration of remote devices, I chose Ansible. Following the instructions from Ansible’s installation page, I created a script called bootstrap_main_machine.sh
to install both pipx
and ansible
:
# Install pipx - see https://pipx.pypa.io/stable/
sudo apt update
sudo apt install pipx
pipx ensurepath
# Install ansible - see https://docs.ansible.com/ansible/latest/installation_guide/intro_installation.html
pipx install --include-deps ansible
ansible --version
Creating the Ansible inventory#
I created an Ansible inventory file named inventory.yml
within a new directory ~/ansible
. It lists the devices I want to manage:
all:
hosts:
rpi3test.local:
ansible_user: pi
I initially tested my Ansible setup using the ping module:
ansible -i ~/ansible/inventory.yml rpi3test.local -m ping
This attempt failed, showing the following SSH error:
rpi3test.local | UNREACHABLE! => {
"changed": false,
"msg": "Failed to connect to the host via ssh: pi@rpi3test.local: Permission denied (publickey,password).",
"unreachable": true
}
Since I wasn’t using SSH keys yet, I tried providing the password explicitly with the --ask-pass
option:
ansible -i ~/ansible/inventory.yml rpi3test.local -m ping --ask-pass
However, this still didn’t work due to a missing package:
rpi3test.local | FAILED! => {
"msg": "to use the 'ssh' connection type with passwords or pkcs11_provider, you must install the sshpass program"
}
To resolve this, I installed the required package:
sudo apt install sshpass
After installing sshpass
, running the ping command with --ask-pass
succeeded:
rpi3test.local | SUCCESS => {
"ansible_facts": {
"discovered_interpreter_python": "/usr/bin/python3.11"
},
"changed": false,
"ping": "pong"
}
Important
It is not recommended to authenticate using passwords because this opens the possibility for brute force attacks. The best practice is to use SSH keys for authentication. We will cover this in the next section.
Creating SSH keys#
To enhance security, I generated SSH keys specifically for Ansible connections using the ED25519
algorithm:
ssh-keygen -t ed25519 -f ~/.ssh/ansible
Next, I wrote an Ansible playbook to automate the process of copying SSH keys to the devices and disabling password authentication:
---
- name: Setup authentication
hosts: all
become: yes
tasks:
- name: Create .ssh directory if it doesn't exist
file:
path: /home/{{ ansible_user }}/.ssh
state: directory
mode: "0700"
owner: "{{ ansible_user }}"
group: "{{ ansible_user }}"
- name: Copy public key from local .ssh directory
copy:
src: "~/.ssh/ansible.pub"
dest: /home/{{ ansible_user }}/.ssh/authorized_keys
mode: "0600"
owner: "{{ ansible_user }}"
group: "{{ ansible_user }}"
- name: Ensure password authentication is disabled in SSHD
lineinfile:
path: /etc/ssh/sshd_config
regexp: "^PasswordAuthentication"
line: "PasswordAuthentication no"
state: present
notify:
- Restart SSHD
- name: Lock password for {{ ansible_user }}
user:
name: "{{ ansible_user }}"
password_lock: yes
handlers:
- name: Restart SSHD
service:
name: sshd
state: restarted