Homelab configuration for the NixOS running on bare-metal hardware. We are using proxmox on top of NixOS as a virtualization platform and terraform to dynamicaly provision the VMs for the kubernetes clusters. Secrets management is done using Infisical secrets storage available in the cloud so we have a completely reporoducible infrastructure.
Installed NixOS on the bare-metal hardware.
Requirements:
- Installed NixOS on the bare-metal hardware
- Set up of your Infisical account and secrets storage
- Create a Infisical Machine Identity for your machine
- Add Environment Viewer Access to the machine identity
- Export the
INFISICAL_TOKEN
andINFISICAL_PROJECT_ID
environment variables for the machine identity and your project
# --plain flag will output only the token, so it can be fed to an environment variable. --silent will disable any update messages
export INFISICAL_TOKEN=$(infisical login --method=universal-auth --client-id=<identity-client-id> --client-secret=<identity-client-secret> --silent --plain) .
export INFISICAL_PROJECT_ID=<project-id>