Files
infra-automation/docs
ansible 2ef8dfd6ed Add comprehensive SSH jump host / bastion documentation
Document SSH ProxyJump configuration for accessing KVM guest VMs
through grokbox hypervisor as a bastion/jump host.

Documentation includes:
- Architecture diagram with network topology
- Jump host concept and benefits explanation
- Implementation details (group_vars, hosts.yml, SSH config)
- Connection flow and SSH handshake details
- Usage examples (Ansible, manual SSH, SCP)
- Comprehensive troubleshooting guide
- Security considerations and hardening recommendations
- Performance optimization (ControlMaster, connection pooling)
- Monitoring and logging procedures
- Alternative access patterns
- Testing and validation checklist

Current Configuration:
- Jump Host: grokbox (grok.home.serneels.xyz)
- Guest VMs: pihole, mymx, derp (192.168.122.0/24)
- Method: SSH ProxyJump with ControlMaster multiplexing
- Group vars configured in: group_vars/kvm_guests.yml
- Per-host settings in: hosts.yml

Key Features:
 Automatic ProxyJump for all kvm_guests group members
 SSH connection multiplexing for performance
 Keepalive configuration to prevent timeouts
 Security-first approach with audit logging
 Tested and working (pihole ping successful)

Benefits:
- Centralized access control through single entry point
- Guest VMs remain on private network (not exposed)
- Reduced attack surface
- Simplified network architecture
- Comprehensive audit trail

Related Files:
- inventories/development/group_vars/kvm_guests.yml (config)
- inventories/development/hosts.yml (host definitions)
- ansible.cfg (global SSH settings)

This completes the network access pattern documentation
required for multi-tier infrastructure access.

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-11-11 02:00:45 +01:00
..
2025-11-10 22:52:03 +01:00