• Recent
    • Unsolved
    • Tags
    • Popular
    • Users
    • Groups
    • Search
    • Register
    • Login

    Remote Storage Server

    Scheduled Pinned Locked Moved
    General
    3
    16
    4.7k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      sourceminer
      last edited by

      Thanks for the responses guys.

      So yes I know about the installer and selecting S. The reason for keeping it Central is because we do Central IT Services for several customers. Having a Centrally managed Deployment solution is better for standards sake. We have also used a solution called Persystent by Utopic, however seems we find more bugs in it than the 10’s of thousands of deployments they have 😉 So I have looked into doing a hybrid model Fog and Persystent.

      The Goal to have a <12 Min resolution time on the help desk. With Tools like Fog and Persystent the goal can become reality, if kinks can be handled accordingly.

      1 Reply Last reply Reply Quote 0
      • S
        sourceminer @Wayne Workman
        last edited by

        @Wayne-Workman With this OpenVPN Router what would you think of running this on the FOG server itself?

        Of which this would / could just allow the remote machine and the Fog Server to communicate with one another only.

        Wayne WorkmanW 1 Reply Last reply Reply Quote 0
        • Wayne WorkmanW
          Wayne Workman @sourceminer
          last edited by

          @sourceminer said in Remote Storage Server:

          With this OpenVPN Router what would you think of running this on the FOG server itself?

          My router project isn’t designed for what you’re thinking exactly. My project reliably routes my home traffic transparently straight to PIA - this secures all my internet traffic from being analyzed or monitored by my ISP. But it’s not ready for production like what you need and lacks features & support & community.

          'What you would need is a setup where the client is the endpoint only, and not a router. Also, you would need to work out routes so that IP / port destined to the main fog server would go through the VPN tunnel - and not the internet. This is simple enough, lots of stuff on the internet about a single NIC system routing properly between a tunnel and the open internet:
          https://openvpn.net/archive/openvpn-users/2003-07/msg00032.html
          https://wiki.debian.org/OpenVPN
          https://www.digitalocean.com/community/tutorials/how-to-setup-and-configure-an-openvpn-server-on-centos-7

          The main fog server would need to run a server configuration of OpenVPN - server in the sense that many clients establish VPN tunnels with it. There would need to be a subnet just for this - like a 255.255.255.0 class C subnet.

          On the headquarters side you would need a pretty beefy box - because there is encryption overhead with being the server side of OpenVPN. A lot of chatter would be going over the VPN if you’re using the FOG Client.

          I think this is doable.

          Please help us build the FOG community with everyone involved. It's not just about coding - way more we need people to test things, update documentation and most importantly work on uniting the community of people enjoying and working on FOG!
          Daily Clean Installation Results:
          https://fogtesting.fogproject.us/
          FOG Reporting:
          https://fog-external-reporting-results.fogproject.us/

          1 Reply Last reply Reply Quote 0
          • Wayne WorkmanW
            Wayne Workman
            last edited by

            I think I can modify the FOG Installer to setup OpenVPN back to a main server - and modify the Main server installer to setup an OpenVPN server.

            FOG main server already has SSL certs present.

            @Tom-Elliott I’m going to try to do this.

            Please help us build the FOG community with everyone involved. It's not just about coding - way more we need people to test things, update documentation and most importantly work on uniting the community of people enjoying and working on FOG!
            Daily Clean Installation Results:
            https://fogtesting.fogproject.us/
            FOG Reporting:
            https://fog-external-reporting-results.fogproject.us/

            S 1 Reply Last reply Reply Quote 0
            • Wayne WorkmanW
              Wayne Workman
              last edited by Wayne Workman

              Looking more into this - it’s very doable. I’m going to mess around for a while and get a P.O.C. going between two remote FOG Servers.

              Please help us build the FOG community with everyone involved. It's not just about coding - way more we need people to test things, update documentation and most importantly work on uniting the community of people enjoying and working on FOG!
              Daily Clean Installation Results:
              https://fogtesting.fogproject.us/
              FOG Reporting:
              https://fog-external-reporting-results.fogproject.us/

              1 Reply Last reply Reply Quote 0
              • S
                sourceminer @Wayne Workman
                last edited by

                @Wayne-Workman This would be HUGE!! Perfect. Then its all just tied in and working with a simple install.

                1 Reply Last reply Reply Quote 0
                • george1421G
                  george1421 Moderator
                  last edited by george1421

                  I think we need to step back and do a sanity check on what you really need here.

                  I understand the whole centrally manged (MSP) perspective.

                  I think you need to document what exactly you hope to achieve from this solution. I am intimately familiar with Openvpn, FOG, and the concepts involved here.

                  Unless you are going to establish a full time vpn connection to each of these remote locations you would be better served if you had a full fog server at each location. By placing a full fog server at each location you can take advantage of all of fog’s capabilities (more than just pushing images to client computers). The fog client must be able to reach the master FOG server to check in, change system names, reboot on demand, and receive instructions from the FOG server. Storage nodes can’t do this today. If they could they would need a live connection back to the FOG server because they don’t have a local database installed, only a full fog server has a database.

                  So then I have to ask the question, do you / will you create master OS images at your HQ for these remote locations? If so you will need to have vpn setup so that the fog replicator can do it replication. This replicator runs continuously, so you may need the vpn established continuously. Its possible to have a cron job open the vpn tunnel and then start the replicator for after hours image replication. You may be better served with just moving the files to the remote location on flash drives and ignoring the bits around replication. How often will your images change really? Is it worth the effort?

                  So what it really comes down to (if there is a fog server at each location) you would just need remote access to the fog web gui at the remote location to issue capture and deploy commands to the remote clients.

                  I can’t say what the right answer is for your final solution. I’m not saying yes or no here either. The only point I’m raising here is to think about what you really want to accomplish here, how much effort its going to take, and how long will it take to pay back the effort put into the solution.

                  Can you do this with FOG and openvpn, probably. If you go this route you will want to run the openvpn software on all fog servers/storage nodes and then have the clients setup the portforwarding on their internet routers to forward the openvpn port number direct to your FOG hardware at their location. Since you will not be routing traffic beyond the openvpn software at each end you should not have to worry about (near and far end) IP range address conflicts with the openvpn.

                  Please help us build the FOG community with everyone involved. It's not just about coding - way more we need people to test things, update documentation and most importantly work on uniting the community of people enjoying and working on FOG!

                  S 1 Reply Last reply Reply Quote 2
                  • Wayne WorkmanW
                    Wayne Workman
                    last edited by Wayne Workman

                    George has legitimate points - you really should consider them. One single 20GB image - which is a very lean image - could take days to replicate over a slow link. I was thinking you already thought about this before you posted here - but you should think through it really.

                    I’m working on the OpenVPN stuff anyways because I think it would be a nice add-on piece to FOG - because communications between storage nodes and the main server are currently totally unsecured. We really need something here for those that want it - and that something would be awesome if Tom (senior dev) didn’t have to re-code a ton of stuff. Having an Add-On that configures OpenVPN would solve this.

                    Please help us build the FOG community with everyone involved. It's not just about coding - way more we need people to test things, update documentation and most importantly work on uniting the community of people enjoying and working on FOG!
                    Daily Clean Installation Results:
                    https://fogtesting.fogproject.us/
                    FOG Reporting:
                    https://fog-external-reporting-results.fogproject.us/

                    1 Reply Last reply Reply Quote 0
                    • S
                      sourceminer @george1421
                      last edited by

                      @george1421 Totally agree with taking a step back. To answer your questions.

                      We do at present create master images for our clients in our Move Add Change Room.
                      Machines get delivered to our clients then imaged. We have an entire department dedicated to just maintaining images and update software updates. So syncing down the the client is the preferred method.

                      Correct on the statement about just needing Port 443 access to FOG UI.

                      As it relates to the community, the benefit can be 2 fold… First no dependency on lan communication (Pre Existing VPN Tunnels or MPLS Links) The entire solution becomes more secure as communication happens though an SSL tunnel. Allows for disconnected branches and minimal configuration to get an entire fog solution up and running. Imagine From download to install only taking an hour with multiple locations configured.

                      1 Reply Last reply Reply Quote 0
                      • Wayne WorkmanW
                        Wayne Workman
                        last edited by

                        I’m nowhere close to done - I’ve barely even started really. But I’m pushing stuff to here: https://github.com/wayneworkman/fog-community-scripts/tree/master/FogOpenVPN

                        Please help us build the FOG community with everyone involved. It's not just about coding - way more we need people to test things, update documentation and most importantly work on uniting the community of people enjoying and working on FOG!
                        Daily Clean Installation Results:
                        https://fogtesting.fogproject.us/
                        FOG Reporting:
                        https://fog-external-reporting-results.fogproject.us/

                        1 Reply Last reply Reply Quote 0
                        • S
                          sourceminer
                          last edited by

                          Just curious where this has gone… I keep going back to the idea of using Fog but without some sort of replication over a secure channel (non managed VPN’s) but Auto OpenVPN connected encrypted channels. Its not a real viable solution IMO for MSP’s.

                          1 Reply Last reply Reply Quote 0
                          • Wayne WorkmanW
                            Wayne Workman
                            last edited by

                            I’ve not done any more work on this. The best solution is still to have permanent tunnels from site to site via a routing appliance like a Cisco router or checkpoint router or PFSense router or some other router solution.

                            Please help us build the FOG community with everyone involved. It's not just about coding - way more we need people to test things, update documentation and most importantly work on uniting the community of people enjoying and working on FOG!
                            Daily Clean Installation Results:
                            https://fogtesting.fogproject.us/
                            FOG Reporting:
                            https://fog-external-reporting-results.fogproject.us/

                            1 Reply Last reply Reply Quote 0
                            • 1 / 1
                            • First post
                              Last post

                            147

                            Online

                            12.1k

                            Users

                            17.3k

                            Topics

                            155.3k

                            Posts
                            Copyright © 2012-2024 FOG Project