mirror of
https://github.com/kevinveenbirkenbach/computer-playbook.git
synced 2025-04-22 16:02:24 +02:00
Compare commits
2 Commits
7379006327
...
cf44cb59b3
Author | SHA1 | Date | |
---|---|---|---|
cf44cb59b3 | |||
9e73218535 |
58
docs/ARCHITECTURE.md
Normal file
58
docs/ARCHITECTURE.md
Normal file
@ -0,0 +1,58 @@
|
||||
# CyMaIS Architecture Overview
|
||||
|
||||
## Introduction
|
||||
|
||||
CyMaIS (Cyber Master Infrastructure Solution) is a modular, open-source IT infrastructure automation platform designed to simplify the deployment, management, and security of self-hosted environments.
|
||||
|
||||
It provides a flexible, scalable, and secure architecture based on modern [DevOps](https://en.wikipedia.org/wiki/DevOps) principles, leveraging technologies like [Ansible](https://en.wikipedia.org/wiki/Ansible_(software)), [Docker](https://en.wikipedia.org/wiki/Docker_(software)), and [Infrastructure as Code (IaC)](https://en.wikipedia.org/wiki/Infrastructure_as_code).
|
||||
|
||||
An additional optional security layer allows full server encryption during installation using [LUKS](https://en.wikipedia.org/wiki/Linux_Unified_Key_Setup) based on this solution:
|
||||
https://github.com/kevinveenbirkenbach/hetzner-arch-luks
|
||||
|
||||
---
|
||||
|
||||
## Key Points
|
||||
|
||||
- Modular role-based architecture
|
||||
- Infrastructure-as-Code (IaC)
|
||||
- Docker-based containerization
|
||||
- Centralized Identity & Access Management (IAM)
|
||||
- Security by Design
|
||||
- Integration instead of forced migration
|
||||
- Optional [full disk encryption](https://github.com/kevinveenbirkenbach/hetzner-arch-luks) layer for servers
|
||||
|
||||
## Architecture Layers
|
||||
|
||||
### 1. Automation Layer
|
||||
- Ansible Playbooks & Roles
|
||||
- Git-managed configuration repository
|
||||
- Inventory-driven infrastructure definition
|
||||
|
||||
### 2. Container Orchestration Layer
|
||||
- Docker Compose service deployment
|
||||
- Per-role service templates
|
||||
- Automated health checks & updates
|
||||
|
||||
### 3. Security & Identity Layer
|
||||
- Centralized user management via LDAP
|
||||
- Single Sign-On (SSO) with Keycloak
|
||||
- Secrets management via Ansible Vault
|
||||
|
||||
### 4. Networking Layer
|
||||
- Secure VPN via WireGuard & OpenVPN
|
||||
- Nginx Reverse Proxy with automated TLS via Let's Encrypt
|
||||
- Encrypted server setup using [hetzner-arch-luks](https://github.com/kevinveenbirkenbach/hetzner-arch-luks)
|
||||
|
||||
### 5. Application Layer
|
||||
- Modular application roles (Nextcloud, Gitea, Matrix, etc.)
|
||||
- Dynamic domain configuration
|
||||
- Integration of external/legacy services into the platform
|
||||
|
||||
### 6. Monitoring & Maintenance Layer
|
||||
- System health monitoring (BTRFS, Docker, Nginx)
|
||||
- Automated backup roles (local/remote)
|
||||
- Maintenance automation (cleanup, update, restart tasks)
|
||||
|
||||
---
|
||||
|
||||
> *CyMaIS — Modular. Secure. Automated. Decentralized.*
|
@ -1,6 +1,6 @@
|
||||
# Problem Statement
|
||||
# Situation Analysis
|
||||
|
||||
This is the Problem Statement for [CyMaIS](https://cymais.cloud), highlighting the challenges we aim to address.
|
||||
This is the Situation Analysis for [CyMaIS](https://cymais.cloud), highlighting the challenges we aim to address.
|
||||
|
||||
## Short
|
||||
|
||||
@ -25,10 +25,10 @@ Furthermore, for small businesses, setting up enterprise-level open-source infra
|
||||
System administrators in small companies often don’t have the specialized knowledge or the capacity to build and maintain such complex infrastructures, which further exacerbates the challenge of securing sensitive business data while ensuring compliance with industry standards.
|
||||
|
||||
## Key Points
|
||||
- Dependency on monopolistic cloud providers
|
||||
- Loss of data sovereignty and data privacy risks
|
||||
- Geopolitical vulnerabilities (extortion risk)
|
||||
- Lack of resources for small businesses
|
||||
- Limited expertise for secure infrastructure
|
||||
- Dependency on monopolists
|
||||
- Loss of data sovereignty
|
||||
- Geopolitical vulnerabilities
|
||||
- Lack of resources
|
||||
- Limited secure infrastructure expertise
|
||||
- Centralized data storage risks
|
||||
- Manipulation through social media dominance
|
||||
- Manipulation through social media
|
23
docs/vision/Company_Vision.md
Normal file
23
docs/vision/Company_Vision.md
Normal file
@ -0,0 +1,23 @@
|
||||
# Company Vision — CyMaIS
|
||||
|
||||
## Empowering Digital Sovereignty for Everyone.
|
||||
|
||||
CyMaIS is more than just software — it is a movement for digital independence, resilience, and transparency.
|
||||
|
||||
We believe that secure, self-hosted IT infrastructure must be accessible to everyone — regardless of company size, technical expertise, or budget.
|
||||
|
||||
### Our Mission
|
||||
- Democratize access to secure IT infrastructure
|
||||
- Enable data sovereignty and privacy for individuals and organizations
|
||||
- Reduce global dependency on monopolistic cloud providers
|
||||
- Promote Open Source, transparency, and community-driven innovation
|
||||
- Build resilient digital ecosystems in uncertain times
|
||||
|
||||
### Long-Term Goal
|
||||
We want to establish CyMaIS as the leading European and global alternative to centralized cloud platforms — open, modular, and self-sovereign.
|
||||
|
||||
Our vision is a future where every person and organization owns their infrastructure — free from control, censorship, and vendor lock-ins.
|
||||
|
||||
---
|
||||
|
||||
> *CyMaIS — Empowering a Sovereign Digital Future.*
|
28
docs/vision/Product_Vision.md
Normal file
28
docs/vision/Product_Vision.md
Normal file
@ -0,0 +1,28 @@
|
||||
# Product Vision — CyMaIS Platform
|
||||
|
||||
## The Universal Automation Platform for Self-Hosted IT Infrastructure.
|
||||
|
||||
CyMaIS provides a modular, Open Source infrastructure automation platform that enables secure and scalable IT environments — for individuals, SMEs, NGOs, and enterprises.
|
||||
|
||||
### Key Product Goals
|
||||
- Enterprise-grade infrastructure automation for everyone
|
||||
- Rapid deployment of servers, clients, and cloud-native services
|
||||
- Modular role-based architecture (VPN, Backup, Security, Monitoring, Web Services, IAM)
|
||||
- Seamless integration of existing systems without forced migration
|
||||
- Infrastructure-as-Code and reproducible deployments
|
||||
- Reduced operational IT costs and vendor lock-ins
|
||||
- Security by Design (encryption, 2FA, auditing, hardening)
|
||||
- Support for decentralized protocols like ActivityPub, Matrix, Email
|
||||
|
||||
### Long-Term Product Vision
|
||||
CyMaIS will become the central platform for:
|
||||
|
||||
- Automating any self-hosted infrastructure within minutes
|
||||
- Maintaining full data control and regulatory compliance
|
||||
- Empowering organizations to build their own sovereign cloud ecosystem
|
||||
- Breaking the dependency on centralized and proprietary cloud services
|
||||
|
||||
---
|
||||
|
||||
> *CyMaIS — The Future of Self-Hosted Infrastructure.*
|
||||
> *Secure. Automated. Sovereign.*
|
@ -23,10 +23,11 @@ Moreover, our vision goes beyond just IT infrastructure; it extends to the broad
|
||||
Ultimately, our vision is to redefine the way IT infrastructure is deployed and managed, offering a solution that is swift, secure, and scalable, capable of meeting the needs of businesses, individuals, NGOs, and large enterprises. CyMaIS will empower all stakeholders by providing a foundation for a decentralized, transparent, and resilient digital future—setting a new benchmark for security, reliability, and sovereignty in the digital age.
|
||||
|
||||
## Key Points
|
||||
1. Empowerment for individuals and institutions
|
||||
2. Data sovereignty and control over infrastructure
|
||||
3. Automated and simplified IT infrastructure setup
|
||||
4. Open Source transparency, security, and innovation
|
||||
5. Decentralized internet using ActivityPub
|
||||
6. Scalability for small to large organizations
|
||||
7. Global resilience and security in uncertain political climates
|
||||
1. Empowerment people and institutions
|
||||
2. Data sovereignty
|
||||
3. Control over infrastructure
|
||||
4. Automated infrastructure setup
|
||||
5. Open Source
|
||||
6. Decentralized Services
|
||||
7. Scalabel
|
||||
8. Global resilience and security
|
@ -2,8 +2,8 @@
|
||||
defaults_service_provider:
|
||||
type: "legal" # Accepted Values: natural, legal
|
||||
company:
|
||||
titel: "CyMaIS Example GbR"
|
||||
slogan: "We keep your 0 and 1 in line"
|
||||
titel: "CyMaIS GbR"
|
||||
slogan: "CyMaIS — Empowering a Sovereign Digital Future."
|
||||
address:
|
||||
street: "Binary Avenue 01"
|
||||
city: "Cybertown"
|
||||
@ -11,8 +11,8 @@ defaults_service_provider:
|
||||
country: "Nexusland"
|
||||
logo: "{{applications.assets_server.url}}/logo.png"
|
||||
platform:
|
||||
titel: "CyMaIS Plattform Demo"
|
||||
subtitel: "Demo of the Cyber Master Infrastructur Solution Plattform"
|
||||
titel: "CyMaIS Demo"
|
||||
subtitel: "The Future of Self-Hosted Infrastructure. Secure. Automated. Sovereign."
|
||||
logo: "{{applications.assets_server.url}}/img/logo.png"
|
||||
favicon: "{{applications.assets_server.url}}/img/favicon.ico"
|
||||
contact:
|
||||
|
2
roles/persona/README.md
Normal file
2
roles/persona/README.md
Normal file
@ -0,0 +1,2 @@
|
||||
# Todo
|
||||
[Implement](https://project.veen.world/projects/cymais/work_packages/80/activity)
|
Loading…
x
Reference in New Issue
Block a user