48 lines
No EOL
2.2 KiB
Markdown
48 lines
No EOL
2.2 KiB
Markdown
# VPN Set up
|
||
|
||
# Data VPN
|
||
|
||
Follow these instructions to set up the Data VPN. This will allow you access the DWH.
|
||
|
||
1. Download Wireguard from the official webpage: [https://www.wireguard.com/](https://www.wireguard.com/) and install it on your device
|
||
2. Ask Pablo for your config and to set up access for you on the server. Your config should look roughly like this:
|
||
|
||
```bash
|
||
[Interface]
|
||
PrivateKey = +AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
|
||
Address = 192.168.70.X/32
|
||
DNS = 192.168.69.1
|
||
[Peer]
|
||
PublicKey = bKr79c5XbzudWeUjiwXcxsy1mrrEnrO4xSrNAUZv2GE=
|
||
AllowedIPs = 192.168.69.1/32, 10.69.0.0/24, 52.146.133.0/24
|
||
Endpoint = 172.166.88.95:52420
|
||
```
|
||
|
||
1. In Wireguard, click `Add Tunnel` and select `Add Empty Tunnel`
|
||
|
||

|
||
|
||
1. Paste the config given by Pablo and add a name to the connection.
|
||
2. Start the connection to test if it works. If it works, you should see the little green shield and also the `Transfer` section should show traffic in both the `received` and `sent`fields.
|
||
|
||

|
||
|
||
1. You probably want to further test by connecting to some service within the Data subscription, like the DWH.
|
||
|
||
# Backend (Core) VPN
|
||
|
||
It’s likely the previous setup works for DWH, but not the backend. For the backend, follow this instructions:
|
||
|
||
1. You will need to request the configuration file for the backend VPN. Ask someone in the Data Team or Ben Robinson
|
||
2. In the Microsoft Store of your laptop, download Azure VPN Client and install it
|
||
3. If asked, log in with your superhog/truvi account
|
||
4. Once installed, on the bottom left corner, click the “+” button
|
||
5. Click on Import and select the configuration file from the 1st step. That’s it.
|
||
6. You probably want to further test by connecting to Live schema and run a simple query.
|
||
|
||
# Notes
|
||
|
||
- Don’t use your Private Key in more than 1 laptop at the same time or this might permanently block it.
|
||
- It’s possible that having 2 VPNs active at the same time disallows certain access. Usually you will just need the Data VPN (Wireguard) turned on.
|
||
- Once you need to access the Backend, just turn off Data VPN (Wireguard) and turn on Backend VPN (Azure VPN Client).
|
||
- When you finished accessing the Backend, turn off the Backend VPN (Azure VPN Client) and turn on Data VPN (Wireguard). |