diff --git a/nodes/home/router.py b/nodes/home/router.py index da68207..58f58c7 100644 --- a/nodes/home/router.py +++ b/nodes/home/router.py @@ -73,20 +73,9 @@ nodes['home.router'] = { }, }, }, - 'hosts': { - 'entries': { - # Hackaround to force wireguard to only use IPv4 for - # the connection to this system. - '51.195.47.180': { - 'wireguard.ovh.kunbox.net', - }, - }, - }, 'icinga_options': { # override group default - 'also_affected_by': atomic({ - 'ovh.wireguard', - }), + 'also_affected_by': atomic(set()), # disabled on group level # XXX reenable this once we can leave the house safely again #'vars.notification.sms': True diff --git a/nodes/ovh/icinga2.py b/nodes/ovh/icinga2.py index 8b9b975..0f2a592 100644 --- a/nodes/ovh/icinga2.py +++ b/nodes/ovh/icinga2.py @@ -30,6 +30,9 @@ nodes['ovh.icinga2'] = { }, }, }, + 'icinga_options': { + 'exclude_from_monitoring': True, + }, 'bird': { 'static_routes': { '172.19.136.3/32', diff --git a/nodes/ovh/wireguard.py b/nodes/ovh/wireguard.py index 6e92c59..334e1b3 100644 --- a/nodes/ovh/wireguard.py +++ b/nodes/ovh/wireguard.py @@ -22,6 +22,9 @@ nodes['ovh.wireguard'] = { '172.19.136.64/26', }, }, + 'icinga_options': { + 'exclude_from_monitoring': True, + }, 'backups': { 'exclude_from_backups': True, },