rename to part1

This commit is contained in:
wboughattas
2026-01-01 23:35:01 -05:00
parent e7ea793b84
commit 2b39d7ee75

View File

@@ -0,0 +1,125 @@
---
layout: post
title: 'ThinkCentre M720q + Debian: 24/7 Server Setup Step 1'
date: 2025-12-31 22:00:00 -0400
categories:
- homelab
highlight: true
---
> _I recently picked up 3 refurbished Lenovo ThinkCentre M720q Tiny to migrate my Kubernetes cluster from AWS and slash
> my EKS costs. These machines are great for being silent and power-efficient, but out of the box, they're tuned as
> office
> desktops, not as high-availability server racks. Here's how I configured the hardware and OS settings to make this
> 3-node cluster production-ready._
Not the cleanest setup, no cable management, servers upside down, stickers still on, no room for ventilation, and they
have too much wiggle room in the rack, but the software is sound and that's 90% of the work done :D
![server.png](assets/server.png)
# The Hardware Stack
Before diving into the configuration, here is the spec sheet for each node in the cluster. These units feature Intel
vPro and ThinkCentre BIOS, which is essential for the advanced BIOS settings that we are about to toggle:
- CPU: Intel(R) Core(TM) i7-7700 @ 3.60GHz (4 Cores / 8 Threads)
- RAM: 16GB DDR4
- Storage: 500GB SSD
- Network: Dedicated 5-port 1Gbps Ethernet Switch
- Wattage: 65W
For this setup, we will not take advantage of vPro's features such as accessing the BIOS over the network, but we will
take advantage of features that come with ThinkCentre BIOS such as the auto-power on after a power loss.
# ThinkCentre M720q: Node Configuration
## 1. Initial Verification
- **Enter BIOS:** Press repeatedly the **F1** key.
- **Hardware Audit:** Confirm the CPU, RAM, and Storage match what is expected. Reset BIOS to default settings if it's
the first time.
- **Set the Standard:** Set the system clock to **UTC** if it's not the case. This is necessary for Kubernetes because
it ensures that logs from different nodes align perfectly regardless of local time zones.
## 2. Hardware Decoupling
We want to strip away desktop features to save power and reduce the potential attack surface.
| Menu Path | Setting | Action | Why |
| :-------------------------- | :------------------ | :-------------------------- | :--------------------------------------------------------- |
| **Devices > Audio Setup** | Integrated Audio | **Disabled** | Servers don't need sound |
| **Devices > Network Setup** | Wi-Fi / BT / PXE | **Disabled** | Forces the node to rely on the Onboard Ethernet. |
| **Devices > USB Setup** | USB Legacy Support | **Disabled** | Prevents the use of less secure USB protocols during boot. |
| **Power** | After Power Loss | **Power On** | The Auto-Restart rule. |
| **Power** | Intelligent Cooling | **Performance or Acoustic** | Either to prevent thermal throttling or lower noise. |
## 3. Security Governance
| Menu Path | Setting | Action | Why |
| :----------- | :--------------------- | :----------- | :--------------------------------------------------------------- |
| **Security** | Administrator Password | **Set** | Prevents tampering with the BIOS settings. |
| **Security** | Windows UEFI Update | **Disabled** | We are replacing Windows with Debian. |
| **Security** | Password for F1/F12 | **Yes** | Requires your admin password to boot from an unauthorized USB. |
| **Security** | POP Changeable by User | **No** | Requires your admin to change his password. |
| **Security** | Secure Boot | **Enabled** | Verifies the Debian kernel signature before allowing it to boot. |
## 4. Boot Sequence
**Startup > Boot Sequence:** Move the drive(s) to the #1 spot (prioritize the one storing the OS Bootloader). Exclude
everything else.
**Startup > CSM:** must be disabled to restrict non-UEFI operating systems.
## 5. Post-Install
Once Debian is running, we need to tell the OS to take ownership of the hardware management. In a better world, we
prefer to take full ownership ourselves using CoreBoot. But we cannot because Intel Boot Guard is supported on the
hardware level. Since Lenovo ships these with Intel Boot Guard (Verified Boot) enabled, we must work within the
manufacturer's ecosystem.
### Synchronize the Hardware Clock
This command tells Debian to treat the motherboard's clock as UTC (the server standard).
```bash
sudo timedatectl set-local-rtc 0
```
### Enable Linux-Native Firmware Updates
We disabled the Windows update hook in the BIOS; now we replace it with the **Linux Vendor Firmware Service (LVFS)**.
This allows you to update your BIOS directly from the Debian terminal.
```bash
sudo apt update && sudo apt install fwupd -y
```
`fwupd` does not download and auto-install updates like Windows. To list new available firmware from Lenovo/Intel, run:
```bash
fwupdmgr refresh && fwupdmgr get-updates
```
**Note:** You should only run `fwupdmgr update` during a scheduled maintenance window. BIOS updates take 25 minutes,
during which the node is completely unresponsive and will reboot automatically.
### OS Updates & Cluster Maintenance
While `fwupd` handles the hardware, `apt` handles the OS. Debian 13 point releases (e.g., 13.2 to 13.3) are
security-focused and will **not** auto-install by default.
For a Kubernetes cluster, you should always perform **"Rolling Updates."** This means you drain one node at a time to
ensure your pods are rescheduled elsewhere before you perform the upgrade and reboot.
During a scheduled maintenance window:
1. **Drain the node:** `kubectl drain <node-name> --ignore-daemonsets`
2. **Upgrade OS:** `sudo apt update && sudo apt upgrade -y`
3. **Upgrade Firmware:** `fwupdmgr update` (if applicable)
4. **Reboot:** `sudo reboot`
5. **Bring it back:** `kubectl uncordon <node-name>`
---
Next step, we will set up the firewall, ssh rules, and a custom vpn via an ec2 proxy server with a static IP.
[[2025-12-31-homelab-part2]]