WARNING: THIS SITE IS A MIRROR OF GITHUB.COM / IT CANNOT LOGIN OR REGISTER ACCOUNTS / THE CONTENTS ARE PROVIDED AS-IS / THIS SITE ASSUMES NO RESPONSIBILITY FOR ANY DISPLAYED CONTENT OR LINKS / IF YOU FOUND SOMETHING MAY NOT GOOD FOR EVERYONE, CONTACT ADMIN AT ilovescratch@foxmail.com
You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: kube.tf.example
+4-1Lines changed: 4 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -784,12 +784,14 @@ module "kube-hetzner" {
784
784
# you would have to connect to any control plane node via SSH, as you can run kubectl from within these.
785
785
# Please be advised that this setting has no effect on the load balancer when the use_control_plane_lb variable is set to true. This is
786
786
# because firewall rules cannot be applied to load balancers yet.
787
+
# Note: You can use the string "myipv4" as an IP address in the array and it will be replaced with the CIDR/32 of your IP as reported by myip.opendns.com. Use of "myipv4" requires `dig` to be available.
787
788
# firewall_kube_api_source = null
788
789
789
790
# Allow SSH access from the specified networks. Default: ["0.0.0.0/0", "::/0"]
790
791
# Allowed values: null (disable SSH rule entirely) or a list of allowed networks with CIDR notation.
791
792
# Ideally you would set your IP there. And if it changes after cluster deploy, you can always update this variable and apply again.
792
-
# firewall_ssh_source = ["1.2.3.4/32"]
793
+
# Note: You can use the string "myipv4" as an IP address in the array and it will be replaced with the CIDR/32 of your IP as reported by myip.opendns.com. Use of "myipv4" requires `dig` to be available.
794
+
# firewall_ssh_source = ["myipv4", "1.2.3.4/32"]
793
795
794
796
# By default, SELinux is enabled in enforcing mode on all nodes. For container-specific SELinux issues,
795
797
# consider using the pre-installed 'udica' tool to create custom, targeted SELinux policies instead of
@@ -798,6 +800,7 @@ module "kube-hetzner" {
798
800
799
801
# Adding extra firewall rules, like opening a port
800
802
# More info on the format here https://registry.terraform.io/providers/hetznercloud/hcloud/latest/docs/resources/firewall
803
+
# Note: You can use the string "myipv4" as an IP address in the `source_ips` or `destination_ips` arrays and it will be replaced with the CIDR/32 of your IP as reported by myip.opendns.com. Use of "myipv4" requires `dig` to be available.
0 commit comments