WARNING: THIS SITE IS A MIRROR OF GITHUB.COM / IT CANNOT LOGIN OR REGISTER ACCOUNTS / THE CONTENTS ARE PROVIDED AS-IS / THIS SITE ASSUMES NO RESPONSIBILITY FOR ANY DISPLAYED CONTENT OR LINKS / IF YOU FOUND SOMETHING MAY NOT GOOD FOR EVERYONE, CONTACT ADMIN AT ilovescratch@foxmail.com
You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: kube.tf.example
+7-1Lines changed: 7 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -770,18 +770,23 @@ module "kube-hetzner" {
770
770
# If you want to allow all outbound traffic you can set this to "false". Default is "true".
771
771
# restrict_outbound_traffic = false
772
772
773
+
# Fetch the current user IP-address using myip.opendns.com so that it can be used in firewall rules with the string "myipv4". Default: true.
774
+
# fetch_myip = true
775
+
773
776
# Allow access to the Kube API from the specified networks. The default is ["0.0.0.0/0", "::/0"].
774
777
# Allowed values: null (disable Kube API rule entirely) or a list of allowed networks with CIDR notation.
775
778
# For maximum security, it's best to disable it completely by setting it to null. However, in that case, to get access to the kube api,
776
779
# you would have to connect to any control plane node via SSH, as you can run kubectl from within these.
777
780
# Please be advised that this setting has no effect on the load balancer when the use_control_plane_lb variable is set to true. This is
778
781
# because firewall rules cannot be applied to load balancers yet.
782
+
# Note: You can use the string "myipv4" as an IP address in the array and it will be replaced with the CIDR/32 of your IP as reported by myip.opendns.com. Use of "myipv4" requires `dig` to be available and `fetch_myip = true`.
779
783
# firewall_kube_api_source = null
780
784
781
785
# Allow SSH access from the specified networks. Default: ["0.0.0.0/0", "::/0"]
782
786
# Allowed values: null (disable SSH rule entirely) or a list of allowed networks with CIDR notation.
783
787
# Ideally you would set your IP there. And if it changes after cluster deploy, you can always update this variable and apply again.
784
-
# firewall_ssh_source = ["1.2.3.4/32"]
788
+
# Note: You can use the string "myipv4" as an IP address in the array and it will be replaced with the CIDR/32 of your IP as reported by myip.opendns.com. Use of "myipv4" requires `dig` to be available and `fetch_myip = true`.
789
+
# firewall_ssh_source = ["myipv4", "1.2.3.4/32"]
785
790
786
791
# By default, SELinux is enabled in enforcing mode on all nodes. For container-specific SELinux issues,
787
792
# consider using the pre-installed 'udica' tool to create custom, targeted SELinux policies instead of
@@ -790,6 +795,7 @@ module "kube-hetzner" {
790
795
791
796
# Adding extra firewall rules, like opening a port
792
797
# More info on the format here https://registry.terraform.io/providers/hetznercloud/hcloud/latest/docs/resources/firewall
798
+
# Note: You can use the string "myipv4" as an IP address in the `source_ips` or `destination_ips` arrays and it will be replaced with the CIDR/32 of your IP as reported by myip.opendns.com. Use of "myipv4" requires `dig` to be available and `fetch_myip = true`.
0 commit comments