Enable authN (port 22) to the VM from the IP of the person running the code only#194
Enable authN (port 22) to the VM from the IP of the person running the code only#194rajeshkio wants to merge 10 commits intorancher:mainfrom
Conversation
|
Do you need help with Azure and GCP @rajeshkio ? I can take a look at it and make the changes for you if you don't have access. I have checked the code and it looks fine. However. I think that we would appreciate the following changes. 1 - Only port 22 is being restricted. I would say that you can proceed with port 6443 as well or directly to all the ports. Have I missed something @glovecchi0 ?? Thanks a lot for your work! |
|
The conflicts arise because the branch points to an older version of the code. Yesterday, we released the major release for use with openSUSE 16.0 and changed several lines of code. |
The logic used is correct, @rajeshkio. Thank you. |
|
6443 port has different challenges and testing effort, that's why I was thinking of doing that in another issue. |
I think we only use external port 6443 for KubeConfig to access RKE2 API and to be able to execute kubectl commands which should be fine if we change that rule with our personal IP and Rancher URL. But, of course, let's confirm that as it is possible that there are more operations affected! |
| } | ||
|
|
||
| inbound_rule { | ||
| protocol = "udp" |
There was a problem hiding this comment.
There was a problem hiding this comment.
It should be 8472 and 68.
There was a problem hiding this comment.
@glovecchi0 I don't see port 22 UDP in the list for the link you provided. Also, I think many of those ports are only required between nodes and not inbound from the Internet.
There was a problem hiding this comment.
The issue has been fixed by pointing only to the necessary UDP ports 8472 and 68.
DigitalOcean does not provide implicit intra-network trust like AWS, Azure, or GCP...
|
I ran terraform apply for my task and suddenly my internet got reconnected. |
|
Can we get any bastion host from SUSE infra and add it to the allow list, so that we can access nodes from bastion host and don’t have to worry about IP address changes? |
glovecchi0
left a comment
There was a problem hiding this comment.
I've submitted a few commits to bring the code more in line with the existing format and added a few bug fixes (such as excessive UDP permissiveness in DO).
LGTM now.
|
I'm curious how it works with Rancher. I'll have to try it. |
glovecchi0
left a comment
There was a problem hiding this comment.
I confirm once again that everything seems fine to me.
Great work!
I have added changes for aws and DigitalOcean. I haven't set up Azure and GCP clouds.