Fix: cIlium node-to-node encryption

This commit is contained in:
Serge Logvinov
2022-01-31 22:56:48 +02:00
parent 7da6cafbe9
commit 019251b763
3 changed files with 26 additions and 1 deletions

View File

@@ -23,6 +23,7 @@ tunnel: "vxlan"
autoDirectNodeRoutes: false autoDirectNodeRoutes: false
devices: [eth0,eth1] devices: [eth0,eth1]
l7Proxy: false
encryption: encryption:
enabled: true enabled: true
type: wireguard type: wireguard

View File

@@ -127,7 +127,7 @@ data:
# - geneve # - geneve
tunnel: vxlan tunnel: vxlan
# Enables L7 proxy for L7 policy enforcement and visibility # Enables L7 proxy for L7 policy enforcement and visibility
enable-l7-proxy: "true" enable-l7-proxy: "false"
enable-ipv4-masquerade: "true" enable-ipv4-masquerade: "true"
enable-ipv6-masquerade: "true" enable-ipv6-masquerade: "true"

View File

@@ -25,6 +25,12 @@ resource "scaleway_instance_security_group" "controlplane" {
} }
} }
inbound_rule {
action = "accept"
protocol = "TCP"
port = 4240
ip_range = "::/0"
}
inbound_rule { inbound_rule {
action = "accept" action = "accept"
protocol = "ANY" protocol = "ANY"
@@ -43,6 +49,12 @@ resource "scaleway_instance_security_group" "controlplane" {
port = 51820 port = 51820
ip_range = "::/0" ip_range = "::/0"
} }
inbound_rule {
action = "accept"
protocol = "ICMP"
ip_range = "::/0"
}
} }
resource "scaleway_instance_security_group" "web" { resource "scaleway_instance_security_group" "web" {
@@ -60,6 +72,12 @@ resource "scaleway_instance_security_group" "web" {
} }
} }
inbound_rule {
action = "accept"
protocol = "TCP"
port = 4240
ip_range = "::/0"
}
inbound_rule { inbound_rule {
action = "accept" action = "accept"
protocol = "ANY" protocol = "ANY"
@@ -78,6 +96,12 @@ resource "scaleway_instance_security_group" "web" {
port = 51820 port = 51820
ip_range = "::/0" ip_range = "::/0"
} }
inbound_rule {
action = "accept"
protocol = "ICMP"
ip_range = "::/0"
}
} }
resource "scaleway_instance_security_group" "worker" { resource "scaleway_instance_security_group" "worker" {