Merge pull request #102 from kube-hetzner/custom-firewall
Extra firewall rules
This commit is contained in:
commit
25c3ec30a0
118
locals.tf
118
locals.tf
@ -17,6 +17,124 @@ locals {
|
||||
csi_version = var.hetzner_csi_version != null ? var.hetzner_csi_version : data.github_release.hetzner_csi.release_tag
|
||||
kured_version = data.github_release.kured.release_tag
|
||||
|
||||
# The following IPs are important to be whitelisted because they communicate with Hetzner services and enable the CCM and CSI to work properly.
|
||||
# Source https://github.com/hetznercloud/csi-driver/issues/204#issuecomment-848625566
|
||||
hetzner_metadata_service_ipv4 = "169.254.169.254/32"
|
||||
hetzner_cloud_api_ipv4 = "213.239.246.1/32"
|
||||
|
||||
whitelisted_ips = [
|
||||
var.network_ipv4_range,
|
||||
local.hetzner_metadata_service_ipv4,
|
||||
local.hetzner_cloud_api_ipv4,
|
||||
"127.0.0.1/32",
|
||||
]
|
||||
|
||||
base_firewall_rules = [
|
||||
# Allowing internal cluster traffic and Hetzner metadata service and cloud API IPs
|
||||
{
|
||||
direction = "in"
|
||||
protocol = "tcp"
|
||||
port = "any"
|
||||
source_ips = local.whitelisted_ips
|
||||
},
|
||||
{
|
||||
direction = "in"
|
||||
protocol = "udp"
|
||||
port = "any"
|
||||
source_ips = local.whitelisted_ips
|
||||
},
|
||||
{
|
||||
direction = "in"
|
||||
protocol = "icmp"
|
||||
source_ips = local.whitelisted_ips
|
||||
},
|
||||
|
||||
# Allow all traffic to the kube api server
|
||||
{
|
||||
direction = "in"
|
||||
protocol = "tcp"
|
||||
port = "6443"
|
||||
source_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
},
|
||||
|
||||
# Allow all traffic to the ssh port
|
||||
{
|
||||
direction = "in"
|
||||
protocol = "tcp"
|
||||
port = "22"
|
||||
source_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
},
|
||||
|
||||
# Allow ping on ipv4
|
||||
{
|
||||
direction = "in"
|
||||
protocol = "icmp"
|
||||
source_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
},
|
||||
|
||||
# Allow basic out traffic
|
||||
# ICMP to ping outside services
|
||||
{
|
||||
direction = "out"
|
||||
protocol = "icmp"
|
||||
destination_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
},
|
||||
|
||||
# DNS
|
||||
{
|
||||
direction = "out"
|
||||
protocol = "tcp"
|
||||
port = "53"
|
||||
destination_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
},
|
||||
{
|
||||
direction = "out"
|
||||
protocol = "udp"
|
||||
port = "53"
|
||||
destination_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
},
|
||||
|
||||
# HTTP(s)
|
||||
{
|
||||
direction = "out"
|
||||
protocol = "tcp"
|
||||
port = "80"
|
||||
destination_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
},
|
||||
{
|
||||
direction = "out"
|
||||
protocol = "tcp"
|
||||
port = "443"
|
||||
destination_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
},
|
||||
|
||||
#NTP
|
||||
{
|
||||
direction = "out"
|
||||
protocol = "udp"
|
||||
port = "123"
|
||||
destination_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
}
|
||||
]
|
||||
|
||||
common_commands_install_k3s = [
|
||||
"set -ex",
|
||||
# prepare the k3s config directory
|
||||
|
127
main.tf
127
main.tf
@ -24,125 +24,16 @@ resource "hcloud_network_subnet" "subnet" {
|
||||
resource "hcloud_firewall" "k3s" {
|
||||
name = "k3s"
|
||||
|
||||
# Allowing internal cluster traffic and Hetzner metadata service and cloud API IPs
|
||||
rule {
|
||||
direction = "in"
|
||||
protocol = "tcp"
|
||||
port = "any"
|
||||
source_ips = [
|
||||
var.network_ipv4_range,
|
||||
"127.0.0.1/32",
|
||||
"169.254.169.254/32",
|
||||
"213.239.246.1/32"
|
||||
]
|
||||
dynamic "rule" {
|
||||
for_each = concat(local.base_firewall_rules, var.extra_firewall_rules)
|
||||
content {
|
||||
direction = rule.value.direction
|
||||
protocol = rule.value.protocol
|
||||
port = lookup(rule.value, "port", null)
|
||||
destination_ips = lookup(rule.value, "destination_ips", [])
|
||||
source_ips = lookup(rule.value, "source_ips", [])
|
||||
}
|
||||
}
|
||||
rule {
|
||||
direction = "in"
|
||||
protocol = "udp"
|
||||
port = "any"
|
||||
source_ips = [
|
||||
var.network_ipv4_range,
|
||||
"127.0.0.1/32",
|
||||
"169.254.169.254/32",
|
||||
"213.239.246.1/32"
|
||||
]
|
||||
}
|
||||
rule {
|
||||
direction = "in"
|
||||
protocol = "icmp"
|
||||
source_ips = [
|
||||
var.network_ipv4_range,
|
||||
"127.0.0.1/32",
|
||||
"169.254.169.254/32",
|
||||
"213.239.246.1/32"
|
||||
]
|
||||
}
|
||||
|
||||
# Allow all traffic to the kube api server
|
||||
rule {
|
||||
direction = "in"
|
||||
protocol = "tcp"
|
||||
port = "6443"
|
||||
source_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
}
|
||||
|
||||
# Allow all traffic to the ssh port
|
||||
rule {
|
||||
direction = "in"
|
||||
protocol = "tcp"
|
||||
port = "22"
|
||||
source_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
}
|
||||
|
||||
# Allow ping on ipv4
|
||||
rule {
|
||||
direction = "in"
|
||||
protocol = "icmp"
|
||||
source_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
}
|
||||
|
||||
# Allow basic out traffic
|
||||
# ICMP to ping outside services
|
||||
rule {
|
||||
direction = "out"
|
||||
protocol = "icmp"
|
||||
destination_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
}
|
||||
|
||||
# DNS
|
||||
rule {
|
||||
direction = "out"
|
||||
protocol = "tcp"
|
||||
port = "53"
|
||||
destination_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
}
|
||||
rule {
|
||||
direction = "out"
|
||||
protocol = "udp"
|
||||
port = "53"
|
||||
destination_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
}
|
||||
|
||||
# HTTP(s)
|
||||
rule {
|
||||
direction = "out"
|
||||
protocol = "tcp"
|
||||
port = "80"
|
||||
destination_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
}
|
||||
rule {
|
||||
direction = "out"
|
||||
protocol = "tcp"
|
||||
port = "443"
|
||||
destination_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
}
|
||||
|
||||
#NTP
|
||||
rule {
|
||||
direction = "out"
|
||||
protocol = "udp"
|
||||
port = "123"
|
||||
destination_ips = [
|
||||
"0.0.0.0/0"
|
||||
]
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
resource "hcloud_placement_group" "k3s" {
|
||||
|
@ -50,3 +50,17 @@ agent_nodepools = {
|
||||
|
||||
# Allows you to specify either stable, latest, or testing (defaults to stable), see https://rancher.com/docs/k3s/latest/en/upgrades/basic/
|
||||
# initial_k3s_channel = "latest"
|
||||
|
||||
# Adding extra firewall rules, like opening a port
|
||||
# In this example with allow port TCP 5432 for a Postgres service we will open via a nodeport
|
||||
# More info on the format here https://registry.terraform.io/providers/hetznercloud/hcloud/latest/docs/resources/firewall
|
||||
# extra_firewall_rules = [
|
||||
# {
|
||||
# direction = "in"
|
||||
# protocol = "tcp"
|
||||
# port = "5432"
|
||||
# source_ips = [
|
||||
# "0.0.0.0/0"
|
||||
# ]
|
||||
# },
|
||||
# ]
|
||||
|
@ -113,3 +113,9 @@ variable "automatically_upgrade_k3s" {
|
||||
default = true
|
||||
description = "Whether to automatically upgrade k3s based on the selected channel"
|
||||
}
|
||||
|
||||
variable "extra_firewall_rules" {
|
||||
type = list(any)
|
||||
default = []
|
||||
description = "Additional firewall rules to apply to the cluster"
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user