[Feature Request]: Options to disable public IPv4 and/or IPv6 when creating nodes #1036
Replies: 7 comments
-
There are a few limiting factors with Hetzner IPv6 only VMs, read my reply here |
Beta Was this translation helpful? Give feedback.
-
@aleksasiriski Yes, for sure, but I have a feeling it's worth trying, maybe it will work out of the box.. |
Beta Was this translation helpful? Give feedback.
-
I'm interested in this, so will give it a go when I'm done with uni tests next week. |
Beta Was this translation helpful? Give feedback.
-
@aleksasiriski I remember that time, may the wind be at your back! |
Beta Was this translation helpful? Give feedback.
-
Implementing a Nebula Network could bridge limiting factors with Hetzner IPv6 only VMsImplement a Nebula network with Terraform to address certain limitations and improve network connectivity within a Hetzner environment. Addressing LimitationsIPv6-Only EnvironmentHetzner provides IPv6-only virtual machines (VMs), which can pose challenges when dealing with IPv4-only resources or external network access. Nebula can help bridge the gap between IPv4 and IPv6 networks. Limited External ConnectivityIn an IPv6-only environment, issues may arise when trying to access resources that do not support IPv6, such as DockerHub or GHCR.io. Nebula can provide a private overlay network, potentially allowing servers to access external resources through a proxy or caching mechanism. Implementing Nebula with TerraformTo implement Nebula with Terraform, follow these steps:
Benefits of Using NebulaImplementing Nebula with Terraform offers several benefits:
graph TD
subgraph "Addressing Limitations"
subgraph "IPv6-Only Environment"
A((Hetzner IPv6-only VMs))
B(Nebula Bridge)
C((IPv4-Only Resources))
A -->|IPv6| B
B -->|Nebula Overlay| C
end
subgraph "Limited External Connectivity"
D((IPv6-Only Environment))
E(Nebula Overlay)
F((External Resources))
D -->|Nebula Overlay| E
E -->|Proxy/Caching| F
end
end
subgraph "Implementing Nebula with Terraform"
G["Nebula Configuration"]
H["Terraform Resources"]
I["Node Configuration"]
J["Network Isolation"]
K["Testing and Validation"]
G --> H
H --> I
I --> J
J --> K
end
subgraph "Benefits of Using Nebula"
L["IPv4/IPv6 Bridging"]
M["Security"]
N["Routing Control"]
O["Mitigating External Connectivity Issues"]
L --> M
M --> N
N --> O
end
|
Beta Was this translation helpful? Give feedback.
-
Another benefit is that we can use Nebula to create a private overlay network that spans across multiple cloud providers or data centers, such as AWS and Hetzner. This allows you to replicate a similar network topology and configuration in Hetzner as you have in AWS, with some modifications. Here's how it works:
By using Nebula as a bridge between your cloud providers, you can create a unified private network that connects resources in different environments, such as AWS and Hetzner, with relative ease. However, keep in mind that there may still be some cloud-specific configurations and adjustments required in your Terraform code to match the nuances of each provider's infrastructure. |
Beta Was this translation helpful? Give feedback.
-
Now supported, see docs. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
This would help reduce fees and more. See the discussion started in #837
Beta Was this translation helpful? Give feedback.
All reactions