Nodes with public IPv6 only #837
Replies: 4 comments 5 replies
-
@lpellegr It's a good idea, and would solve one long standing issue with some of the IPv4 being wrongfully blacklisted and unable to pull containers from gcr. We already have partial IPv6 support for outside nodes, now if we can turn off IPv4 for the outside node IPs (not the private network) it would be ideal and would solve the aforementioned issue. Please don't hesitate to submit a PR if interested. |
Beta Was this translation helpful? Give feedback.
-
@mysticaltech Thanks for your answer. Looking at Terraform configuration files (that's my first time reading Terraform syntax!) it looks like the file at the following line requires changes: https://github.com/kube-hetzner/terraform-hcloud-kube-hetzner/blob/master/modules/host/main.tf#L32 Terraform hetznercloud provider docs describes how to select whether to assign an IPv4, an IPv6, or both upon server creation: We could add 2 new variables like without_ipv4 and without_ipv6 (e.g. following hcloud cli option names). In that case, they must be mutually exclusive. Their default value would be I guess variable definitions would be there: This change would require extensive testing. Especially with I will see for a PR when I have more time. |
Beta Was this translation helpful? Give feedback.
-
Implementing a Nebula Network could bridge limiting factors with Hetzner IPv6 only VMsImplement a Nebula network with Terraform to address certain limitations and improve network connectivity within a Hetzner environment. Addressing LimitationsIPv6-Only EnvironmentHetzner provides IPv6-only virtual machines (VMs), which can pose challenges when dealing with IPv4-only resources or external network access. Nebula can help bridge the gap between IPv4 and IPv6 networks. Limited External ConnectivityIn an IPv6-only environment, issues may arise when trying to access resources that do not support IPv6, such as DockerHub or GHCR.io. Nebula can provide a private overlay network, potentially allowing servers to access external resources through a proxy or caching mechanism. Implementing Nebula with TerraformTo implement Nebula with Terraform, follow these steps:
Benefits of Using NebulaImplementing Nebula with Terraform offers several benefits:
graph TD
subgraph "Addressing Limitations"
subgraph "IPv6-Only Environment"
A((Hetzner IPv6-only VMs))
B(Nebula Bridge)
C((IPv4-Only Resources))
A -->|IPv6| B
B -->|Nebula Overlay| C
end
subgraph "Limited External Connectivity"
D((IPv6-Only Environment))
E(Nebula Overlay)
F((External Resources))
D -->|Nebula Overlay| E
E -->|Proxy/Caching| F
end
end
subgraph "Implementing Nebula with Terraform"
G["Nebula Configuration"]
H["Terraform Resources"]
I["Node Configuration"]
J["Network Isolation"]
K["Testing and Validation"]
G --> H
H --> I
I --> J
J --> K
end
subgraph "Benefits of Using Nebula"
L["IPv4/IPv6 Bridging"]
M["Security"]
N["Routing Control"]
O["Mitigating External Connectivity Issues"]
L --> M
M --> N
N --> O
end
|
Beta Was this translation helpful? Give feedback.
-
Now supported, see docs. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
I am new to kube-hetzner and this looks like a fantastic project.
While checking my first configuration file (
kube.tf
), I was thinking about the following.Hetzner charges extra for a public IPv4 but nothing for a public IPv6. In the case we do not need a public IPv4 for nodes, I was wondering if there is a way to define in
kube.tf
that nodes in nodepools, or a nodepool should allocate nodes with no public IPv4, thus allowing to minimize pricing?Beta Was this translation helpful? Give feedback.
All reactions