-
Notifications
You must be signed in to change notification settings - Fork 51
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
GCE Instance/Firewall/Router fix #170
Comments
It seems like it should be ok to make the CIDR 0.0.0.0/0 for outgoing traffic, but perhaps not for incoming? Maybe the solution is to make the CIDR parameter mandatory? Not sure whether there'll be cascading impacts from this though. |
I think in other providers it's not mandatory, and the current behavior is to default to all (I think as in I have not checked again right now). Idk if we can make cidr mandatory if we're also allowing to specify traffic coming through a specific route (I think it's set by network?), but not sure if that's universal for all of them. I can look more into it and see what good options would be. I guess what would be ideal scenario if you know? Then I can look how we can implement it and keep it consistent across providers. |
@almahmoud Is this also fixed? |
I have my own implementation that uses private IPs for AWS and GCP (I have not yet tried to do so with Azure but I will soon) but a problem I am hitting is that by default internal IPs can't connect to the internet at all so instead one has to set up NATs and add them to the subnets. The docs for GCP and AWS are here: https://cloud.google.com/nat/docs/gce-example#gcloud_5 Any thoughts on how hard this would be to implement? I'm looking at the GCP provider now and trying to also see if I can figure out the exact commands in the GCP API. Is there an easy way to translate the gcloud command here into an API command? I suspect there. |
The text was updated successfully, but these errors were encountered: