Skip to content
This repository has been archived by the owner on Jun 16, 2023. It is now read-only.

Commit

Permalink
upgrade to 0.9.4
Browse files Browse the repository at this point in the history
  • Loading branch information
bsherman committed Jan 24, 2022
1 parent 0db33d3 commit 7fd96f1
Show file tree
Hide file tree
Showing 2 changed files with 6 additions and 6 deletions.
8 changes: 4 additions & 4 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,9 +6,9 @@ This is a sample traefik configuration for running Netmaker. It's mostly based o

Note you can mostly follow the instructons from [Netmaker Quick Start](https://docs.netmaker.org/quick-start.html) except for a few differences.

1. Prepare DNS - no change
2. Install Dependencies - no change
3. Open Firewall - no change (though this config does expect you'll have firewall allowing private access to your traefik dashboard)
1. Prepare DNS - as instructed
2. Install Dependencies - as instructed
3. Open Firewall - as instructed (though this config does expect you'll have firewall allowing private access to your traefik dashboard)
4. Install Netmaker - Instead of using `sed` commands to modify the `docker-config.yml` I suggest using a `.env` file to store your private/config vars.
So, `cp sample.env .env`.
Modify this `.env` file similarly to how it is suggested by "Quick Start" step 4, though don't change anything in the `docker-compose.yml` file, and only change VALUEs in the `.env` file, not the key/variable names themselves.
Expand Down Expand Up @@ -50,5 +50,5 @@ This detail is provided for the curious.

It is important to note that in this default configuration the `netmaker` server automatically registers itself as a client named `netmaker` for each network created. However, instead of running a `netclient` process like typical clients, `CLIENT_MODE: on` means its client is embedded in the server. This allows simple automated behavior and enablement of both the the UDP hole punching and egress gateway routing features. The simple mode is accomplished by providing the `netmaker` container privileged access to the host system, thus allowing it to manage all wireguard and iptables packet handling for the system.

The previous release had pulled all this management into the container itself, however, it led to one potentially significant limitation for the default configuration... remote client members of a managed network were NOT able to access the netmaker host system via the netmaker managed networks. For example, if you had a client at `10.10.10.2` it would not be able to SSH to netmaker host system at `10.10.10.1`, the user would need to SSH to the host's public IP.
A previous release had pulled all this management into the container itself, however, it led to one potentially significant limitation for the default configuration... remote client members of a managed network were NOT able to access the netmaker host system via the netmaker managed networks. For example, if you had a client at `10.10.10.2` it would not be able to SSH to netmaker host system at `10.10.10.1`, the user would need to SSH to the host's public IP.

4 changes: 2 additions & 2 deletions docker-compose.yml
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ version: "3.4"
services:
netmaker:
container_name: netmaker
image: gravitl/netmaker:v0.9.3
image: gravitl/netmaker:v0.9.4
volumes:
- /var/run/dbus/system_bus_socket:/var/run/dbus/system_bus_socket
- /run/systemd/system:/run/systemd/system
Expand Down Expand Up @@ -52,7 +52,7 @@ services:
container_name: netmaker-ui
depends_on:
- netmaker
image: gravitl/netmaker-ui:v0.9.3
image: gravitl/netmaker-ui:v0.9.4
links:
- "netmaker:api"
environment:
Expand Down

0 comments on commit 7fd96f1

Please sign in to comment.