Skip to content

Commit

Permalink
note about older installations
Browse files Browse the repository at this point in the history
  • Loading branch information
chadgeary committed Nov 12, 2020
1 parent 67f2183 commit 3cd1e98
Show file tree
Hide file tree
Showing 5 changed files with 12 additions and 8 deletions.
4 changes: 2 additions & 2 deletions aws/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -150,7 +150,7 @@ Edit the vars file (aws.tfvars) to customize the deployment, especially:

# FAQs
- Want to reach the PiHole webUI while away?
- Connect to the Wireguard VPN and browse to Pihole VPN IP in the terraform output ( by default, its https://172.18.0.5/admin/ ).
- Connect to the Wireguard VPN and browse to Pihole VPN IP in the terraform output ( by default, its https://172.18.0.5/admin/ - for older installations its http://172.18.0.3/admin/ ).

- Using an ISP with a dynamic IP (DHCP) and the IP address changed? Pihole webUI and SSH access will be blocked until the mgmt_cidr is updated.
- Follow the steps below to quickly update the cloud firewall using terraform.
Expand All @@ -165,6 +165,6 @@ cd ~/cloudblock/aws/
# Update the mgmt_cidr variable - be sure to replace change_me with your public IP address
sed -i -e "s#^mgmt_cidr = .*#mgmt_cidr = \"change_me/32\"#" aws.tfvars
# Rerun terraform apply, terraform will update the cloud firewall rules.
# Rerun terraform apply, terraform will update the cloud firewall rules
terraform apply -var-file="aws.tfvars"
```
4 changes: 2 additions & 2 deletions azure/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -151,7 +151,7 @@ terraform apply -var-file="az.tfvars"

# FAQs
- Want to reach the PiHole webUI while away?
- Connect to the Wireguard VPN and browse to Pihole VPN IP in the terraform output ( by default, its https://172.18.0.5/admin/ ).
- Connect to the Wireguard VPN and browse to Pihole VPN IP in the terraform output ( by default, its https://172.18.0.5/admin - for older installations its http://172.18.0.3/admin/ ).

- Using an ISP with a dynamic IP (DHCP) and the IP address changed? Pihole webUI and SSH access will be blocked until the mgmt_cidr is updated.
- Follow the steps below to quickly update the cloud firewall using terraform.
Expand All @@ -166,6 +166,6 @@ cd ~/cloudblock/azure/
# Update the mgmt_cidr variable - be sure to replace change_me with your public IP address
sed -i -e "s#^mgmt_cidr = .*#mgmt_cidr = \"change_me/32\"#" az.tfvars
# Rerun terraform apply, terraform will update the cloud firewall rules.
# Rerun terraform apply, terraform will update the cloud firewall rules
terraform apply -var-file="az.tfvars"
```
4 changes: 2 additions & 2 deletions gcp/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -160,7 +160,7 @@ Edit the vars file (gcp.tfvars) to customize the deployment, especially:

# FAQs
- Want to reach the PiHole webUI while away?
- Connect to the Wireguard VPN and browse to Pihole VPN IP in the terraform output ( by default, its https://172.18.0.5/admin/ ).
- Connect to the Wireguard VPN and browse to Pihole VPN IP in the terraform output ( by default, its https://172.18.0.5/admin/ - for older installations its http://172.18.0.3/admin/ ).

- Using an ISP with a dynamic IP (DHCP) and the IP address changed? Pihole webUI and SSH access will be blocked until the mgmt_cidr is updated.
- Follow the steps below to quickly update the cloud firewall using terraform.
Expand All @@ -175,6 +175,6 @@ cd ~/cloudblock/gcp/
# Update the mgmt_cidr variable - be sure to replace change_me with your public IP address
sed -i -e "s#^mgmt_cidr = .*#mgmt_cidr = \"change_me/32\"#" gcp.tfvars
# Rerun terraform apply, terraform will update the cloud firewall rules.
# Rerun terraform apply, terraform will update the cloud firewall rules
terraform apply -var-file="gcp.tfvars"
```
4 changes: 2 additions & 2 deletions oci/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -170,7 +170,7 @@ Edit the vars file (oci.tfvars) to customize the deployment, especially:

# FAQs
- Want to reach the PiHole webUI while away?
- Connect to the Wireguard VPN and browse to Pihole VPN IP in the terraform output ( by default, its https://172.18.0.5/admin/ ).
- Connect to the Wireguard VPN and browse to Pihole VPN IP in the terraform output ( by default, its https://172.18.0.5/admin/ - for older installations its http://172.18.0.3/admin/ ).

- Using an ISP with a dynamic IP (DHCP) and the IP address changed? Pihole webUI and SSH access will be blocked until the mgmt_cidr is updated.
- Follow the steps below to quickly update the cloud firewall using terraform.
Expand All @@ -185,6 +185,6 @@ cd ~/cloudblock/oci/
# Update the mgmt_cidr variable - be sure to replace change_me with your public IP address
sed -i -e "s#^mgmt_cidr = .*#mgmt_cidr = \"change_me/32\"#" oci.tfvars
# Rerun terraform apply, terraform will update the cloud firewall rules.
# Rerun terraform apply, terraform will update the cloud firewall rules
terraform apply -var-file="oci.tfvars"
```
4 changes: 4 additions & 0 deletions playbooks/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -38,3 +38,7 @@ The IP address variables should be changed if they'll conflict/overlap local net

# Client Remote Wireguard Connectivity / Port Forwarding
Port 51820 must be open/forwarded to this host.

# FAQs
- Want to reach the PiHole webUI while away?
- Connect to the Wireguard VPN and browse to Pihole VPN IP in the terraform output ( by default, its https://172.18.0.5/admin/ - for older installations its http://172.18.0.3/admin/ ).

0 comments on commit 3cd1e98

Please sign in to comment.