Skip to content

Commit

Permalink
Remove Tailscale example from focs
Browse files Browse the repository at this point in the history
  • Loading branch information
sergioisidoro committed Jan 26, 2024
1 parent 0508338 commit 19a5eb7
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion readme.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ This is heavily inspired and a lot of things replicated from [TADS Boilerplate p

## Important notes
- `public-network` is the network all services need to be if you want them public so Traefik can find them.
- It is strongly advised to put Portainer behind a VPN or internal network. To block access from the internet, you can add `internal_services_ip_whitelist` to the variables, allowing only certain IPs. If you're using Tailscale you could do `internal_services_ip_whitelist="100.64.0.0/10"` such that only devices and nodes in that network can communicate with the web interfaces.
- It is strongly advised to put Portainer behind a VPN or internal network. To block access from the internet, you can add `internal_services_ip_whitelist` to the variables, allowing only certain IPs.
- Remember to put annotations on the `deploy` section so that Traefik can find your services across all nodes.
- By default all non necessary incoming ports are CLOSED in the firewall. SSH is limited. If you want to open other ports
- set `default_ufw_default_inbound_rule: 'allow'` on your cluster variables to accept traffic from any port - SCARY
Expand Down

0 comments on commit 19a5eb7

Please sign in to comment.