doble entrada nginx y alineacion con wireguard
This commit is contained in:
@@ -6,6 +6,7 @@ metadata:
|
|||||||
spec:
|
spec:
|
||||||
type: LoadBalancer
|
type: LoadBalancer
|
||||||
loadBalancerIP: 192.168.200.10
|
loadBalancerIP: 192.168.200.10
|
||||||
|
externalTrafficPolicy: Local
|
||||||
selector:
|
selector:
|
||||||
app.kubernetes.io/name: ingress-nginx
|
app.kubernetes.io/name: ingress-nginx
|
||||||
ports:
|
ports:
|
||||||
|
|||||||
@@ -24,9 +24,9 @@ spec:
|
|||||||
- name: WG_DEFAULT_ADDRESS
|
- name: WG_DEFAULT_ADDRESS
|
||||||
value: "192.168.254.x"
|
value: "192.168.254.x"
|
||||||
- name: WG_DEFAULT_ALLOWEDIPS
|
- name: WG_DEFAULT_ALLOWEDIPS
|
||||||
value: "192.168.0.0/24,10.42.0.0/16"
|
value: "192.168.0.0/24,10.42.0.0/16,192.168.200.0/24"
|
||||||
- name: WG_DEFAULT_DNS
|
- name: WG_DEFAULT_DNS
|
||||||
value: "192.168.0.1"
|
value: "192.168.200.11"
|
||||||
- name: PASSWORD_HASH
|
- name: PASSWORD_HASH
|
||||||
valueFrom:
|
valueFrom:
|
||||||
secretKeyRef:
|
secretKeyRef:
|
||||||
|
|||||||
65
wireguard/deployments/iptables.yaml
Normal file
65
wireguard/deployments/iptables.yaml
Normal file
@@ -0,0 +1,65 @@
|
|||||||
|
apiVersion: apps/v1
|
||||||
|
kind: DaemonSet
|
||||||
|
metadata:
|
||||||
|
name: wg-nat-rules
|
||||||
|
namespace: wireguard
|
||||||
|
spec:
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
app: wg-nat-rules
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
app: wg-nat-rules
|
||||||
|
spec:
|
||||||
|
hostNetwork: true
|
||||||
|
containers:
|
||||||
|
- name: iptables
|
||||||
|
image: alpine:latest
|
||||||
|
securityContext:
|
||||||
|
privileged: true
|
||||||
|
command:
|
||||||
|
- /bin/sh
|
||||||
|
- -c
|
||||||
|
- |
|
||||||
|
set -e
|
||||||
|
# Variables (ajústalas si cambian)
|
||||||
|
WG_IF="wg0"
|
||||||
|
WG_SUBNET="192.168.254.0/24" # subred de tus peers en wg-easy
|
||||||
|
LB200_CIDR="192.168.200.0/24" # red br-srv / MetalLB (Ingress / servicios internos)
|
||||||
|
LAN_CIDR="192.168.0.0/24" # tu LAN clásica
|
||||||
|
POD_CIDR="10.244.0.0/16" # Pod CIDR (opcional)
|
||||||
|
SVC_CIDR="10.96.0.0/12" # Service CIDR (opcional)
|
||||||
|
|
||||||
|
# Herramientas
|
||||||
|
apk add --no-cache iptables iproute2 >/dev/null 2>&1 || true
|
||||||
|
|
||||||
|
# IP forward y rp_filter (no hagas fallar el contenedor si no deja)
|
||||||
|
sysctl -w net.ipv4.ip_forward=1 || true
|
||||||
|
sysctl -w net.ipv4.conf.all.rp_filter=0 || true
|
||||||
|
sysctl -w net.ipv4.conf.default.rp_filter=0 || true
|
||||||
|
|
||||||
|
# FORWARD: permite tráfico desde wg0 hacia 200.x y 0.x, y retorno
|
||||||
|
iptables -C FORWARD -i ${WG_IF} -d ${LB200_CIDR} -j ACCEPT 2>/dev/null || \
|
||||||
|
iptables -A FORWARD -i ${WG_IF} -d ${LB200_CIDR} -j ACCEPT
|
||||||
|
iptables -C FORWARD -i ${WG_IF} -d ${LAN_CIDR} -j ACCEPT 2>/dev/null || \
|
||||||
|
iptables -A FORWARD -i ${WG_IF} -d ${LAN_CIDR} -j ACCEPT
|
||||||
|
iptables -C FORWARD -o ${WG_IF} -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT 2>/dev/null || \
|
||||||
|
iptables -A FORWARD -o ${WG_IF} -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
|
||||||
|
|
||||||
|
# NAT: WG -> 200.x (Ingress/DNS internos)
|
||||||
|
iptables -t nat -C POSTROUTING -s ${WG_SUBNET} -d ${LB200_CIDR} -j MASQUERADE 2>/dev/null || \
|
||||||
|
iptables -t nat -A POSTROUTING -s ${WG_SUBNET} -d ${LB200_CIDR} -j MASQUERADE
|
||||||
|
|
||||||
|
# NAT: WG -> 192.168.0.0/24 (LAN)
|
||||||
|
iptables -t nat -C POSTROUTING -s ${WG_SUBNET} -d ${LAN_CIDR} -j MASQUERADE 2>/dev/null || \
|
||||||
|
iptables -t nat -A POSTROUTING -s ${WG_SUBNET} -d ${LAN_CIDR} -j MASQUERADE
|
||||||
|
|
||||||
|
# (Opcional) NAT: WG -> Pod/Service CIDR si alguna vez accedes a Pods/ClusterIP
|
||||||
|
# iptables -t nat -C POSTROUTING -s ${WG_SUBNET} -d ${POD_CIDR} -j MASQUERADE 2>/dev/null || \
|
||||||
|
# iptables -t nat -A POSTROUTING -s ${WG_SUBNET} -d ${POD_CIDR} -j MASQUERADE
|
||||||
|
# iptables -t nat -C POSTROUTING -s ${WG_SUBNET} -d ${SVC_CIDR} -j MASQUERADE 2>/dev/null || \
|
||||||
|
# iptables -t nat -A POSTROUTING -s ${WG_SUBNET} -d ${SVC_CIDR} -j MASQUERADE
|
||||||
|
|
||||||
|
# Mantener vivo
|
||||||
|
sleep infinity
|
||||||
Reference in New Issue
Block a user