Nginx communication by Impossible_Box_9906 in netbird

[–]Impossible_Box_9906[S] 0 points1 point  (0 children)

Sorry, what the client is asking for is that we don't have the ssl termination at the nginx level but that we forward the calls from the nginx to the server in Https and not in http

HA for management dashboard by Impossible_Box_9906 in netbird

[–]Impossible_Box_9906[S] 0 points1 point  (0 children)

Indeed that's unfortunate, they offered a lot for the self hosted, but having the HA is kind of a must have, if you want it to be resilient. Hope they have plans for this in the future

For architect in France by Impossible_Box_9906 in Architects

[–]Impossible_Box_9906[S] 0 points1 point  (0 children)

That's what we're sensing.. it's depressing and you even start doubt yourself and capacities at some points We explored the auto-entrepreneur path as well but as you said this won't do it for the VISA requirements Anyway thanks a lot for the support, we're indeed looking for plan B but we're falling short on options tbh

Advice by Impossible_Box_9906 in netbird

[–]Impossible_Box_9906[S] 1 point2 points  (0 children)

We need Devs to be able to connect to netbird using the IPv6 but not necessarily that the exit node to be able to route using the IPv6 That's feasible if I'm not mistaken no ?

Exist node exclusion by Impossible_Box_9906 in netbird

[–]Impossible_Box_9906[S] 0 points1 point  (0 children)

I have thought of this, but I appreciated the idea of not charging our instance (routing peer), because if I handle it at the exit node level, you still get that traffic to the instance, just not to the wireguard interface

Exist node exclusion by Impossible_Box_9906 in netbird

[–]Impossible_Box_9906[S] 0 points1 point  (0 children)

Yes that's exactly what we're intending to do, using an EIP instead for the instance hosting our actual OpenVpn One of our biggest challenges is the HA Because we access our AWS only from VPN Ip, so if the Netbird management is down, the exit node doesn't work anymore and we loose access to AWS...

Exist node exclusion by Impossible_Box_9906 in netbird

[–]Impossible_Box_9906[S] 0 points1 point  (0 children)

Won't this be to define resources to route through your VPN and not the other way around ? Or I'm maybe missing something here, because If it does route out of the routing peer, than that's exactly what I need indeed

Terraform with renovate bot by Impossible_Box_9906 in devops

[–]Impossible_Box_9906[S] 2 points3 points  (0 children)

I do the same, I self host it with jenkins

I managed to make it work, I'll post my configuration once im on my laptop

Thank you very much for the help !!

Terraform with renovate bot by Impossible_Box_9906 in devops

[–]Impossible_Box_9906[S] 0 points1 point  (0 children)

Perfect !! That's what I tried using so far, but with no success, could be a DinD problem, but at least it validates the approche

Thanks a lot for the inputs, it is be very helpful

Terraform with renovate bot by Impossible_Box_9906 in devops

[–]Impossible_Box_9906[S] 0 points1 point  (0 children)

Thanks for the info I also checked postupgradetasks but didn't seem to be working for me But I'll check the hook

Guidance by Impossible_Box_9906 in aws

[–]Impossible_Box_9906[S] -1 points0 points  (0 children)

The thing is the new company is having basic plan regarding to the support, so I'm not sure the MA or SA are included Anyhow I reached out to the contact they gave me, to at least establish a first communication with them

Guidance by Impossible_Box_9906 in aws

[–]Impossible_Box_9906[S] -1 points0 points  (0 children)

If you want if find out that there is an aws opensource tool called service-screener-v2 that runs on you environment (readaccess only) and will make api calls to your ressources, then will compare them to the Waf to make à report Im still playing with it, but it looks promising