You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
feat: Add use_nftables option, bump Kubernetes and addons (#40)
* feat: Add use_nftables option, bump Kubernetes and addons
- Add `use_nftables` variable (default true) controlling kube-proxy
mode and wigglenet's firewall backend; defaults give nftables on
both, false falls back to iptables on both. Gate wigglenet's
xtables-lock mount behind iptables mode.
- Bump wigglenet to v0.6.1, Kubernetes default to v1.35.3, Hetzner
CCM to v1.30.1, CSI driver to v2.20.0, sidecars updated to match.
- Install nftables userland on all distros so admins can inspect
rules regardless of the active backend.
- Bump default server type from cpx31 to cpx32 across the module
and all examples; bump tested Fedora image to fedora-43.
- Fix `vars.hetzner_token` typo in examples/{simple,cloud_init,private_network}.tf.
- README: drop stale ipvs/LoadBalancer hostname caveat, refresh
example kubectl output to v1.35.3.
* change server sku
@@ -80,7 +80,7 @@ The module should work on most major RPM and DEB distros. It been tested on thes
80
80
81
81
- Ubuntu 24.04 (`ubuntu-24.04`)
82
82
- Debian 13 (`debian-13`)
83
-
- Fedora 42 (`fedora-42`)
83
+
- Fedora 43 (`fedora-43`)
84
84
85
85
Others may work as well, but have not been tested.
86
86
@@ -192,15 +192,13 @@ See [example](./examples/private_network.tf) for more details.
192
192
Read these notes carefully before using this module in production.
193
193
194
194
- Control plane services that use host networking, such as etcd, kubelet and api-server bind on a public IP. This is not a problem per se since these components all use mTLS for communication, but appropriate Hetzner Firewall rules can be added (make sure to allow UDP port 24601 for Wireguard node-to-node tunnels)
195
-
- Wigglenet is a custom network plugin with a smaller community than mainstream alternatives like Cilium or Calico. It has been used successfully for several years,
196
-
though primarily in smaller-scale deployments. NetworkPolicy support was added in v0.5.0 and is relatively new, so don't use it as your only line of defense.
195
+
- Wigglenet is a custom network plugin with a smaller community than mainstream alternatives like Cilium or Calico. It has been used successfully for several years, though primarily in smaller-scale deployments.
197
196
- kubelet serving certificates are self-signed. This can be an issue for metrics-server. See [here for details and workarounds](https://kubernetes.io/docs/tasks/administer-cluster/kubeadm/kubeadm-certs/#kubelet-serving-certs).
198
197
- Some restrictions on day-2 operations. The following are supported seamlessly, but other changes will likely require the manual steps:
199
198
- Node replacement (see notes above for control plane nodes)
200
199
- Vertical scaling of node (changing the server type)
201
200
- Horizontal scaling (changing node count).
202
201
- Changing cluster addons settings (Wigglenet firewall settings, Hetzner API token for the Hetzner CCM and CSI).
203
-
- As kube-proxy is configured to use IPVS mode, `load-balancer.hetzner.cloud/hostname: <hostname>` must be set on all `LoadBalancer` services, otherwise healthchecks will fail and the service will not be accessible from outsie the cluster (see [this issue](https://github.com/kubernetes/kubernetes/issues/79783) for more details)
204
202
205
203
In addition some caveats for dual-stack clusters in general:
0 commit comments