mirror of
https://github.com/netbirdio/docs.git
synced 2026-04-19 08:56:35 +00:00
Adding section regarding Additional configurations for cloud providers (#134)
This commit is contained in:
committed by
GitHub
parent
456f280b2b
commit
710c2dbd63
@@ -184,6 +184,24 @@ Make sure your reverse-Proxy is setup to use the HTTP2-Protocol when forwarding.
|
||||
Simply replace the file `docker-compose.yml.tmpl` with the chosen version.
|
||||
</Note>
|
||||
|
||||
## Advanced: Additional configurations for cloud providers
|
||||
|
||||
### Hetzner
|
||||
Hetzner uses stateless [firewall](https://docs.hetzner.com/robot/dedicated-server/firewall/), which means it doesn't "keep track of" whether or not an incoming packet belongs to an established connection. In this case, you may add to this server firewall an UDP port range equals to the result of:
|
||||
```bash
|
||||
sudo cat /proc/sys/net/ipv4/ip_local_port_range
|
||||
```
|
||||
More info can be found at this GitHub [issue](https://github.com/netbirdio/netbird/issues/390#issuecomment-1185298689).
|
||||
|
||||
### Oracle Cloud Infrastructure (OCI)
|
||||
Linux images provided by Oracle Cloud includes some default [firewall rules](https://docs.oracle.com/en-us/iaas/Content/Compute/References/bestpracticescompute.htm#Essentia) which block ingress UDP on port 3478. This is required by Coturn without which only peers in same LAN would be able to communicate with each other but not peers on different networks. Besides opening [required](#requirements) ports on _Security Rules_, you also need to run below command on the virtual machine.
|
||||
```bash
|
||||
sudo iptables -I INPUT -p udp -m udp --dport 3478 -j ACCEPT
|
||||
```
|
||||
<Note>
|
||||
Oracle Cloud discourages use of UFW. You will have to use IPTABLES.
|
||||
</Note>
|
||||
|
||||
## Backup
|
||||
To backup your NetBird installation, you need to copy the configuration files, and the Management service databases.
|
||||
|
||||
|
||||
Reference in New Issue
Block a user