Subnet
-
wrote on Oct 4, 2022, 2:43 PM last edited by girish Oct 5, 2022, 9:37 PM
I have an 8-IP subnet that gives me 5 usable IPs after the router takes one. Now I have Cloudron working fine using one of my static IPs. Can I edit the netplan config file and added the other IP's for my other domains and then added those to Coudron setup and it all works or will it crash big time. Currently i have two domain defined in Cloudflare I have several more I can put on there server.
-
wrote on Oct 4, 2022, 3:05 PM last edited by
Is there a reason you don't want to point all domains to your Cloudron IP address? AFAIK Cloudron is designed to use just one IPv4/IPv6 address. You can have multiple network interfaces but Cloudron will only listen to one of them. See the docs for more details.
-
wrote on Oct 4, 2022, 6:04 PM last edited by
You may also wish to set up IP aliases on the Cloudron IP interface ex:
eth0:[0-3]
, so all IPs go there. -
As @subven said, the code currently handles only one IPv4/IPv6 address. I would also be interested in knowing why you would want to assign multiple IPs though to the server.
-
@girish
I am not OP, but wouldn't that be useful to provide some Apps to an internal network and some for an external network only? -
@krumel Indeed, that would be possible if the server has NICs - one internal and one external. Is this setup common in practice?
wrote on Oct 19, 2022, 6:44 PM last edited by@girish
Well, especially in setups where Cloudron is on a VM I recon it is somewhat common - just from Reddit alone I know quite a few people who use a similar setup to mine:Personally my instance is on a Proxmox host in a DMZ,we have separate networks for purely internal services and for non-cloudron external services (and a purely management network as well). For some services we use MacVLAN on docker to provide separate IPs for containers.
While this absolutely could be achieved with VLANs as well, in a Proxmox environment it was easier to use "physically" separate networks and route them properly through an OPN Sense VM.In theory one surely could use two Cloudron instances, but that would first be quite expensive, but also limit some backend functionality imho.
Kind regards,
Phil -
@krumel Indeed, that would be possible if the server has NICs - one internal and one external. Is this setup common in practice?
wrote on Oct 19, 2022, 7:04 PM last edited byIn the "common" scenario you maintain an network internal DNS server that routes traffic for some requests or (sub)domains to internal resources for security, development or testing purposes. Similiar to what you could do with your hosts file but at network level where sometimes resources are only accessible via VPN. Every request that is not served by the internal DNS will be forwarded to the external (real) DNS server that is in charge of the domain.
There are some cases where you separate traffic with NICs (like for management interfaces) but in case of Cloudron this could already be solved by unbound. Most use cases are solveable this way and there is already documentation present.
Lets say you don't want to expose the dashboard to the public. You can block the routing to my.domain.com (or wherever your dashboard is at) with your network or VPS providers firewall for sure. In some cases you will lose access as well and other services can be affected so maaaaybe it could help to seperate services to different NICs....but personally I'm fine with the way Cloudron works.
-
In the "common" scenario you maintain an network internal DNS server that routes traffic for some requests or (sub)domains to internal resources for security, development or testing purposes. Similiar to what you could do with your hosts file but at network level where sometimes resources are only accessible via VPN. Every request that is not served by the internal DNS will be forwarded to the external (real) DNS server that is in charge of the domain.
There are some cases where you separate traffic with NICs (like for management interfaces) but in case of Cloudron this could already be solved by unbound. Most use cases are solveable this way and there is already documentation present.
Lets say you don't want to expose the dashboard to the public. You can block the routing to my.domain.com (or wherever your dashboard is at) with your network or VPS providers firewall for sure. In some cases you will lose access as well and other services can be affected so maaaaybe it could help to seperate services to different NICs....but personally I'm fine with the way Cloudron works.
wrote on Oct 20, 2022, 7:26 PM last edited by@subven
Security wise that is a quite limited scenario.
This would mean that internal clients would need external access for services that are both internal and external- a scenario that is often undesired.
DNS is never a security measure. -
-
wrote on Oct 21, 2022, 4:50 PM last edited by
-
-
-