1
Server / Re:Instalace OKD v odděleném prostředí
« kdy: 09. 12. 2025, 04:23:29 »Kód: [Vybrat]
skopeo copy --all docker://source-registry/image-name:tag docker://destination-registry/image-name:tag
Tato sekce Vám umožňuje zobrazit všechny příspěvky tohoto uživatele. Prosím uvědomte si, že můžete vidět příspěvky pouze z oblastí Vám přístupných.
skopeo copy --all docker://source-registry/image-name:tag docker://destination-registry/image-name:tag
CitaceThe keyword allowed-ips is a list of addresses that will get routed to the peer. Make sure to specify at least one address range that contains the WireGuard connection's internal IP address(es).Kód: [Vybrat]
[Interface]
Address = 10.1.1.5/...
PrivateKey = DeviceA
[Peer]
PublicKey = VEREJNY_KLIC
AllowedIPs = 0.0.0.0/0
Endpoint = IP:PORT
routování dořešit na konci tunelu.
CitaceThe keyword allowed-ips is a list of addresses that will get routed to the peer. Make sure to specify at least one address range that contains the WireGuard connection's internal IP address(es).Kód: [Vybrat][Peer]
PublicKey = VEREJNY_KLIC_DEVICEA
AllowedIPs = 0.0.0.0/0
Endpoint = IP:PORT
Mas zapnuty forwarding a zaroven povoleny na firewallu?
ip rule add from 10.1.1.5 table custom
ip route add default via 10.1.1.10 dev wg0 table custom
Tracing the path to 77.75.75.172 on TCP port 443 (https), 30 hops max
1 10.1.1.1 17.309 ms 15.260 ms 15.863 ms
2 10.1.1.1 15.743 ms !H * *
[Peer]
PublicKey = VEREJNY_KLIC_DEVICEA
AllowedIPs = 10.1.1.5/32
Endpoint = IP:PORT
[Peer]
PublicKey = VEREJNY_KLIC_TURRIS
AllowedIPs = 10.1.1.10/32
Endpoint = IP:PORT
Chain PREROUTING (policy ACCEPT)
target prot opt source destination
Chain INPUT (policy ACCEPT)
target prot opt source destination
Chain POSTROUTING (policy ACCEPT)
target prot opt source destination
SNAT all -- 10.1.1.0/24 anywhere to:VERJENA_IP_SERVERU
Chain OUTPUT (policy ACCEPT)
target prot opt source destination