feat: integrate tailscale access and lock SSH/API to tailnet
This commit is contained in:
@@ -3,6 +3,11 @@ output "control_plane_ips" {
|
||||
value = [for cp in hcloud_server.control_plane : cp.ipv4_address]
|
||||
}
|
||||
|
||||
output "control_plane_names" {
|
||||
description = "Control plane hostnames"
|
||||
value = [for cp in hcloud_server.control_plane : cp.name]
|
||||
}
|
||||
|
||||
output "control_plane_private_ips" {
|
||||
description = "Private IPs of control plane nodes"
|
||||
value = [for cp in hcloud_server.control_plane : one(cp.network).ip]
|
||||
@@ -18,6 +23,11 @@ output "worker_ips" {
|
||||
value = [for worker in hcloud_server.workers : worker.ipv4_address]
|
||||
}
|
||||
|
||||
output "worker_names" {
|
||||
description = "Worker hostnames"
|
||||
value = [for worker in hcloud_server.workers : worker.name]
|
||||
}
|
||||
|
||||
output "worker_private_ips" {
|
||||
description = "Private IPs of worker nodes"
|
||||
value = [for worker in hcloud_server.workers : one(worker.network).ip]
|
||||
@@ -33,6 +43,11 @@ output "cluster_name" {
|
||||
value = var.cluster_name
|
||||
}
|
||||
|
||||
output "tailscale_tailnet" {
|
||||
description = "Tailnet domain suffix"
|
||||
value = var.tailscale_tailnet
|
||||
}
|
||||
|
||||
output "network_cidr" {
|
||||
description = "Private network CIDR"
|
||||
value = var.subnet_cidr
|
||||
|
||||
Reference in New Issue
Block a user