changes due to updates on the iaas api

This commit is contained in:
Michael_Sodan 2025-08-05 08:20:16 +00:00
parent e52df14c7b
commit 18ce6b06a9
2 changed files with 4 additions and 3 deletions

View file

@ -62,7 +62,7 @@ resource "stackit_network_interface" "wan" {
security = true
name = "MGMT"
ipv4 = "10.220.131.10"
allowed_addresses = ["10.220.131.30/32"]
allowed_addresses = ["10.220.131.30/32", "0.0.0.0/0"]
security_group_ids = [stackit_security_group.paloalto.security_group_id]
}
@ -87,7 +87,7 @@ resource "stackit_network_interface" "wan2" {
network_id = stackit_network.wan_network.network_id
security = true
name = "WAN2"
allowed_addresses = ["10.220.131.30/32"]
allowed_addresses = ["10.220.131.30/32", "0.0.0.0/0"]
security_group_ids = [stackit_security_group.paloalto.security_group_id]
}

View file

@ -32,8 +32,9 @@ Two firewalls are deployed with identical network interfaces. A virtual IP (VIP)
- **VIP must not be attached to any instance**
The floating IP (VIP) is managed entirely by the Palo Alto HA configuration. Do **not** associate this IP statically with any compute instance via Terraform.
- **Only /32 allowed in `allowed_addresses`**
- **Setting CIDRs in `allowed_addresses`**
You **must** specify the VIP as a `/32` IP (e.g., `10.220.131.30/32`) — CIDR blocks (e.g., `/24`) are not supported and will be rejected or silently ignored.
You **must** specify the CIDR `0.0.0.0/0` as a second string, this is necessary for a working failover scenario.
- **Routing issues if `allowed_addresses` are missing**
If the VIP is not explicitly added to `allowed_addresses` on each port where it might be active, network traffic will fail silently due to missing neighbor/ARP entries.