Add host port exposure for IP passthrough instead of overlay IP
This commit is contained in:
parent
76fe7241af
commit
d3e5f962fe
@ -18,6 +18,10 @@ server:
|
||||
cache-min-ttl: 60
|
||||
cache-max-ttl: 960
|
||||
harden-glue: yes
|
||||
remote-control:
|
||||
control-enable: yes
|
||||
control-use-cert: no
|
||||
control-interface: 0.0.0.0
|
||||
forward-zone:
|
||||
name: "."
|
||||
forward-tls-upstream: yes
|
||||
|
16
dns.yml
16
dns.yml
@ -7,6 +7,10 @@ x-logging: &json-log
|
||||
max-file: '5'
|
||||
|
||||
networks:
|
||||
tig_monitoring:
|
||||
external: true
|
||||
#host:
|
||||
# external: true
|
||||
backend:
|
||||
driver: overlay
|
||||
attachable: true
|
||||
@ -29,7 +33,15 @@ services:
|
||||
volumes:
|
||||
- "/etc/hosts:/etc/hosts:ro"
|
||||
ports:
|
||||
- "53:5353/tcp"
|
||||
- "53:5353/udp" # Potentially vulnerable without any ratelimits, see https://www.us-cert.gov/ncas/alerts/TA14-017A
|
||||
- target: 5353
|
||||
published: 53
|
||||
protocol: tcp
|
||||
mode: host
|
||||
- target: 5353
|
||||
published: 53
|
||||
protocol: udp # Potentially vulnerable without any ratelimits, see https://www.us-cert.gov/ncas/alerts/TA14-017A
|
||||
mode: host
|
||||
networks:
|
||||
#- host
|
||||
- backend
|
||||
- tig_monitoring
|
||||
|
Reference in New Issue
Block a user