WireGuard¶
Privileges¶
WireGuard will need some specific privileges to be able to NAT traffic and redirect your requests. Consider using sysctls options on your nodes. You need to specify it at kubelet level:
net.ipv4.ip_forwardnet.ipv4.conf.all.src_valid_mark
For example in k0s :
---
apiVersion: k0sctl.k0sproject.io/v1beta1
kind: Cluster
metadata:
name: fullstack
user: admin
spec:
hosts:
- role: single
installFlags:
- --debug
- --disable-components=autopilot,helm,windows-node,konnectivity-server
- --kubelet-extra-args="--allowed-unsafe-sysctls=net.ipv4.ip_forward,net.ipv4.conf.all.src_valid_mark"
And your also need to specify it at pod level as well as NET_ADMIN capability: