diff --git a/hardware/hcloud.nix b/hardware/hcloud.nix index 2bc25c5..ddda34f 100644 --- a/hardware/hcloud.nix +++ b/hardware/hcloud.nix @@ -9,4 +9,5 @@ boot.cleanTmpDir = true; networking.firewall.allowPing = true; + networking.usePredictableInterfaceNames = false; } diff --git a/profiles/backend.nix b/profiles/backend.nix index e6b1589..e6a36a0 100644 --- a/profiles/backend.nix +++ b/profiles/backend.nix @@ -91,7 +91,7 @@ }; }; - networking.interfaces.enp1s0 = { + networking.interfaces.eth1 = { useDHCP = true; ipv4 = { addresses = [ @@ -105,6 +105,6 @@ networking.firewall.allowedTCPPorts = [ 80 443 64738 ]; networking.firewall.allowedUDPPorts = [ 64738 ]; - networking.firewall.interfaces."enp7s0".allowedTCPPorts = [ config.services.prometheus.exporters.node.port ]; + networking.firewall.interfaces."eth2".allowedTCPPorts = [ config.services.prometheus.exporters.node.port ]; } diff --git a/profiles/db.nix b/profiles/db.nix index 9255922..c65b299 100644 --- a/profiles/db.nix +++ b/profiles/db.nix @@ -8,7 +8,7 @@ ../modules/monitoring-exporters.nix ]; - networking.firewall.interfaces."enp7s0".allowedTCPPorts = [ config.services.prometheus.exporters.node.port config.services.postgresql.port ]; + networking.firewall.interfaces."eth2".allowedTCPPorts = [ config.services.prometheus.exporters.node.port config.services.postgresql.port ]; sops.secrets = { borgSshKey = {