Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

capitalize WireGuard #1237

Merged
merged 1 commit into from
Dec 11, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion getting-started/troubleshooting.html.md
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ fly settings autoupdate enable

### Check connectivity with fly doctor

Run some basic connectivity test for things like Wireguard, IP addresses, and local Docker instance:
Run some basic connectivity test for things like WireGuard, IP addresses, and local Docker instance:

```
fly doctor
Expand Down
2 changes: 1 addition & 1 deletion machines/working-with-machines.html.markerb
Original file line number Diff line number Diff line change
Expand Up @@ -53,7 +53,7 @@ If you successfully reach the API, it should respond with a `404 page not found`
Set these environment variables to make the following commands easier to use.

```bash
$ export FLY_API_HOSTNAME="https://api.machines.dev" # set to http://_api.internal:4280 when using Wireguard or `http://127.0.0.1:4280` when using 'flyctl proxy'
$ export FLY_API_HOSTNAME="https://api.machines.dev" # set to http://_api.internal:4280 when using WireGuard or `http://127.0.0.1:4280` when using 'flyctl proxy'
$ export FLY_API_TOKEN=$(fly auth token)
```

Expand Down
2 changes: 1 addition & 1 deletion reference/architecture.html.md
Original file line number Diff line number Diff line change
Expand Up @@ -27,4 +27,4 @@ Every server in our infrastructure runs a Rust-based proxy named `fly-proxy`. Th

### Backhaul

If you have users in Dallas, and an available MicroVM in Chicago, we will accept traffic in Dallas, terminate TLS (unless you've disabled that handler), and then connect to your MicroVM over a Wireguard tunnel between datacenters. Wireguard allows us to pass along almost any kind of network connection with very little additional latency.
If you have users in Dallas, and an available MicroVM in Chicago, we will accept traffic in Dallas, terminate TLS (unless you've disabled that handler), and then connect to your MicroVM over a WireGuard tunnel between datacenters. WireGuard allows us to pass along almost any kind of network connection with very little additional latency.
2 changes: 1 addition & 1 deletion reference/deploy-tokens.html.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,4 +17,4 @@ To get started, generate a deploy token on the Tokens tab of your app dashboard.
FLY_API_TOKEN=$(flyctl tokens create deploy) flyctl deploy
```

Whereas API tokens (`fly auth token`) can manage all of your organizations' apps, deploy tokens are limited to a single application. Some organization-wide features like managing Wireguard tunnels are integral to deployments and are also accessible to deploy tokens.
Whereas API tokens (`fly auth token`) can manage all of your organizations' apps, deploy tokens are limited to a single application. Some organization-wide features like managing WireGuard tunnels are integral to deployments and are also accessible to deploy tokens.
4 changes: 2 additions & 2 deletions reference/machines.html.markerb
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ This guide assumes that you have flyctl and cURL installed, and have authenticat

### Connecting via WireGuard

This method requires more setup but gives you direct access to machines over the Wireguard VPN.
This method requires more setup but gives you direct access to machines over the WireGuard VPN.

First, follow the [instructions](/docs/reference/private-networking/#private-network-vpn) to set up a permanent WireGuard connection to your Fly network. We recommend WireGuard because you can directly test your machines from your local machine.

Expand All @@ -50,7 +50,7 @@ If you successfully reach the API, it should respond with a `404 page not found`

### Setting up the environment

If you are using a Wireguard VPN or `fly proxy`,
If you are using a WireGuard VPN or `fly proxy`,
set these environment variables to make the following commands easier to use.

```bash
Expand Down
2 changes: 1 addition & 1 deletion reference/private-networking.html.md
Original file line number Diff line number Diff line change
Expand Up @@ -93,7 +93,7 @@ Finally, you can discover all the apps in the organization by requesting the TXT
|`regions.<appname>.internal`|none|region names<br/> where app is deployed|
|`<appname>.internal`|app instances<br/> in any region|none
|`_apps.internal`|none|names of all 6PN<br/> private networking apps<br/> in the same organization|
|`_peer.internal`|none|names of all wireguard peers|
|`_peer.internal`|none|names of all WireGuard peers|
|`<peername>._peer.internal`|IPv6 of peer|none|
|`_instances.internal`|none|IDs, apps, addresses, and regions<br>of all running instances<br>comma separated|
|`<value>.<key>.kv._metadata.<appname>.internal`|IPv6 of Machines with matching [metadata](https://community.fly.io/t/dynamic-machine-metadata/13115)|none|
Expand Down