This commit is contained in:
Michael Quigley 2024-07-09 14:09:02 -04:00
parent 01e7c9fa56
commit 41841d67c0
No known key found for this signature in database
GPG Key ID: 9B60314A9DD20A62

View File

@ -34,7 +34,7 @@ Imagine that we own the domain `example.com`. In our example, we want to expose
We can accomplish this easily with cheap VPS instance. You could also do it with containers through a container hosting service. The VPS will need an IP address exposed to the internet. You'll also need to be able to create DNS entries for the `example.com` domain.
To accomplish this, we're going to run 3 separate `zrok access private` commands on our VPS. One command each for shares `A`, `B`, and `C`. The `zrok access private` command works like this:
To accomplish this, we're going to run 3 separate `zrok access private` commands on our VPS (see the ![frontdoor](../../frontdoor/) guide for details on an approach for setting this up). One command each for shares `A`, `B`, and `C`. The `zrok access private` command works like this:
```
$ zrok access private
@ -64,6 +64,8 @@ Exposing our TCP port for `gaming.example.com` is simply a matter of running a t
Once you've created the appropriate DNS entries for `a.example.com`, `b.example.com`, and `gaming.example.com` and worked through the TLS configuration (letsencrypt is your friend here), you'll have a fully functional personalized frontend for your zrok shares that you control.
Your protected resources remain disconnected from the internet and are only reachable through your personalized endpoint.
## Privacy
When you use a public frontend (with a simple `zrok share public`) at a hosted zrok instance (like zrok.io), the operators of that service have some amount of visibility into what traffic you're sending to your shares. The load balancers in front of the public frontend maintain logs describing all of the URLs that were accessed, as well as other information (headers, etc.) that contain information about the resource you're sharing.