First drop into the kind-worker container
podman exec -ti kind-worker /bin/bash
install the wireguard-tools package without any of the additional recommended packages
root@kind-worker# apt-get install --no-install-recommends wireguard-tools
install some helpers you may want for diagnostic testing and conf tweaking.
root@kind-worker# apt install -y vim iputils-ping netcat
Generate the wgD link keys. You'll need the public cat for the workstation side configuration.
root@kind-worker# wg genkey | tee /etc/wireguard/wgD.key | wg pubkey > /etc/wireguard/wgD.pub
root@kind-worker# cat /etc/wireguard/wgD.pub
In a different terminal, prep the keys for the workstation side of the tunnel
root@workstation# wg genkey | tee /etc/wireguard/wgK.key | wg pubkey > /etc/wireguard/wgK.pub
root@workstatation# cat /etc/wireguard/wgK.pub
install the wgK.conf into the workstation side and start up the wg-quick service Note: You'll need to edit the wgK.conf to include kind node-side wgD device specifics
root@workstation# systemctl start wg-quick@wgK
install the wgD.conf into the kind node and start up the wg-quick service Note: You'll need to edit the wgD.conf to include workstation-side wgK device specifics
root@kind-worker# systemctl start wg-quick@wgD
at this point yould should be able to connect across the wgK <-> wgD tunnel using the netcat and ping tools.