Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

security: Open ports 9000-9999 inside the cluster for host network services #683

Merged

Commits on Nov 15, 2018

  1. security: Open ports 9000-9999 inside the cluster for host network se…

    …rvices
    
    In OpenShift 3.x we opened 9000-9999 for TCP for all internal connections
    between masters, infra, and workers so that we could have a range that
    host level services inside the cluster could coordinate on. This range
    is analogous to node ports, except unlike node ports it is only available
    on the inside. The most common consumers are node network metrics ports
    (node exporter, cluster version operator, network operator, sdn, node
    proxy) that need to be reachable from prometheus without magic tricks.
    A second set is internal secured services that want to connect but must
    be host network, like gluster, storage services, or other cluster level
    proxies.
    
    Open the range 9000-9999 by default so that new services don't require
    either a reinstall or manual management. Future changes in the platform
    may autoallocate from this range, but for now teams must reserve.
    smarterclayton committed Nov 15, 2018
    Configuration menu
    Copy the full SHA
    3248996 View commit details
    Browse the repository at this point in the history