Firewall

Firewall considerations for MicroShift

MicroShift does not require a firewall to run, but it's recommended. In the case of using firewalld the following ports should be considered:

Port(s) Protocol(s) Description
80 TCP HTTP port used to serve applications through the OpenShift router.
443 TCP HTTPS port used to serve applications through the OpenShift router.
6443 TCP HTTPS API port for the MicroShift API
5353 UDP mDNS service to respond for OpenShift route mDNS hosts
30000-32767 TCP/UDP Port range reserved for NodePort type of services, can be used to expose applications on the LAN

Additionally pods need to be able to contact the internal coreDNS server, a way to allow such connectivity is the following, assuming the PodIP range is 10.42.0.0/16

sudo firewall-cmd --permanent --zone=trusted --add-source=10.42.0.0/16

Firewalld

An example for enabling firewalld and opening all the above mentioned ports is:

sudo dnf install -y firewalld
sudo systemctl enable firewalld --now
sudo firewall-cmd --zone=trusted --add-source=10.42.0.0/16 --permanent
sudo firewall-cmd --zone=public --add-port=80/tcp --permanent
sudo firewall-cmd --zone=public --add-port=443/tcp --permanent
sudo firewall-cmd --zone=public --add-port=6443/tcp --permanent
sudo firewall-cmd --zone=public --add-port=5353/udp --permanent
sudo firewall-cmd --zone=public --add-port=30000-32767/tcp --permanent
sudo firewall-cmd --zone=public --add-port=30000-32767/udp --permanent
sudo firewall-cmd --reload
Last modified October 24, 2023 at 8:51 AM PST : build(deps): bump actions/setup-node from 3 to 4 (#212) (333d7a1)
Last modified October 24, 2023 at 8:51 AM PST : build(deps): bump actions/setup-node from 3 to 4 (#212) (333d7a1)