Skip to content

Commit d8e580c

Browse files
OCPBUGS-35851:adding missing port details
1 parent 4cd43bb commit d8e580c

File tree

1 file changed

+68
-0
lines changed

1 file changed

+68
-0
lines changed

modules/installation-about-custom-azure-vnet.adoc

Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -126,6 +126,74 @@ endif::restricted[]
126126
1. If you are using Azure Firewall to restrict the internet access, then you can configure Azure Firewall to allow the Azure APIs. A network security group rule is not needed. For more information, see "Configuring your firewall" in "Additional resources".
127127
--
128128

129+
.Ports used for all-machine to all-machine communications
130+
[cols="2a,2a,5a",options="header"]
131+
|===
132+
133+
|Protocol
134+
|Port
135+
|Description
136+
137+
|ICMP
138+
|N/A
139+
|Network reachability tests
140+
141+
.3+|TCP
142+
|`1936`
143+
|Metrics
144+
145+
|`9000`-`9999`
146+
|Host level services, including the node exporter on ports `9100`-`9101` and
147+
the Cluster Version Operator on port `9099`.
148+
149+
|`10250`-`10259`
150+
|The default ports that Kubernetes reserves
151+
152+
.6+|UDP
153+
|`4789`
154+
|VXLAN
155+
156+
|`6081`
157+
|Geneve
158+
159+
|`9000`-`9999`
160+
|Host level services, including the node exporter on ports `9100`-`9101`.
161+
162+
|`500`
163+
|IPsec IKE packets
164+
165+
|`4500`
166+
|IPsec NAT-T packets
167+
168+
|`123`
169+
|Network Time Protocol (NTP) on UDP port `123`
170+
171+
If an external NTP time server is configured, you must open UDP port `123`.
172+
173+
|TCP/UDP
174+
|`30000`-`32767`
175+
|Kubernetes node port
176+
177+
|ESP
178+
|N/A
179+
|IPsec Encapsulating Security Payload (ESP)
180+
181+
|===
182+
183+
.Ports used for control plane machine to control plane machine communications
184+
[cols="2a,2a,5a",options="header"]
185+
|===
186+
187+
|Protocol
188+
|Port
189+
|Description
190+
191+
|TCP
192+
|`2379`-`2380`
193+
|etcd server and peer ports
194+
195+
|===
196+
129197
include::snippets/mcs-endpoint-limitation.adoc[]
130198

131199
Because cluster components do not modify the user-provided network security groups, which the Kubernetes controllers update, a pseudo-network security group is created for the Kubernetes controller to modify without impacting the rest of the environment.

0 commit comments

Comments
 (0)