Uploaded image for project: 'Red Hat Advanced Cluster Management'
  1. Red Hat Advanced Cluster Management
  2. ACM-18758

Requesting: Improve Firewall Rule Documentation Clarity for ACM and OpenShift (Source & Destination for Outbound/Inbound)

XMLWordPrintable

    • Quality / Stability / Reliability
    • 1
    • False
    • Hide

      None

      Show
      None
    • False
    • SF Train-25, SF Train-26, SF Train-27, SF Train-28
    • +
    • None

      Description:
      A customer has raised a concern about the clarity of the firewall rule documentation for ACM and OpenShift environments, specifically regarding the "Outbound and Inbound" traffic descriptions. The customer highlighted that the current documentation lacks a clear specification of source and destination in the rules, which is a standard way of documenting firewall rules.

      The customer suggests that the bare minimum information needed for each rule includes:

      • Source (e.g., the entity initiating the connection)
      • Destination (e.g., the entity receiving the connection)
      • Protocol(s)
      • Port(s)
      • Direction (i.e., inbound or outbound)
      • Action (e.g., allow or deny)

      Additionally, clarification is needed regarding proxy settings in the documentation. Currently, the note states:

      "Registration Agent and Work Agent on the managed cluster do not support proxy settings because they communicate with the apiserver on the hub cluster by establishing an mTLS connection, which cannot pass through the proxy."

      However, it's not clear if the managed cluster’s IP needs to be included in the noProxy settings.

      Request:

      1. Clarify in the documentation that the managed cluster’s IP address should be added to the noProxy settings to ensure proper communication between the Registration Agent/Work Agent and the Hub cluster.
      1. Update the firewall rule documentation for ACM and OpenShift to include the following details for each rule:
        • Source: Clearly specify the source of the connection.
        • Destination: Clearly specify the destination of the connection.
        • Direction: Explicitly state whether the traffic is outbound or inbound relative to the source/destination.
        • Protocol and Port(s): Keep the current information but ensure it is linked to the correct source and destination.

      Example of improved documentation:

      Direction Source Destination Protocol Port(s) Action Description
      Outbound Managed Cluster Hub Cluster TCP 6443 Allow Communication from the provisioned managed cluster’s Kubernetes API server to the Hub cluster for API requests.
      Inbound Hub Cluster Managed Cluster TCP 6443 Allow The Hub cluster’s Kubernetes API server receives communication from the multicluster engine or managed cluster.
      Outbound OpenShift Managed Cluster Hub Cluster TCP 6180, 6183, 6385, 5050 Allow Communication between the Ironic Python Agent and the Bare Metal Operator on the Hub cluster.
      Outbound Hub Cluster Ironic Python Agent on Managed Cluster TCP 9999 Allow Communication between the Hub cluster and the Ironic Python Agent running on a managed cluster node for Bare Metal operations.
      Outbound and Inbound Managed Cluster Hub Cluster TCP 443 Allow Communication between the managed cluster’s workManager service route and the Hub cluster.

      This will ensure that the proxy settings are clarified and provide more context for users configuring their firewall and noProxy settings.

              leyan@redhat.com Le Yang
              rhn-support-dchong Daniel Chong
              Hui Chen Hui Chen
              Votes:
              0 Vote for this issue
              Watchers:
              10 Start watching this issue

                Created:
                Updated:
                Resolved: