This topic describes how to create a firewall policy for the Grafana instance in your Healthwatch for VMware Tanzu installation.
In the Healthwatch tile, allowing external access to individual VMs is disallowed by default. Creating a firewall policy for the Grafana instance allows users to access the Grafana UI more easily from outside your BOSH network, including from the links to the Grafana UI that Alertmanager provides in alert messages.
You create firewall policies in the console for your Ops Manager deployment’s IaaS. To create a firewall policy for the Grafana instance, see the section for your IaaS:
To create a firewall policy in AWS:
Log in to the Amazon EC2 dashboard.
Select Security Group.
Click Create Security Group.
For Security group name, enter the name you want to give the security group. For example, grafana-port-access
.
For Description, enter a description for your security group.
For VPC, select from the dropdown the VPC where the Grafana instance is deployed.
Select the Inbound tab.
To create the first rule:
443
.0.0.0.0/0
.To create the second rule:
80
.0.0.0.0/0
.Click Create.
Select Instances.
Click the Grafana instance.
Click Actions.
Under Security, click Change security groups.
Activate the checkbox next to the security group you created for the Grafana instance.
Click Add security group.
Click Save.
For more information about creating a firewall policy in AWS for a Linux instance, see the AWS documentation for Linux instances of Amazon EC2. For more information about creating a firewall policy in AWS for a Windows instance, see the AWS documentation for Windows instances of Amazon EC2.
To create a firewall policy in Azure:
Log in to the Azure portal.
Select Resource groups.
Click Add.
Create a resource group for the Grafana instance. For more information, see the Azure documentation.
Select the Network rule collection tab.
Click Add network rule collection.
For Name, enter the name you want to give the rule collection. For example, grafana-port-access
.
For Priority, enter 1000
.
For Action, select Allow.
Click Rules.
Under IP addresses, configure the following fields for your first rule:
(*)
.443
.Under IP addresses, configure the following fields for your second rule:
(*)
.80
.Click Add.
Click Review + create.
Click Save.
For more information about creating a firewall policy in Azure, see the Azure documentation.
To create a firewall policy in GCP:
Log in to the Google Cloud console.
Under VPC, select Firewall.
To create the first rule:
1000
.grafana
.0.0.0.0/0
.443
.To create the second rule:
1000
.grafana
.0.0.0.0/0
.80
.For more information about creating a firewall policy in GCP, see the GCP documentation.
To create a firewall policy in vSphere NSX-V:
Log in to vSphere.
Click Networking & Security.
Select NSX Edges.
Double-click the Edge for your TAS for VMs deployment.
Select Manage.
Select Firewall.
To create the first rule:
To create the second rule:
Click Publish Changes.
For more information about adding an NSX Edge firewall rule, see the vSphere documentation.