This topic describes the firewall ports and protocols requirements for using VMware Tanzu Kubernetes Grid Integrated Edition (TKGI) with Antrea container networking.

If you are using TKGI on vSphere, see one of the follow topics instead:



Overview

Apps frequently require the ability to pass internal communication between system components on different networks.

Firewalls and Kubernetes NetworkPolicy are used to filter traffic and limit access in environments with strict inter-network access control policies and your apps require one or more conduits through a secured environment’s firewalls.

VMware recommends that you enable access to the apps through the standard Kubernetes load-balancers and ingress controller types, instead of using a Kubernetes NetworkPolicy to filter traffic between networks and TKGI system components and clusters. This enables you to designate specific ports and protocols as a firewall conduit.

Consult the following tables when configuring port settings to install or upgrade TKGI or configure a Kubernetes cluster:

Note: To control which groups access deploying and scaling your organization’s Tanzu Kubernetes Grid Integrated Edition-deployed Kubernetes clusters, configure your firewall settings as described on the Operator –> TKGI API server lines below.



TKGI Ports and Protocols

The following tables list ports and protocols required for network communications between Tanzu Kubernetes Grid Integrated Edition v1.5.0 and later, and other components.


TKGI Users Ports and Protocols

The following table lists ports and protocols used for network communication between TKGI user interface components.

Source Component Destination Component Destination Protocol Destination Port Service
Admin/Operator Console All System Components TCP 22 SSH
Admin/Operator Console All System Components TCP 80 HTTP
Admin/Operator Console All System Components TCP 443 HTTPS
Admin/Operator Console BOSH Director TCP 25555 BOSH Director REST API
Admin/Operator Console Ops Manager TCP 22 SSH
Admin/Operator Console Ops Manager TCP 443 HTTPS
Admin/Operator Console TKGI Controller TCP 9021 TKGI API Server
Admin/Operator and Developer Consoles Harbor Private Image Registry TCP 80 HTTP
Admin/Operator and Developer Consoles Harbor Private Image Registry TCP 443 HTTPS
Admin/Operator and Developer Consoles Harbor Private Image Registry TCP 4443 notary
Admin/Operator and Developer Consoles Kubernetes App Load-Balancer Svc TCP/UDP Varies varies with apps
Admin/Operator and Developer Consoles Kubernetes Cluster API Server -LB VIP TCP 8443 HTTPSCA
Admin/Operator and Developer Consoles Kubernetes Cluster Ingress Controller TCP 80 HTTP
Admin/Operator and Developer Consoles Kubernetes Cluster Ingress Controller TCP 443 HTTPS
Admin/Operator and Developer Consoles Kubernetes Cluster Worker Node TCP/UDP 30000-32767 Kubernetes NodePort
Admin/Operator and Developer Consoles TKGI Controller TCP 8443 HTTPSCA
All User Consoles (Operator, Developer, Consumer) Kubernetes App Load-Balancer Svc TCP/UDP Varies varies with apps
All User Consoles (Operator, Developer, Consumer) Kubernetes Cluster Ingress Controller TCP 80 HTTP
All User Consoles (Operator, Developer, Consumer) Kubernetes Cluster Ingress Controller TCP 443 HTTPS
All User Consoles (Operator, Developer, Consumer) Kubernetes Cluster Worker Node TCP/UDP 30000-32767 Kubernetes NodePort


TKGI Core Ports and Protocols

The following table lists ports and protocols used for network communication between core TKGI components.

Source Component Destination Component Destination Protocol Destination Port Service
All System Components Corporate Domain Name Server TCP/UDP 53 DNS
All System Components Network Time Server UDP 123 NTP
All System Control Plane Components AD/LDAP Directory Server TCP/UDP 389/636 LDAP/LDAPS
Ops Manager Admin/Operator Console TCP 22 SSH
Ops Manager BOSH Director TCP 6868 BOSH Agent HTTP
Ops Manager BOSH Director TCP 8443 HTTPSCA
Ops Manager BOSH Director TCP 8844 BOSH CredHub
Ops Manager BOSH Director TCP 25555 BOSH Director REST API
Ops Manager Harbor Private Image Registry TCP 22 SSH
Ops Manager Kubernetes Cluster Control Plane/etcd Node TCP 22 SSH
Ops Manager Kubernetes Cluster Worker Node TCP 22 SSH
Ops Manager TKGI Controller TCP 22 SSH
Ops Manager TKGI Controller TCP 8443 HTTPSCA
BOSH Compilation Job VM BOSH Director TCP 4222 BOSH nats server
BOSH Compilation Job VM BOSH Director TCP 25250 BOSH BlobStore
BOSH Compilation Job VM BOSH Director TCP 25923 health monitor daemon
BOSH Compilation Job VM Harbor Private Image Registry TCP 443 HTTPS
BOSH Compilation Job VM Harbor Private Image Registry TCP 8853 BOSH DNS health
TKGI Controller BOSH Director TCP 4222 BOSH nats server
TKGI Controller BOSH Director TCP 8443 HTTPSCA
TKGI Controller BOSH Director TCP 25250 BOSH BlobStore
TKGI Controller BOSH Director TCP 25555 BOSH director rest api
TKGI Controller BOSH Director TCP 25923 health monitor daemon
TKGI Controller Kubernetes Cluster Control Plane/etcd Node TCP 8443 HTTPSCA
TKGI Controller TKGI Database VM TCP 3306 tkgi db proxy
Harbor Private Image Registry BOSH Director TCP 4222 BOSH nats server
Harbor Private Image Registry BOSH Director TCP 25250 BOSH BlobStore
Harbor Private Image Registry BOSH Director TCP 25923 health monitor daemon
Harbor Private Image Registry IP NAS Storage Array TCP 111 NFS RPC portmapper
Harbor Private Image Registry IP NAS Storage Array TCP 2049 NFS
Harbor Private Image Registry Public CVE Source Database TCP 443 HTTPS
kube-system pod/telemetry-agent TKGI Controller TCP 24224 Fluentd out_forward
Kubernetes Cluster Control Plane/etcd Node BOSH Director TCP 4222 BOSH NATS Server
Kubernetes Cluster Control Plane/etcd Node BOSH Director TCP 25250 BOSH BlobStore
Kubernetes Cluster Control Plane/etcd Node BOSH Director TCP 25923 health monitor daemon
Kubernetes Cluster Control Plane/etcd Node Kubernetes Cluster Control Plane/etcd Node TCP 2379 etcd client
Kubernetes Cluster Control Plane/etcd Node Kubernetes Cluster Control Plane/etcd Node TCP 2380 etcd server
Kubernetes Cluster Control Plane/etcd Node Kubernetes Cluster Control Plane/etcd Node TCP 8443 HTTPSCA
Kubernetes Cluster Control Plane/etcd Node Kubernetes Cluster Control Plane/etcd Node TCP 8853 BOSH DNS health
Kubernetes Cluster Control Plane/etcd Node Kubernetes Cluster Worker Node TCP 4194 cAdvisor
Kubernetes Cluster Control Plane/etcd Node Kubernetes Cluster Worker Node TCP 10250 kubelet API
Kubernetes Cluster Control Plane/etcd Node Kubernetes Cluster Worker Node TCP 31194 cAdvisor
Kubernetes Cluster Control Plane/etcd Node TKGI Controller TCP 8443 HTTPSCA
Kubernetes Cluster Control Plane/etcd Node TKGI Controller TCP 8853 BOSH DNS health
Kubernetes Cluster Worker Node BOSH Director TCP 4222 BOSH NATS server
Kubernetes Cluster Worker Node BOSH Director TCP 25250 BOSH BlobStore
Kubernetes Cluster Worker Node BOSH Director TCP 25923 health monitor daemon
Kubernetes Cluster Worker Node Harbor Private Image Registry TCP 443 HTTPS
Kubernetes Cluster Worker Node Harbor Private Image Registry TCP 8853 BOSH DNS health
Kubernetes Cluster Worker Node IP NAS Storage Array TCP 111 nfs rpc portmapper
Kubernetes Cluster Worker Node IP NAS Storage Array TCP 2049 nfs
Kubernetes Cluster Worker Node Kubernetes Cluster Control Plane/etcd Node TCP 8443 HTTPSCA
Kubernetes Cluster Worker Node Kubernetes Cluster Control Plane/etcd Node TCP 8853 BOSH DNS health
Kubernetes Cluster Worker Node Kubernetes Cluster Control Plane/etcd Node TCP 10250 kubelet API
pks-system pod/cert-generator TKGI Controller TCP 24224 Fluentd out_forward
pks-system pod/fluent-bit TKGI Controller TCP 24224 Fluentd out_forward



Networking Ports and Protocols

The following tables list ports and protocols required for network communication.


Antrea Networking Ports and Protocols

The following tables list ports and protocols required for network communication in Antrea environments.

Source Component Destination Component Destination Protocol Destination Port Service
Worker Node VMs Worker Node VMs UDP 6081 Geneve
Control Plane Node VMs Control Plane Node VMs TCP 8091 TCP

Note: Port 6081 must be open on all of the worker node VMs and port 8091 must be open on all control plane node VMs in the clusters you create in an Antrea networking environment.

For more information, see Network Requirements in the Antrea GitHub repository.

check-circle-line exclamation-circle-line close-line
Scroll to top icon