This topic describes the firewall ports and protocols requirements for using VMware Tanzu Kubernetes Grid Integrated Edition (TKGI) with Antrea container networking.
If you are using TKGI on vSphere, see one of the follow topics instead:
Apps frequently require the ability to pass internal communication between system components on different networks.
Firewalls and Kubernetes NetworkPolicy are used to filter traffic and limit access in environments with strict inter-network access control policies and your apps require one or more conduits through a secured environment’s firewalls.
VMware recommends that you enable access to the apps through the standard Kubernetes load-balancers and ingress controller types, instead of using a Kubernetes NetworkPolicy to filter traffic between networks and TKGI system components and clusters. This enables you to designate specific ports and protocols as a firewall conduit.
Consult the following tables when configuring port settings to install or upgrade TKGI or configure a Kubernetes cluster:
Note: To control which groups access deploying and scaling your organization’s Tanzu Kubernetes Grid Integrated Edition-deployed Kubernetes clusters, configure your firewall settings as described on the Operator –> TKGI API server lines below.
The following tables list ports and protocols required for network communications between Tanzu Kubernetes Grid Integrated Edition v1.5.0 and later, and other components.
The following table lists ports and protocols used for network communication between TKGI user interface components.
Source Component | Destination Component | Destination Protocol | Destination Port | Service |
---|---|---|---|---|
Admin/Operator Console | All System Components | TCP | 22 | SSH |
Admin/Operator Console | All System Components | TCP | 80 | HTTP |
Admin/Operator Console | All System Components | TCP | 443 | HTTPS |
Admin/Operator Console | BOSH Director | TCP | 25555 | BOSH Director REST API |
Admin/Operator Console | Ops Manager | TCP | 22 | SSH |
Admin/Operator Console | Ops Manager | TCP | 443 | HTTPS |
Admin/Operator Console | TKGI Controller | TCP | 9021 | TKGI API Server |
Admin/Operator and Developer Consoles | Harbor Private Image Registry | TCP | 80 | HTTP |
Admin/Operator and Developer Consoles | Harbor Private Image Registry | TCP | 443 | HTTPS |
Admin/Operator and Developer Consoles | Harbor Private Image Registry | TCP | 4443 | notary |
Admin/Operator and Developer Consoles | Kubernetes App Load-Balancer Svc | TCP/UDP | Varies | varies with apps |
Admin/Operator and Developer Consoles | Kubernetes Cluster API Server -LB VIP | TCP | 8443 | HTTPSCA |
Admin/Operator and Developer Consoles | Kubernetes Cluster Ingress Controller | TCP | 80 | HTTP |
Admin/Operator and Developer Consoles | Kubernetes Cluster Ingress Controller | TCP | 443 | HTTPS |
Admin/Operator and Developer Consoles | Kubernetes Cluster Worker Node | TCP/UDP | 30000-32767 | Kubernetes NodePort |
Admin/Operator and Developer Consoles | TKGI Controller | TCP | 8443 | HTTPSCA |
All User Consoles (Operator, Developer, Consumer) | Kubernetes App Load-Balancer Svc | TCP/UDP | Varies | varies with apps |
All User Consoles (Operator, Developer, Consumer) | Kubernetes Cluster Ingress Controller | TCP | 80 | HTTP |
All User Consoles (Operator, Developer, Consumer) | Kubernetes Cluster Ingress Controller | TCP | 443 | HTTPS |
All User Consoles (Operator, Developer, Consumer) | Kubernetes Cluster Worker Node | TCP/UDP | 30000-32767 | Kubernetes NodePort |
The following table lists ports and protocols used for network communication between core TKGI components.
Source Component | Destination Component | Destination Protocol | Destination Port | Service |
---|---|---|---|---|
All System Components | Corporate Domain Name Server | TCP/UDP | 53 | DNS |
All System Components | Network Time Server | UDP | 123 | NTP |
All System Control Plane Components | AD/LDAP Directory Server | TCP/UDP | 389/636 | LDAP/LDAPS |
Ops Manager | Admin/Operator Console | TCP | 22 | SSH |
Ops Manager | BOSH Director | TCP | 6868 | BOSH Agent HTTP |
Ops Manager | BOSH Director | TCP | 8443 | HTTPSCA |
Ops Manager | BOSH Director | TCP | 8844 | BOSH CredHub |
Ops Manager | BOSH Director | TCP | 25555 | BOSH Director REST API |
Ops Manager | Harbor Private Image Registry | TCP | 22 | SSH |
Ops Manager | Kubernetes Cluster Control Plane/etcd Node | TCP | 22 | SSH |
Ops Manager | Kubernetes Cluster Worker Node | TCP | 22 | SSH |
Ops Manager | TKGI Controller | TCP | 22 | SSH |
Ops Manager | TKGI Controller | TCP | 8443 | HTTPSCA |
BOSH Compilation Job VM | BOSH Director | TCP | 4222 | BOSH nats server |
BOSH Compilation Job VM | BOSH Director | TCP | 25250 | BOSH BlobStore |
BOSH Compilation Job VM | BOSH Director | TCP | 25923 | health monitor daemon |
BOSH Compilation Job VM | Harbor Private Image Registry | TCP | 443 | HTTPS |
BOSH Compilation Job VM | Harbor Private Image Registry | TCP | 8853 | BOSH DNS health |
TKGI Controller | BOSH Director | TCP | 4222 | BOSH nats server |
TKGI Controller | BOSH Director | TCP | 8443 | HTTPSCA |
TKGI Controller | BOSH Director | TCP | 25250 | BOSH BlobStore |
TKGI Controller | BOSH Director | TCP | 25555 | BOSH director rest api |
TKGI Controller | BOSH Director | TCP | 25923 | health monitor daemon |
TKGI Controller | Kubernetes Cluster Control Plane/etcd Node | TCP | 8443 | HTTPSCA |
TKGI Controller | TKGI Database VM | TCP | 3306 | tkgi db proxy |
Harbor Private Image Registry | BOSH Director | TCP | 4222 | BOSH nats server |
Harbor Private Image Registry | BOSH Director | TCP | 25250 | BOSH BlobStore |
Harbor Private Image Registry | BOSH Director | TCP | 25923 | health monitor daemon |
Harbor Private Image Registry | IP NAS Storage Array | TCP | 111 | NFS RPC portmapper |
Harbor Private Image Registry | IP NAS Storage Array | TCP | 2049 | NFS |
Harbor Private Image Registry | Public CVE Source Database | TCP | 443 | HTTPS |
kube-system pod/telemetry-agent | TKGI Controller | TCP | 24224 | Fluentd out_forward |
Kubernetes Cluster Control Plane/etcd Node | BOSH Director | TCP | 4222 | BOSH NATS Server |
Kubernetes Cluster Control Plane/etcd Node | BOSH Director | TCP | 25250 | BOSH BlobStore |
Kubernetes Cluster Control Plane/etcd Node | BOSH Director | TCP | 25923 | health monitor daemon |
Kubernetes Cluster Control Plane/etcd Node | Kubernetes Cluster Control Plane/etcd Node | TCP | 2379 | etcd client |
Kubernetes Cluster Control Plane/etcd Node | Kubernetes Cluster Control Plane/etcd Node | TCP | 2380 | etcd server |
Kubernetes Cluster Control Plane/etcd Node | Kubernetes Cluster Control Plane/etcd Node | TCP | 8443 | HTTPSCA |
Kubernetes Cluster Control Plane/etcd Node | Kubernetes Cluster Control Plane/etcd Node | TCP | 8853 | BOSH DNS health |
Kubernetes Cluster Control Plane/etcd Node | Kubernetes Cluster Worker Node | TCP | 4194 | cAdvisor |
Kubernetes Cluster Control Plane/etcd Node | Kubernetes Cluster Worker Node | TCP | 10250 | kubelet API |
Kubernetes Cluster Control Plane/etcd Node | Kubernetes Cluster Worker Node | TCP | 31194 | cAdvisor |
Kubernetes Cluster Control Plane/etcd Node | TKGI Controller | TCP | 8443 | HTTPSCA |
Kubernetes Cluster Control Plane/etcd Node | TKGI Controller | TCP | 8853 | BOSH DNS health |
Kubernetes Cluster Worker Node | BOSH Director | TCP | 4222 | BOSH NATS server |
Kubernetes Cluster Worker Node | BOSH Director | TCP | 25250 | BOSH BlobStore |
Kubernetes Cluster Worker Node | BOSH Director | TCP | 25923 | health monitor daemon |
Kubernetes Cluster Worker Node | Harbor Private Image Registry | TCP | 443 | HTTPS |
Kubernetes Cluster Worker Node | Harbor Private Image Registry | TCP | 8853 | BOSH DNS health |
Kubernetes Cluster Worker Node | IP NAS Storage Array | TCP | 111 | nfs rpc portmapper |
Kubernetes Cluster Worker Node | IP NAS Storage Array | TCP | 2049 | nfs |
Kubernetes Cluster Worker Node | Kubernetes Cluster Control Plane/etcd Node | TCP | 8443 | HTTPSCA |
Kubernetes Cluster Worker Node | Kubernetes Cluster Control Plane/etcd Node | TCP | 8853 | BOSH DNS health |
Kubernetes Cluster Worker Node | Kubernetes Cluster Control Plane/etcd Node | TCP | 10250 | kubelet API |
pks-system pod/cert-generator | TKGI Controller | TCP | 24224 | Fluentd out_forward |
pks-system pod/fluent-bit | TKGI Controller | TCP | 24224 | Fluentd out_forward |
The following tables list ports and protocols required for network communication.
The following tables list ports and protocols required for network communication in Antrea environments.
Source Component | Destination Component | Destination Protocol | Destination Port | Service |
---|---|---|---|---|
Worker Node VMs | Worker Node VMs | UDP | 6081 | Geneve |
Control Plane Node VMs | Control Plane Node VMs | TCP | 8091 | TCP |
Note: Port 6081 must be open on all of the worker node VMs and port 8091 must be open on all control plane node VMs in the clusters you create in an Antrea networking environment.
For more information, see Network Requirements in the Antrea GitHub repository.