Skip to content

FirewallD service configuration files for Kubernetes clusters

Notifications You must be signed in to change notification settings

mpolinowski/k8s-firewalld

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 

Repository files navigation

k8s-firewalld

Firewalld service configuration files for Kubernetes hosts

Master nodes

Protocol Direction Port Range Purpose Used By
TCP Inbound 6443 Kubernetes API server All
TCP Inbound 2379-2380 etcd server client API kube-apiserver, etcd
TCP Inbound 10250 Kubelet API Self, Control plane
TCP Inbound 10251 kube-scheduler Self
TCP Inbound 10253 kube-controller-manager Self

Worker nodes

Protocol Direction Port Range Purpose Used By
TCP Inbound 10250 Kubelet API Self, Control plane
TCP Inbound 30000-32767 NodePort Services All

All nodes (only needed if you are using Weave Net as CNI

Protocol Direction Port Range Purpose Used By
TCP Inbound 6783 Control and Data Ports WeaveNet
UDP Inbound 6783-6784 Control and Data Ports WeaveNet
TCP Inbound 6781-6782 Pod metrics WeaveNet

To test on a Kubernetes Master:

  • Copy the k8s-master.xml file to the /etc/firewalld/services directory
  • Reload the firewall daemon with firewall-cmd --reload
  • Add the service to the appropriate zone with firewall-cmd --add-service=k8s-master --zone=public

To test on a Kubernetes Worker:

  • Copy the k8s-worker.xml file to the /etc/firewalld/services directory
  • Reload the firewall daemon with firewall-cmd --reload
  • Add the service to the appropriate zone with firewall-cmd --add-service=k8s-worker --zone=public

About

FirewallD service configuration files for Kubernetes clusters

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published