-
Notifications
You must be signed in to change notification settings - Fork 2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[docs] Firewall requirements clarification #10633
Comments
The Envoy sidecars are launched as Nomad tasks. So the required port range for sidecar proxies is controlled by Nomad, not by Consul (see also hashicorp/consul#9216). If you narrow the port range via (Also, for what it's worth when I've run Nomad production clusters, typically what I'd do is create a perimeter rule that only allowed HTTPS and my VPN traffic, and then allow a wide range of ports between hosts within the network.) |
Looks like we've answered this one so I'm going to close it out. Feel free to open a new issue or post on Discuss if you have more questions. |
Btw seems like that won't work before #8186 would be merged. |
I'm going to lock this issue because it has been closed for 120 days ⏳. This helps our maintainers find and focus on the active issues. |
I'm trying to understand how firewall has to be configured for the following setup:
I was reading through the:
And can't get the full picture.
That part is about port mapping, right? So If I want those services to be accessible I need to open that range?
And this is the port used by Envoy in Consul Connect? So they have to be open on all Nomad nodes as well, right?
If both statements are correct I wonder how can I narrow that down?
For example, if I set allocated out of the port range to 20000 - 20100 and Sidecar Proxy Min\Max to 21000 - 21100 - does that effectively means that I will only be able to start 100 envoys side-cars and map 100 ports on a single Nomad node?
The text was updated successfully, but these errors were encountered: