Skip to content

Commit 17e3c77

Browse files
committed
Add a title to each of the port-requirements tables, clarifying these are Ingress ports
Signed-off-by: Antonio Alonso Alarcon <[email protected]>
1 parent 66c32aa commit 17e3c77

File tree

1 file changed

+18
-2
lines changed

1 file changed

+18
-2
lines changed

asciidoc/product/atip-requirements.adoc

Lines changed: 18 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,7 @@ The hardware requirements for SUSE Telco Cloud are as follows:
2929

3030
|===
3131
| Server Hardware | BMC Model | Management
32+
3233
| Dell hardware
3334
| 15th Generation
3435
| iDRAC9
@@ -78,8 +79,12 @@ The following table lists the opened ports in nodes running the management clust
7879
For CNI plug-in related ports, see <<cni-specific-port-requirements,CNI specific port requirements>>.
7980
====
8081

82+
83+
.Inbound Network Rules for Management Nodes
84+
[#table-inbound-network-rules-for-management-nodes]
8185
|===
8286
| Protocol | Port | Source | Description
87+
8388
| TCP
8489
| 22
8590
| Any source that requires SSH access
@@ -162,8 +167,11 @@ In SUSE Telco Cloud, before any (downstream) server becomes part of a running do
162167

163168
Following ports are expected to be exposed from the BMC (they could differ depending on the exact hardware):
164169

170+
.Inbound Network Rules for Baseboard Management Controllers
171+
[#table-inbound-network-rules-for-baseboard-management-controllers]
165172
|===
166173
| Protocol | Port | Source | Description
174+
167175
| TCP
168176
| 80
169177
| Ironic conductor (from management cluster)
@@ -177,8 +185,11 @@ Following ports are expected to be exposed from the BMC (they could differ depen
177185

178186
* Once the IPA ramdisk image loaded on the BMC `virtual media` is used to bootup the downstream server image, the hardware inspection phase begins. The following table lists the ports exposed by a running IPA ramdisk image:
179187

188+
.Inbound Network Rules for Downstream Nodes - `Metal^3^/Ironic` Provisioning phase
189+
[#table-inbound-network-rules-for-downstream-nodes-provisioning-phase]
180190
|===
181191
| Protocol | Port | Source | Description
192+
182193
| TCP
183194
| 22
184195
| Any source that requires SSH access to IPA ramdisk image
@@ -197,8 +208,11 @@ Following ports are expected to be exposed from the BMC (they could differ depen
197208
For CNI plug-in related ports, see <<cni-specific-port-requirements,CNI specific port requirements>>.
198209
====
199210

211+
.Inbound Network Rules for Downstream Nodes
212+
[#table-inbound-network-rules-for-downstream-nodes]
200213
|===
201214
| Protocol | Port | Source | Description
215+
202216
| TCP
203217
| 22
204218
| Any source that requires SSH access
@@ -255,16 +269,18 @@ For CNI plug-in related ports, see <<cni-specific-port-requirements,CNI specific
255269

256270
Each supported CNI variant comes with its own set of port requirements. For more details, refer https://docs.rke2.io/install/requirements#cni-specific-inbound-network-rules[CNI Specific Inbound Network Rules] in RKE2 documentation.
257271

258-
When `cilium` is set as default/primary CNI plug-in, following TCP port is additionally exposed when the cilium-operator workload is configured to expose metrics outside the Kubernetes cluster on which it is deployed. This ensures that an external `Prometheus` server instance running outside that Kubernetes cluster can still collect these metrics.
272+
When `cilium` is set as default/primary CNI plug-in, following TCP port is additionally exposed when the `cilium-operator` workload is configured to expose metrics outside the Kubernetes cluster on which it is deployed. This ensures that an external `Prometheus` server instance running outside that Kubernetes cluster can still collect these metrics.
259273

260274
[NOTE]
261275
====
262276
This is the default option when deploying `cilium` via the rke2-cilium Helm chart.
263277
====
264278

265-
279+
.Inbound Network Rules for Management/Downstream Nodes - external metrics exposure from `cilium-operator` enabled
280+
[#table-inbound-network-rules-for-management-downstream-nodes-external-metrics-cilium-operator]
266281
|===
267282
| Protocol | Port | Source | Description
283+
268284
| TCP
269285
| 9963
270286
| External (to the Kubernetes cluster) metrics collector

0 commit comments

Comments
 (0)