# More details: https://ranchermanager.docs.rancher.com/getting-started/installation-and-upgrade/installation-requirements/port-requirements
USER_SEC_GROUP_ID=$(openstack security group create ${NAME}-cid-f value)
if[[$USE_RKE2=="true"]];then
openstack security group rule create --dst-port 9345 --remote-ip=$SUBNET_CIDR--protocol tcp --description"Node registration"$USER_SEC_GROUP_ID-f value -cid
openstack security group rule create --dst-port 6443 --remote-ip=$SUBNET_CIDR--protocol tcp --description"Kubernetes API"$USER_SEC_GROUP_ID-f value -cid
openstack security group rule create --dst-port 8472 --remote-ip=$SUBNET_CIDR--protocol udp --description"Flannel VXLAN"$USER_SEC_GROUP_ID-f value -cid
openstack security group rule create --dst-port 10250 --remote-ip=$SUBNET_CIDR--protocol tcp --description"kubelet, metrics server"$USER_SEC_GROUP_ID-f value -cid
openstack security group rule create --dst-port 2379 --remote-ip=$SUBNET_CIDR--protocol tcp --description"etcd client port"$USER_SEC_GROUP_ID-f value -cid
openstack security group rule create --dst-port 2380 --remote-ip=$SUBNET_CIDR--protocol tcp --description"etcd peer port"$USER_SEC_GROUP_ID-f value -cid
openstack security group rule create --dst-port 30000:32767 --remote-ip=$SUBNET_CIDR--protocol tcp --description"NodePort port range"$USER_SEC_GROUP_ID-f value -cid
openstack security group rule create --dst-port 30000:32767 --remote-ip=$SUBNET_CIDR--protocol udp --description"NodePort port range"$USER_SEC_GROUP_ID-f value -cid
openstack security group rule create --dst-port 5473 --remote-ip=$SUBNET_CIDR--protocol tcp --description"Calico"$USER_SEC_GROUP_ID-f value -cid
openstack security group rule create --dst-port 80 --remote-ip=$SUBNET_CIDR--protocol tcp --description"Rancher UI/API"$USER_SEC_GROUP_ID-f value -cid
openstack security group rule create --dst-port 443 --remote-ip=$SUBNET_CIDR--protocol tcp --description"Rancher agent, UI/API, kubectl"$USER_SEC_GROUP_ID-f value -cid
openstack security group rule create --dst-port 22 --remote-ip=$SUBNET_CIDR--protocol tcp --description"ssh"$USER_SEC_GROUP_ID-f value -cid
openstack security group rule create --dst-port 22 --remote-ip=$MANAGEMENT_NETWORK_CIDR--protocol tcp --description"SSH provisioning of node by RKE"$USER_SEC_GROUP_ID-f value -cid
openstack security group rule create --dst-port 2376 --remote-ip=$MANAGEMENT_NETWORK_CIDR--protocol tcp --description"Docker daemon TLS port used by node driver"$USER_SEC_GROUP_ID-f value -cid
else
openstack security group rule create --dst-port 22 --remote-ip=$MANAGEMENT_NETWORK_CIDR--protocol tcp --description"SSH provisioning of node by RKE"$USER_SEC_GROUP_ID-f value -cid
openstack security group rule create --dst-port 2376 --remote-ip=$MANAGEMENT_NETWORK_CIDR--protocol tcp --description"Docker daemon TLS port used by node driver"$USER_SEC_GROUP_ID-f value -cid
openstack security group rule create --dst-port 80 --remote-ip=$SUBNET_CIDR--protocol tcp --description"http ingress"$USER_SEC_GROUP_ID-f value -cid
...
...
@@ -83,6 +120,7 @@ if [[ $CREATE == "true" ]]; then
openstack security group rule create --dst-port 10254 --remote-ip=$SUBNET_CIDR--protocol tcp --description"Ingress controller livenessProbe/readinessProbe"$USER_SEC_GROUP_ID-f value -cid
openstack security group rule create --dst-port 30000:32767 --remote-ip=$SUBNET_CIDR--protocol tcp --description"NodePort port range"$USER_SEC_GROUP_ID-f value -cid
openstack security group rule create --dst-port 30000:32767 --remote-ip=$SUBNET_CIDR--protocol udp --description"NodePort port range"$USER_SEC_GROUP_ID-f value -cid
fi
# Create a keypair, will be used to bootstrap VMs of the new cluster