Skip to content

Commit 792ac3f

Browse files
committed
Reworked rules section
1 parent cd45ef9 commit 792ac3f

File tree

1 file changed

+25
-21
lines changed

1 file changed

+25
-21
lines changed

articles/openshift/howto-bring-nsg.md

Lines changed: 25 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -24,39 +24,43 @@ This article shows how to use the "bring your own" Network Security Group (NSG)
2424

2525
:::image type="content" source="media/howto-bring-nsg/network-security-group-new.png" alt-text="Diagram showing an overview of how to bring your own network security group works in Azure Red Hat OpenShift.":::
2626

27-
## Capabilities and limitations
27+
## General capabilities and limitations
2828

29-
1. You need to attach your preconfigured NSGs to both master and worker subnets before you create the cluster. Failure to be attached your preconfigured NSGs to both subnets results in an error.
29+
- You need to attach your preconfigured NSGs to both master and worker subnets before you create the cluster. Failure to be attached your preconfigured NSGs to both subnets results in an error.
3030

31-
1. You can choose to use the same or different preconfigured NSGs for master and worker subnets.
31+
- You can choose to use the same or different preconfigured NSGs for master and worker subnets.
3232

33-
1. When using your own NSG, the ARO RP still creates an NSG in the Managed Resource Group (default NSG), but that NSG isn't attached to the worker or master subnets.
33+
- When using your own NSG, the ARO RP still creates an NSG in the Managed Resource Group (default NSG), but that NSG isn't attached to the worker or master subnets.
3434

35-
1. Preconfigured NSGs aren't automatically updated with rules when you create Kubernetes LoadBalancer type services or OpenShift routes within the ARO cluster. Update these rules. This behavior is different from the original ARO behavior wherein the default NSG is programmatically updated in such situations.
35+
- You can't enable the preconfigured NSG feature on an existing ARO cluster. Currently, this feature can only be enabled at the time of cluster creation.
3636

37-
1. The default ARO cluster NSG (not attached to any subnet while using this feature) will still be updated with rules when you create Kubernetes LoadBalancer type services or OpenShift routes within the ARO cluster.
37+
- The preconfigured NSG option isn't configurable from the Azure portal.
3838

39-
1. You can detach preconfigured NSGs from the subnets of the cluster created using this feature. It results in a cluster with subnets that have no NSGs. You can then attach a different set of preconfigured NSGs to the cluster. Alternatively, you can attach the ARO default NSG to the cluster subnets (at which point your cluster becomes like any other cluster that's not using this feature).
39+
- If you used this feature during its preview, your existing preconfigured clusters are now fully supported.
4040

41-
1. Your preconfigured NSGs shouldn't have INBOUND/OUTBOUND DENY rules of the following types, as these can interfere with the operation of the cluster and/or hinder the ARO support/SRE teams from providing support/management. (Here, subnet indicates any or all IP addresses in the subnet and all ports corresponding to that subnet):
41+
### Using rules
4242

43-
1. Master Subnet ←→ Master Subnet
44-
1. Worker Subnet ←→ Worker Subnet
45-
1. Master Subnet ←→ Worker Subnet
46-
47-
Misconfigured rules result in a [signal used by Azure Monitor](/azure/openshift/howto-monitor-alerts) to help troubleshoot preconfigured NSGs.
48-
49-
1. To allow incoming traffic to your ARO public cluster, set the following INBOUND ALLOW rules (or equivalent) in your NSG. Refer to the default NSG of the cluster for specific details and to the example NSG shown in [Deployment](#deployment). You can create a cluster even without such rules in the NSG.
43+
> [!WARNING]
44+
> Preconfigured NSGs aren't automatically updated with rules when you create Kubernetes LoadBalancer type services or OpenShift routes within the ARO cluster. Update these rules. This behavior is different from the original ARO behavior wherein the default NSG is programmatically updated in such situations.
45+
>
46+
47+
- The default ARO cluster NSG (not attached to any subnet while using this feature) will still be updated with rules when you create Kubernetes LoadBalancer type services or OpenShift routes within the ARO cluster.
5048

51-
1. For API server access → From Internet (or your preferred source IPs) to port 6443 on the master subnet.
52-
1. For access to OpenShift router (and hence to OpenShift console and OpenShift routes) → From Internet (or your preferred source IPs) to ports 80 and 443 on the default-v4 public IP on the public Load-balancer of the cluster.
53-
1. For access to any Load-balancer type Kubernetes service → From Internet (or your preferred source IPs) to service ports on public IP corresponding to the service on the public Load-balancer of the cluster.
49+
- You can detach preconfigured NSGs from the subnets of the cluster created using this feature. It results in a cluster with subnets that have no NSGs. You can then attach a different set of preconfigured NSGs to the cluster. Alternatively, you can attach the ARO default NSG to the cluster subnets (at which point your cluster becomes like any other cluster that's not using this feature).
5450

55-
1. You can't enable the preconfigured NSG feature on an existing ARO cluster. Currently, this feature can only be enabled at the time of cluster creation.
51+
- Your preconfigured NSGs shouldn't have INBOUND/OUTBOUND DENY rules of the following types, as these can interfere with the operation of the cluster and/or hinder the ARO support/SRE teams from providing support/management. (Here, subnet indicates any or all IP addresses in the subnet and all ports corresponding to that subnet):
5652

57-
1. The preconfigured NSG option isn't configurable from the Azure portal.
53+
- Master Subnet ←→ Master Subnet
54+
- Worker Subnet ←→ Worker Subnet
55+
- Master Subnet ←→ Worker Subnet
56+
57+
- Misconfigured rules result in a [signal used by Azure Monitor](/azure/openshift/howto-monitor-alerts) to help troubleshoot preconfigured NSGs.
58+
59+
- To allow incoming traffic to your ARO public cluster, set the following INBOUND ALLOW rules (or equivalent) in your NSG. Refer to the default NSG of the cluster for specific details and to the example NSG shown in [Deployment](#deployment). You can create a cluster even without such rules in the NSG.
5860

59-
1. If you used this feature during its preview, your existing preconfigured clusters are now fully supported.
61+
- For API server access → From Internet (or your preferred source IPs) to port 6443 on the master subnet.
62+
- For access to OpenShift router (and hence to OpenShift console and OpenShift routes) → From Internet (or your preferred source IPs) to ports 80 and 443 on the default-v4 public IP on the public Load-balancer of the cluster.
63+
- For access to any Load-balancer type Kubernetes service → From Internet (or your preferred source IPs) to service ports on public IP corresponding to the service on the public Load-balancer of the cluster.
6064

6165
## Deployment
6266

0 commit comments

Comments
 (0)