You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
You can expand an {product-title} cluster deployed with virtual media on AWS by adding baremetal nodes to the cluster. By default, a cluster deployed with virtual media on AWS with {product-title} 4.11 or earlier has the Baremetal Operator (BMO) disabled. In {product-title} 4.12 and later releases, the BMO is enabled to support a hybrid cloud consisting of AWS control plane nodes and worker nodes with additional on-premise baremetal worker nodes.
9
+
You can expand an {product-title} cluster deployed on AWS by adding bare-metal nodes to the cluster. By default, a cluster deployed on AWS with {product-title} 4.11 or earlier has the Baremetal Operator (BMO) disabled. In {product-title} 4.12 and later releases, the BMO is enabled to support a hybrid cloud consisting of AWS control plane nodes and worker nodes with additional on-premise bare-metal worker nodes.
10
10
11
-
Expanding a{product-title} cluster deployed on AWS requires using virtual media with baremetal nodes that meet the xref:../installing_bare_metal_ipi/ipi-install-prerequisites.adoc#node-requirements_ipi-install-prerequisites[node requirements] and xref:../installing_bare_metal_ipi/ipi-install-prerequisites.adoc#ipi-install-firmware-requirements-for-installing-with-virtual-media_ipi-install-prerequisites[firmware requirements] for installing with virtual media. A `provisioning` network is not required, and if present, should be xref:../installing_bare_metal_ipi/ipi-install-installation-workflow.adoc#modifying-install-config-for-no-provisioning-network_ipi-install-installation-workflow[disabled].
11
+
Expanding an{product-title} cluster deployed on AWS requires using virtual media with bare-metal nodes that meet the xref:../installing_bare_metal_ipi/ipi-install-prerequisites.adoc#node-requirements_ipi-install-prerequisites[node requirements] and xref:../installing_bare_metal_ipi/ipi-install-prerequisites.adoc#ipi-install-firmware-requirements-for-installing-with-virtual-media_ipi-install-prerequisites[firmware requirements] for installing with virtual media. A `provisioning` network is not required, and if present, should be xref:../installing_bare_metal_ipi/ipi-install-installation-workflow.adoc#modifying-install-config-for-no-provisioning-network_ipi-install-installation-workflow[disabled].
Copy file name to clipboardExpand all lines: modules/installation-aws_con_connecting-the-vpc-to-the-on-premise-network.adoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,5 +14,5 @@ To securely access the BMCs, you can create a separate, secure network segment o
14
14
15
15
[WARNING]
16
16
====
17
-
Misconfiguration of the network connection between the AWS and on-premise environments can expose the on-premise network and baremetal nodes to the internet.
17
+
Misconfiguration of the network connection between the AWS and on-premise environments can expose the on-premise network and bare-metal nodes to the internet. That is a significant security risk, which might result in an attacker having full access to the exposed machines, and through them to the private network in these environments.
Copy file name to clipboardExpand all lines: modules/installation-aws_proc_creating-firewall-rules-for-port-6183.adoc
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ Port `6183` is open by default on the control plane. However, you must create a
16
16
.. In the left navigation pane, click on **Security Groups**.
17
17
.. Find and select the security group associated with the {product-title} cluster.
18
18
.. In the **Inbound rules** tab, click **Edit inbound rules**.
19
-
.. Click **Add rule** and select **Custom UDP Rule** as the rule type.
19
+
.. Click **Add rule** and select **Custom TCP Rule** as the rule type.
20
20
.. In the **Port range** field, enter `6183`.
21
21
.. In the **Source** field, specify the CIDR block for the on-premise network or the security group ID of the peered VPC (if you have VPC peering) to allow traffic only from the desired sources.
22
22
.. Click **Save rules**.
@@ -27,7 +27,7 @@ Port `6183` is open by default on the control plane. However, you must create a
27
27
.. Find and select the network ACL associated with your {product-title} cluster's VPC.
28
28
.. In the **Inbound rules** tab, click **Edit inbound rules**.
29
29
.. Click **Add rule** and enter a rule number in the **Rule #** field. Choose a number that doesn't conflict with existing rules.
30
-
.. Select `UDP` as the protocol.
30
+
.. Select `TCP` as the protocol.
31
31
.. In the **Port range** field, enter `6183`.
32
32
.. In the **Source** field, specify the CIDR block for the on-premise network to allow traffic only from the desired sources.
33
33
.. Click **Save** to save the new rule.
@@ -42,11 +42,11 @@ Port `6183` is open by default on the control plane. However, you must create a
42
42
$ sudo firewall-cmd --list-all-zones
43
43
----
44
44
45
-
.. To open port `6183` for UDP traffic in the desired zone execute the following command:
45
+
.. To open port `6183` for TCP traffic in the desired zone execute the following command:
0 commit comments