Skip to content

Commit 54ebf80

Browse files
authored
Merge pull request #59294 from johnwilkins/TELCODOCS-1036
TELCODOCS-1036: Incorporated additional SME feedback.
2 parents eb65ab1 + b1d5d40 commit 54ebf80

3 files changed

+7
-7
lines changed

installing/installing_aws/installing-aws-expanding-a-cluster-with-on-premise-bare-metal-nodes.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,9 @@ include::_attributes/common-attributes.adoc[]
66

77
toc::[]
88

9-
You can expand an {product-title} cluster deployed with virtual media on AWS by adding bare metal nodes to the cluster. By default, a cluster deployed with virtual media on AWS with {product-title} 4.11 or earlier has the Baremetal Operator (BMO) disabled. In {product-title} 4.12 and later releases, the BMO is enabled to support a hybrid cloud consisting of AWS control plane nodes and worker nodes with additional on-premise bare metal worker nodes.
9+
You can expand an {product-title} cluster deployed on AWS by adding bare-metal nodes to the cluster. By default, a cluster deployed on AWS with {product-title} 4.11 or earlier has the Baremetal Operator (BMO) disabled. In {product-title} 4.12 and later releases, the BMO is enabled to support a hybrid cloud consisting of AWS control plane nodes and worker nodes with additional on-premise bare-metal worker nodes.
1010

11-
Expanding a {product-title} cluster deployed on AWS requires using virtual media with bare metal nodes that meet the xref:../installing_bare_metal_ipi/ipi-install-prerequisites.adoc#node-requirements_ipi-install-prerequisites[node requirements] and xref:../installing_bare_metal_ipi/ipi-install-prerequisites.adoc#ipi-install-firmware-requirements-for-installing-with-virtual-media_ipi-install-prerequisites[firmware requirements] for installing with virtual media. A `provisioning` network is not required, and if present, should be xref:../installing_bare_metal_ipi/ipi-install-installation-workflow.adoc#modifying-install-config-for-no-provisioning-network_ipi-install-installation-workflow[disabled].
11+
Expanding an {product-title} cluster deployed on AWS requires using virtual media with bare-metal nodes that meet the xref:../installing_bare_metal_ipi/ipi-install-prerequisites.adoc#node-requirements_ipi-install-prerequisites[node requirements] and xref:../installing_bare_metal_ipi/ipi-install-prerequisites.adoc#ipi-install-firmware-requirements-for-installing-with-virtual-media_ipi-install-prerequisites[firmware requirements] for installing with virtual media. A `provisioning` network is not required, and if present, should be xref:../installing_bare_metal_ipi/ipi-install-installation-workflow.adoc#modifying-install-config-for-no-provisioning-network_ipi-install-installation-workflow[disabled].
1212

1313
include::modules/installation-aws_con_connecting-the-vpc-to-the-on-premise-network.adoc[leveloffset=+1]
1414

modules/installation-aws_con_connecting-the-vpc-to-the-on-premise-network.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,5 +14,5 @@ To securely access the BMCs, you can create a separate, secure network segment o
1414

1515
[WARNING]
1616
====
17-
Misconfiguration of the network connection between the AWS and on-premise environments can expose the on-premise network and bare metal nodes to the internet.
17+
Misconfiguration of the network connection between the AWS and on-premise environments can expose the on-premise network and bare-metal nodes to the internet. That is a significant security risk, which might result in an attacker having full access to the exposed machines, and through them to the private network in these environments.
1818
====

modules/installation-aws_proc_creating-firewall-rules-for-port-6183.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ Port `6183` is open by default on the control plane. However, you must create a
1616
.. In the left navigation pane, click on **Security Groups**.
1717
.. Find and select the security group associated with the {product-title} cluster.
1818
.. In the **Inbound rules** tab, click **Edit inbound rules**.
19-
.. Click **Add rule** and select **Custom UDP Rule** as the rule type.
19+
.. Click **Add rule** and select **Custom TCP Rule** as the rule type.
2020
.. In the **Port range** field, enter `6183`.
2121
.. In the **Source** field, specify the CIDR block for the on-premise network or the security group ID of the peered VPC (if you have VPC peering) to allow traffic only from the desired sources.
2222
.. Click **Save rules**.
@@ -27,7 +27,7 @@ Port `6183` is open by default on the control plane. However, you must create a
2727
.. Find and select the network ACL associated with your {product-title} cluster's VPC.
2828
.. In the **Inbound rules** tab, click **Edit inbound rules**.
2929
.. Click **Add rule** and enter a rule number in the **Rule #** field. Choose a number that doesn't conflict with existing rules.
30-
.. Select `UDP` as the protocol.
30+
.. Select `TCP` as the protocol.
3131
.. In the **Port range** field, enter `6183`.
3232
.. In the **Source** field, specify the CIDR block for the on-premise network to allow traffic only from the desired sources.
3333
.. Click **Save** to save the new rule.
@@ -42,11 +42,11 @@ Port `6183` is open by default on the control plane. However, you must create a
4242
$ sudo firewall-cmd --list-all-zones
4343
----
4444

45-
.. To open port `6183` for UDP traffic in the desired zone execute the following command:
45+
.. To open port `6183` for TCP traffic in the desired zone execute the following command:
4646
+
4747
[source,terminal]
4848
----
49-
$ sudo firewall-cmd --zone=<zone> --add-port=6183/udp --permanent
49+
$ sudo firewall-cmd --zone=<zone> --add-port=6183/tcp --permanent
5050
----
5151
+
5252
Replace `<zone>` with the appropriate zone name.

0 commit comments

Comments
 (0)