@@ -15,14 +15,17 @@ The firewall configuration is provided in
15
15
Enabling StackHPC firewalld rules
16
16
=================================
17
17
18
- The standardised firewalld configuration is not used by default and must be
19
- actively opted into. This can be done as follows:
18
+ The standardised firewalld configuration is not enabled by default and must be
19
+ actively opted into. To do so, make the following changes in
20
+ ``etc/kayobe/<group>.yml `` (or
21
+ ``etc/kayobe/environments/<enviroment>/<group>.yml `` if environments are being
22
+ used).
20
23
21
24
Controller firewalld Configuration
22
25
----------------------------------
23
26
24
27
.. code-block :: yaml
25
- :caption : ` ` etc/kayobe/ controllers.yml``
28
+ :caption : ` ` controllers.yml``
26
29
27
30
# ##############################################################################
28
31
# Controller node firewalld configuration.
@@ -51,7 +54,7 @@ Compute firewalld Configuration
51
54
-------------------------------
52
55
53
56
.. code-block :: yaml
54
- :caption : ` ` etc/kayobe/ compute.yml``
57
+ :caption : ` ` compute.yml``
55
58
56
59
# ##############################################################################
57
60
# Compute node firewalld configuration.
@@ -80,7 +83,7 @@ Storage firewalld Configuration
80
83
-------------------------------
81
84
82
85
.. code-block :: yaml
83
- :caption : ` ` etc/kayobe/ storage.yml``
86
+ :caption : ` ` storage.yml``
84
87
85
88
# ##############################################################################
86
89
# storage node firewalld configuration.
@@ -109,7 +112,7 @@ Monitoring firewalld Configuration
109
112
----------------------------------
110
113
111
114
.. code-block :: yaml
112
- :caption : ` ` etc/kayobe/ monitoring.yml``
115
+ :caption : ` ` monitoring.yml``
113
116
114
117
# ##############################################################################
115
118
# monitoring node firewalld configuration.
@@ -141,7 +144,7 @@ The standard firewalld configuration has rules for wazuh-manager and Ansible
141
144
control host Infrastructure VMs.
142
145
143
146
.. code-block :: yaml
144
- :caption : ` ` etc/kayobe/ infra-vms.yml``
147
+ :caption : ` ` infra-vms.yml``
145
148
146
149
# ##############################################################################
147
150
# Infrastructure VM node firewalld configuration
@@ -170,7 +173,7 @@ Seed firewalld Configuration
170
173
----------------------------
171
174
172
175
.. code-block :: yaml
173
- :caption : ` ` etc/kayobe/ seed.yml``
176
+ :caption : ` ` seed.yml``
174
177
175
178
# ##############################################################################
176
179
# seed node firewalld configuration.
@@ -199,7 +202,7 @@ Seed Hypervisor firewalld Configuration
199
202
---------------------------------------
200
203
201
204
.. code-block :: yaml
202
- :caption : ` ` etc/kayobe/ seed_hypervisor.yml``
205
+ :caption : ` ` seed_hypervisor.yml``
203
206
204
207
# ##############################################################################
205
208
# seed_hypervisor node firewalld configuration.
@@ -230,6 +233,7 @@ Custom rules
230
233
Custom firewalld rules can be added for any of the following groups using their
231
234
corresponding variables:
232
235
236
+ * All hosts - ``stackhpc_common_firewalld_rules_extra ``
233
237
* Controllers - ``stackhpc_controller_firewalld_rules_extra ``
234
238
* Compute - ``stackhpc_compute_firewalld_rules_extra ``
235
239
* Storage - ``stackhpc_storage_firewalld_rules_extra ``
@@ -240,7 +244,8 @@ corresponding variables:
240
244
* Seed Hypervisor - ``stackhpc_seed_hypervisor_firewalld_rules_extra ``
241
245
242
246
Each variable is a list of firewall rules to apply. Each item is a dict
243
- containing arguments to pass to the firewalld module.
247
+ containing arguments to pass to the firewalld module. The variables can be
248
+ defined as group vars, host vars, or in the extra vars files.
244
249
245
250
The example below would enable SSH on the ``provision_oc `` network, and disable
246
251
UDP port 1000 on the ``admin_oc `` network for the Wazuh manager Infrastructure
@@ -265,8 +270,8 @@ way to override rules in the standard configuration, other than to find the
265
270
rule and delete it manually. If you find a standard rule that does not work for
266
271
your deployment, please consider merging your changes back in to upstream SKC.
267
272
268
- Applying changes
269
- ----------------
273
+ Validation
274
+ ----------
270
275
271
276
The ``kayobe configuration dump `` command can be used to view all the rules
272
277
that will be applied to a host.
@@ -281,6 +286,9 @@ other variables such as ``stackhpc_firewalld_rules_unverified`` or
281
286
``stackhpc_*_firewalld_rules `` to debug the configuration. See the `How it
282
287
works `_ section for more details.
283
288
289
+ Kolla-Ansible configuration
290
+ ---------------------------
291
+
284
292
Ensure Kolla Ansible opens up ports in firewalld for services on the public
285
293
API network:
286
294
@@ -295,7 +303,10 @@ configuration is to set the internal network zone to ``trusted`` and every
295
303
other zone to the name of the network. See
296
304
``etc/kayobe/environments/ci-multinode/networks.yml `` for a practical example.
297
305
298
- Apply the changes:
306
+ Applying changes
307
+ ----------------
308
+
309
+ Use the ``kayobe * host configure `` commands to apply the changes:
299
310
300
311
.. code-block :: bash
301
312
0 commit comments