Check the firewall settings
On this page
Skip this topic if your environment doesn’t use a firewall.
There are many tools to manage your firewall, such as firewalld or iptables. The following steps are based on a firewalld managed firewall. If you are using another firewall management tool, contact your network administrator for detailed steps on how to add the related firewall rules.
To check whether firewalld manages your firewall, run the following command:
systemctl status firewalld
If your terminal resembles the following, firewalld manages your firewall:
[root@sh ~\]# systemctl status firewalld
firewalld.service - firewalld - dynamic firewall daemon
Loaded: loaded (/usr/lib/systemd/system/firewalld.service; enabled; vendor preset: enabled)
Active: active (running) since Mon 2020-06-22 04:36:32 CST; 2 weeks 0 days ago
Docs: man:firewalld(1)
Main PID: 878 (firewalld)
Tasks: 2
CGroup: /system.slice/firewalld.service
└─878 /usr/bin/python -Es /usr/sbin/firewalld --nofork --nopid
Add firewall rules for inbound connections
NFS servers
Run the following command to check the default policy:
iptables -S | grep -- '-P INPUT'If the response is
-P INPUT ACCEPT, continue. If not, contact your IT system administrator to change the policy.Run the following commands on the NFS server:
systemctl start firewalld; systemctl enable firewalld firewall-cmd --permanent --add-port=111/udp firewall-cmd --permanent --add-port=111/tcp firewall-cmd --permanent --add-port=22/tcp firewall-cmd --permanent --add-port=2049/tcp firewall-cmd --permanent --add-port=20048/tcp firewall-cmd --reload
Master nodes and worker nodes
OMT will automatically add firewall rules during installation (with your confirmation).
Add firewall rules for outbound connections
Make sure you’ve added firewall rules for the required outbound ports. For example, run the following commands on the worker nodes and master nodes to configure the firewall outbound port 5432 to connect an external PostgreSQL database:
systemctl start firewalld
systemctl enable firewalld
firewall-cmd --permanent --direct --add-rule ipv4 filter OUTPUT 0 -p tcp -m tcp --dport=5432 -j ACCEPT -m comment --comment "connect PostgreSQL"
firewall-cmd --reload
Enable the VRRP protocol for Keepalived in a multiple master node deployment
This step is only needed if you’re using multiple master nodes (HA setup) by setting the HA_VIRTUAL_IP parameter in the install.properties file.
In most cases, the vrrp protocol is enabled by default. If you have used some custom settings for the server or if Keepalived isn’t working, run the following command on the node to enable the vrrp protocol:
firewall-cmd --add-protocol vrrp --permanent
firewall-cmd --reload
Related topics
- When you have finished, return to Prepare an environment to install OMT to continue.