Skip to content

Latest commit

 

History

History
97 lines (70 loc) · 5.24 KB

coreos-reduced-firewall.md

File metadata and controls

97 lines (70 loc) · 5.24 KB
copyright lastupdated keywords subcollection
years
2023, 2023
2023-08-02
satellite, CoreOS, RHCOS, firewall
satellite

{{site.data.keyword.attribute-definition-list}}

Creating Red Hat CoreOS enabled Locations with reduced firewall footprint

{: #coreos-reduced-firewall}

Configure a Red Hat CoreOS enabled Location to connect to a single network destination instead of multiple destinations to reduce the number of outbound IP addresses to allow on your firewall. {: shortdesc}

To connect to a single network destination, use a host link agent. A host link agent is a binary image of link client that runs as systemd on your hosts. The agent connects to the tunnel server and rewrites your hosts DNS so that all Location bootstrap traffic is redirected to use the Link established by the agent to reach IBM back-end services. As a result, all outbound traffic from the Location connects to a single destination, which is the Tunnel server public endpoint on port 443. Therefore, you do not need to allow all the outbound IP addresses that are mentioned in Required outbound connectivity for hosts in all regions.

Follow these steps to set up a Red Hat CoreOS enabled Location with reduced firewall footprint.

  1. Make sure that the control plane operating system is Red Hat CoreOS.

  2. Create a Red Hat CoreOS enabled {{site.data.keyword.satelliteshort}} Location. For more information, see Creating a Satellite location.

  3. Get the healthcheck Location endpoint by running the ibmcloud sat endpoint ls --location LOCATION_NAME command.

    Example command:

    ibmcloud sat endpoint ls --location my-sat-link

    {: pre}

    Example output:

    ID                          Name                                        Destination Type  Address
    cdn1e2dw0vmieu3g98p0_drock  satellite-healthcheck-cdn1e2dw0vmieu3g98p0  location    HTTP  c-01.private.us-south.link.satellite.cloud.ibm.com:32877

    {: screen}

    From the output, take a note of the Location endpoint. For example, c-01.private.us-south.link.satellite.cloud.ibm.com:32877. Replace private with ws and remove the port. For example, c-01.private.us-south.link.satellite.cloud.ibm.com:32877 becomes c-01-ws.us-south.link.satellite.cloud.ibm.com. This value is used as the value for ENDPOINT_TO_POINT_TO in the sat host attach command in the next step.

  4. Download the host attachment script for your Location by using the ibmcloud sat host attach --location LOCATION_NAME --operating-system RHCOS --host-link-agent-endpoint ENDPOINT_TO_POINT_TO command in the CLI.

    Example command:

    ibmcloud sat host attach --location my-sat-link --operating-system RHCOS --host-link-agent-endpoint c-01-ws.region.link.satellite.cloud.ibm.com

    {: pre}

    Example output:

    Creating host registration script...
    OK
    The script to attach hosts to Satellite location 'my-sat-link' was downloaded to the following location:
    
    /var/folders/7y/90mtvpqj1jx05gvgk1jyk7b80000gn/T/register-host_my-sat-link_1782841498.ign

    {: screen}

  5. Attach your hosts to your Location by running the downloaded script.

  6. Find the IP addresses of the tunnel endpoint by running the dig c-01-ws.REGION.link.satellite.cloud.ibm.com +short command.

    Example command:

    dig c-01-ws.us-south.link.satellite.cloud.ibm.com +short

    {: pre}

    Example output:

    prod-us-south-sl-935783-6b64a6ccc9c596bf59a86625d8fa2202-0000.us-south.containers.appdomain.cloud.
    prod-us-south-sl-935783-6b64a6ccc9c596bf59a86625d8fa2202-0000.c303u02d04o7tl16uqm0.akadns.net.
    169.61.156.226
    169.61.31.178
    169.46.88.106

    {: screen}

    In this example, the IP addresses of the tunnel endpoint are 169.61.156.226, 169.61.31.178, and 169.46.88.106 on port 443.

  7. Configure your firewall to allow outgoing traffic to the IP addresses of the tunnel endpoint on port 443. The IP addresses can be found in the output of the previous step.

NTP must also be allowed. You can choose to allow access to the Red Hat network time protocol (NTP) servers listed in Required outbound connectivity for hosts overview or you can configure access to a custom Network Time Protocol (NTP) server. See Specifying a custom Network Time Protocol (NTP) server if you want to configure a local NTP server. {: note}