summaryrefslogtreecommitdiffstats
path: root/playbooks/gce/openshift-cluster/config.yml
diff options
context:
space:
mode:
authorLénaïc Huard <lhuard@amadeus.com>2016-08-19 14:45:16 +0200
committerLénaïc Huard <lhuard@amadeus.com>2016-08-19 14:55:13 +0200
commit9ad145998702ecb8651df73d06dc99bdd2343b57 (patch)
tree84827115ca9a008cd2340bf8eb0e2db6a903676c /playbooks/gce/openshift-cluster/config.yml
parenta96a9b713bb15146fa15f2535731c4ac83cc7bd5 (diff)
downloadopenshift-9ad145998702ecb8651df73d06dc99bdd2343b57.tar.gz
openshift-9ad145998702ecb8651df73d06dc99bdd2343b57.tar.bz2
openshift-9ad145998702ecb8651df73d06dc99bdd2343b57.tar.xz
openshift-9ad145998702ecb8651df73d06dc99bdd2343b57.zip
Open OpenStack security group for the service node port range
With OpenShift 3.2, creating a service accessible from the outside of the cluster thanks to `nodePort` automatically opens the “local” `iptables` firewall to allow incoming connection on the `nodePort` of the service. In order to benefit from this improvement, the OpenStack security group shouldn’t block those incoming connections. This change opens, on the OS nodes, the port range dedicated to service node ports.
Diffstat (limited to 'playbooks/gce/openshift-cluster/config.yml')
0 files changed, 0 insertions, 0 deletions