diff options
author | Lénaïc Huard <lhuard@amadeus.com> | 2016-08-19 14:45:16 +0200 |
---|---|---|
committer | Lénaïc Huard <lhuard@amadeus.com> | 2016-08-19 14:55:13 +0200 |
commit | 9ad145998702ecb8651df73d06dc99bdd2343b57 (patch) | |
tree | 84827115ca9a008cd2340bf8eb0e2db6a903676c /roles/openshift_persistent_volumes | |
parent | a96a9b713bb15146fa15f2535731c4ac83cc7bd5 (diff) | |
download | openshift-9ad145998702ecb8651df73d06dc99bdd2343b57.tar.gz openshift-9ad145998702ecb8651df73d06dc99bdd2343b57.tar.bz2 openshift-9ad145998702ecb8651df73d06dc99bdd2343b57.tar.xz openshift-9ad145998702ecb8651df73d06dc99bdd2343b57.zip |
Open OpenStack security group for the service node port range
With OpenShift 3.2, creating a service accessible from the outside of the
cluster thanks to `nodePort` automatically opens the “local” `iptables`
firewall to allow incoming connection on the `nodePort` of the service.
In order to benefit from this improvement, the OpenStack security group
shouldn’t block those incoming connections.
This change opens, on the OS nodes, the port range dedicated to service
node ports.
Diffstat (limited to 'roles/openshift_persistent_volumes')
0 files changed, 0 insertions, 0 deletions