Network & Firewall Configuration
Configure network settings and firewall for ORISO Platform v3.0.0 deployed on Kubernetes. External access is via Ingress (ports 80/443), not individual service ports.In Kubernetes deployment:
- External Access: Via Ingress Controller (ports 80/443)
- Internal Services: ClusterIP (not exposed externally)
- Firewall: Only needs to allow ports 80, 443, 22, and 6443 (Kubernetes API)
Check Network Configuration
Verify network connectivity and configuration.
Ensure you can ping external addresses and DNS resolution is working correctly.
Configure Firewall for Kubernetes
Configure firewall to allow only necessary ports for Kubernetes and Ingress.
Expected output should show ports 22, 80, 443, and optionally 6443 as
ALLOW IN with status active.In Kubernetes deployment:
- All services are accessed via Ingress (ports 80/443)
- Internal services use ClusterIP (not exposed externally)
- No need to open individual service ports (8081, 8082, etc.)
Kubernetes Network Model
External Access
- Ingress Controller: Ports 80 (HTTP) and 443 (HTTPS)
- All Services: Accessed via Ingress with domain names
- TLS: Automatic via cert-manager
Internal Communication
- Service Discovery: Kubernetes DNS (
.svc.cluster.local) - Service Type: ClusterIP (internal only)
- No Direct Access: Services not exposed externally
Required Firewall Ports
| Port | Service | Required | Description |
|---|---|---|---|
22 | SSH | ✅ Required | Server access |
80 | HTTP | ✅ Required | Ingress Controller (redirects to HTTPS) |
443 | HTTPS | ✅ Required | Ingress Controller (TLS termination) |
6443 | Kubernetes API | Optional | kubectl access (if needed) |
Ports NOT Required
The following ports are NOT needed in firewall rules:- Service ports (8081, 8082, 8083, 8084, etc.) - Internal only
- Database ports (3306, 27017, 5432) - ClusterIP only
- Keycloak port (8080) - Accessed via Ingress
- Matrix ports (8008, 8009) - Accessed via Ingress
Network Policies (Optional)
For additional security, implement Kubernetes Network Policies:Troubleshooting
Cannot Access Services
Firewall Lockout
If you’re locked out of SSH after enabling the firewall:- Access your server via console (not SSH)
- Disable UFW:
sudo ufw disable - Re-add SSH rule:
sudo ufw allow 22/tcp - Re-enable UFW:
sudo ufw enable
DNS Issues
Next Steps
- Install Required Software - Install Kubernetes and Helm
- Setup Kubernetes - Configure Kubernetes cluster
- Deploy Infrastructure - Deploy all services