Network Security Groups

During deployment, we deploy a network security group on the VM level that includes the required inbound and outbound connections:

ComponentManagement/Data NICPort (TCP)ProtocolNotes
API ServiceManagement443HTTPSAPI and lbcli
etcd Peer PortData2380TCP/IPFor etcd cluster peering
Lightbox ExporterManagement8090HTTPStatistics and monitoring
Data PathData8009TCP/IPNVMe/TCP data access
Discovery ServiceData4420TCP/IPNVMe/TCP discovery access
Replicator PortData22226TCP/IPOther nodes connect for replication to the node via this port.
SSH ConnectivityManagement22SSHShould be limited to specific origin ports.

SSH connectivity is not mandatory and is required only if you use the lbcli on the storage VMs.

To add SSH port access to the NSG in the cluster's managed resource group:

  1. Click the created NSG in the managed resource group (for more, see the Managed Application section).
  2. Click the network security group.
  3. Click the inbound security rules.
  4. Click Add and add the SSH rules. You can also limit it for specific origin addresses.
  1. Click Add. You should now see it in the list of rules.

If you have a network security group or firewall rules set up on the Vnet/subnet, you will need to make sure that the following ports are open.

ComponentManagement/Data NICPort (TCP)ProtocolNotes
API ServiceManagement443HTTPSAPI and lbcli
Statistics ExporterManagement8090HTTPStatistics and monitoring
Data PathData4420,8009TCP/IPNVMe client access
Outbound InternetAzure API443HTTPSRequired outbound rule to the internet or to service tag AzureCloud.
SSH ConnectivityManagement22SSHShould be limited to specific origin ports.

SSH connectivity is not mandatory and is required only if you use the lbcli on the storage VMs.

Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard