Firewall Configuration
If you’re running Oakestra on a restricted network, e.g., on cloud VMs, you need to configure the firewall rules.
Firewall Configuration
These are the ports that need to be open for the Oakestra components to communicate.
Root Orchestrator
- External APIs: port
10000
(APIs used by the CLI and the Web Interface to interact with the Root Orchestrator) - Cluster APIs: ports
10099
,10000
(APIs used by each Cluster Orchestrator)
Cluster Orchestrator
- Worker’s Broker: port
10003
(MQTT Broker port, used by the workers to communicate with the Cluster Orchestrator) - Worker’s APIs: port
10100
(HTTP APIs used by the workers to perform the initial cluster handshake)
Worker machine
- P2P tunnel towards other workers: port
50103
(P2P tunnel used by the workers to communicate with each other; this port can be customized for each worker, check Worker Peer-to-Peer (P2P) Tunnel Configuration for more details)
Worker P2P Tunnel Configuration
The NetManager component, responsible for the worker nodes’ P2P tunnel, must be configured with (i) the IP Address where the other workers can reach the current device and (ii) the port where the tunnel is exposed.
The P2P tunnel is used to exchange service traffic across nodes. Each worker node must be reachable from the other workers at the specified address and port.
Follow these steps on every Worker Node attached to the Oakestra cluster.
- Shutdown your worker node components using
- Edit the NetManager configuration file
/etc/netmanager/netcfg.json
as follows:
- Restart the NodeEngine
You should now have a working P2P tunnel between your worker nodes. 🌎