Some distributions of Linux derived from RHEL, including Oracle Linux, may have default firewall rules that block communication with Helm.
For example, one Oracle Linux image in AWS has REJECT rules that stop Helm from communicating with Tiller:
This section describes how to use firewalld
to apply the for nodes in a high-availability Rancher server cluster.
Prerequisite
Install v7.x or later ofvfirewalld
:
Applying Firewall Port Rules
firewall-cmd --permanent --add-port=22/tcp
firewall-cmd --permanent --add-port=80/tcp
firewall-cmd --permanent --add-port=2379/tcp
firewall-cmd --permanent --add-port=2380/tcp
firewall-cmd --permanent --add-port=6443/tcp
firewall-cmd --permanent --add-port=9099/tcp
firewall-cmd --permanent --add-port=10254/tcp
firewall-cmd --permanent --add-port=30000-32767/tcp
If your Rancher server nodes have separate roles, use the following commands based on the role of the node:
After the firewall-cmd
commands have been run on a node, use the following command to enable the firewall rules:
firewall-cmd --reload