Firewall Information
If your environment has strict network policies that prevent any unauthorized communication between two namespaces, you may need to add one or more exceptions to your network policies to allow communication between the sidecars and the local Istio Control Plane, as well as between the local Istio Control Plane and the TSB management plane.
The following information can be used to derive the appropriate set of firewall rules.
Communication between TSB, Control Plane and Workloads
Between Istio and TSB
TSB Load Balancer port
TSB Load Balancer (also known as front-envoy
) has default port 8443. This port value is user configurable.
For example, it can be changed to 443. If the default port is changed, then all components that communicate via front-envoy
need to be adjusted accordingly to match the user-defined value of the front-envoy
port.
Source | Destination |
---|---|
xcp-edge.istio-system | TSB Load Balancer IP, port 9443 |
oap.istio-system | TSB Load Balancer IP, port 8443 or user defined front-envoy port |
otel-collector.istio-system | TSB Load Balancer IP, port 8443 or user defined front-envoy port |
oap.istio-system | Elasticsearch target IP and port (If using demo deployment of Elasticsearch or using front-envoy as Elasticsearch proxy, change to TSB Load Balancer IP, port 8443 or user defined front-envoy port) |
Between Sidecars on k8s and Istio Control Plane
Source | Destination |
---|---|
Sidecars or load balancers in any application namespace or shared load balancer in any namespace to access Istio Pilot xDS server. | istiod.istio-system , port 15012 |
Sidecars or load balancers in any application namespace or shared load balancer in any namespace to access SkyWalking OAP metrics server. | oap.istio-system , port 11800 |
Sidecars or load balancers in any application namespace or shared load balancer in any namespace to access SkyWalking OAP trace server. | oap.istio-system , port 9411 |
Between Sidecars on VMs and Istio Control Plane
Source | Destination |
---|---|
Sidecars on VMs to access Istio Pilot xDS server, SkyWalking OAP metrics server, trace server | VM Gateway (vmgateway.istio-system ) Load Balancer IP,port 15443 |
Between Sidecars on VMs and workloads on k8s
Source | Destination |
---|---|
Sidecars on VMs to access workloads on k8s | Either k8s pods directly, Or VM Gateway ( vmgateway.istio-system ) Load Balancer IP,port 15443 |
Between workloads on k8s and Sidecars on VMs
Source | Destination |
---|---|
k8s pods to access workloads on VMs | VM IP |
Between workloads in cluster A and workloads in cluster B
Source | Destination |
---|---|
k8s pods or VMs (cluster A) | per-Service Gateway Load Balancer IP, port 15443 (cluster B) |
k8s pods or VMs (cluster B) | per-Service Gateway Load Balancer IP, port 15443 (cluster A) |
Shared Load Balancers
If you are using a shared load balancer, then the load balancer envoy will need to be able to talk to all attached applications and their services. Since this information is not known in advance, we cannot provide definitive information on the ports to open in a firewall.
TSB components ports
Following are ports and protocols used by TSB components.
Cert manager
Port | Protocol | Description |
---|---|---|
10250 | HTTPS | Webhooks service port |
6080 | HTTP | Health checks |
Management plane
Port | Protocol | Description |
---|---|---|
Management plane operator tsb-operator-management-plane.tsb | ||
8383 | HTTP | Prometheus telemetry |
443 | HTTPS | Webhooks service port |
9443 | HTTPS | Webhook container port, forwarded from 443 |
TSB API server tsb.tsb | ||
8000 | HTTP | HTTP API |
9080 | GRPC | GRPC API |
42422 | HTTP | Prometheus telemetry |
9082 | HTTP | Health checks |
Open Telemetry otel-collector.tsb | ||
9090 | HTTP | Prometheus telemetry |
9091 | HTTP | Collector endpoint |
13133 | HTTP | Health checks |
TSB front-envoy envoy.tsb | ||
8443 | HTTP/GRPC | TSB HTTP and GRPC API port |
9443 | TCP | XCP port |
IAM iamserver.tsb | ||
8000 | HTTP | HTTP API |
9080 | GRPC | GRPC API |
42422 | HTTP | Prometheus telemetry |
9082 | HTTP | Health checks |
MPC mpc.tsb | ||
9080 | GRPC | GRPC API |
42422 | HTTP | Prometheus telemetry |
9082 | HTTP | Health checks |
OAP oap.tsb | ||
11800 | GRPC | GRPC API |
12800 | HTTP | REST API |
1234 | HTTP | Prometheus telemetry |
9411 | HTTP | Trace query |
9412 | HTTP | Trace collect |
TSB UI web.tsb | ||
8080 | HTTP | HTTP service port and health check |
XCP operator central xcp-operator-central.tsb | ||
8383 | HTTP | Prometheus telemetry |
443 | HTTPS | Webhooks service port |
XCP central central.tsb | ||
8090 | HTTP | Debug interface |
9080 | GRPC | GRPC API |
8080 | HTTP | Prometheus telemetry |
443 | HTTPS | Webhooks service port |
8443 | HTTPS | Webhook container port, forwarded from 443 |
Control plane
Port | Protocol | Description |
---|---|---|
Control plane operator tsb-operator-control-plane.istio-system | ||
8383 | HTTP | Prometheus telemetry |
443 | HTTPS | Webhooks service port |
9443 | HTTPS | Webhook container port, forwarded from 443 |
Open Telemetry otel-collector.tsb | ||
9090 | HTTP | Prometheus telemetry |
9091 | HTTP | Collector endpoint |
13133 | HTTP | Health checks |
OAP oap.istio-system | ||
11800 | GRPC | GRPC API |
12800 | HTTP | REST API |
1234 | HTTP | Prometheus telemetry |
15021 | HTTP | Envoy sidecar health check |
15020 | HTTP | Envoy sidecar Merged Prometheus telemetry from Istio agent, Envoy, and application |
9411 | HTTP | Trace query |
9412 | HTTP | Trace collect |
Istio operator istio-operator.istio-system | ||
443 | HTTPS | Webhooks service port |
8383 | HTTP | Prometheus telemetry |
Istiod istiod.istio-system | ||
443 | HTTPS | Webhooks service port |
8080 | HTTP | Debug interface |
15010 | GRPC | XDS and CA services (Plaintext, only for secure networks) |
15012 | GRPC | XDS and CA services (TLS and mTLS, recommended for production use) |
15014 | HTTP | Control plane monitoring |
15017 | HTTPS | Webhook container port, forwarded from 443 |
XCP operator central xcp-operator-edge.istio-system | ||
8383 | HTTP | Prometheus telemetry |
443 | HTTPS | Webhooks service port |
XCP central edge.istio-system | ||
8090 | HTTP | Debug interface |
9080 | GRPC | GRPC API |
8080 | HTTP | Prometheus telemetry |
443 | HTTPS | Webhooks service port |
8443 | HTTPS | Webhook container port, forwarded from 443 |
Onboarding operator onboarding-operator.istio-system | ||
443 | HTTPS | Webhooks service port |
9443 | HTTPS | Webhook container port, forwarded from 443 |
9082 | HTTP | Health checks |
Onboarding repository onboarding-repository.istio-system | ||
8080 | HTTP | HTTP service port |
9082 | HTTP | Health checks |
Onboarding plane onboarding-plane.istio-system | ||
8443 | HTTP | Onboarding API |
9082 | HTTP | Health checks |
VM Gateway vmgateway.istio-system | ||
15021 | HTTP | Health checks |
15012 | HTTP | Istiod |
11800 | HTTP | OAP Metrics |
9411 | HTTP | Tracing |
15443 | HTTPS | mTLS traffic port |
443 | HTTPS | HTTPS port |
Data plane
Port | Protocol | Description |
---|---|---|
Data plane operator tsb-operator-data-plane.istio-gateway | ||
8383 | HTTP | Prometheus telemetry |
443 | HTTPS | Webhooks service port |
9443 | HTTPS | Webhook container port, forwarded from 443 |
Istio operator istio-operator.istio-gateway | ||
443 | HTTPS | Webhooks service port |
8383 | HTTP | Prometheus telemetry |
Istiod istiod.istio-gateway | ||
443 | HTTPS | Webhooks service port |
8080 | HTTP | Debug interface |
15010 | GRPC | XDS and CA services (Plaintext, only for secure networks) |
15012 | GRPC | XDS and CA services (TLS and mTLS, recommended for production use) |
15014 | HTTP | Control plane monitoring |
15017 | HTTPS | Webhook container port, forwarded from 443 |
Sidecars
Refer to Ports used by Istio for list of ports and protocols used by Istio sidecar proxy (Envoy).