Skip to content

Port Matrix

This page documents all network ports required for the Toyota TMNA POC deployment. All traffic flows on VLAN 111 (10.25.233.0/24 for cluster nodes, 10.25.232.0/24 for the Palette appliance).

Palette Management Appliance Ports

Ports required on the Palette Management Appliance VM (10.25.232.155 / 10.25.232.252):

Port Protocol Direction Source / Destination Purpose
443 TCP/HTTPS Inbound Browser, CLI, cluster agents Palette UI, API, gRPC
6443 TCP/HTTPS Outbound PMA --> cluster nodes K8s API management operations
5080 TCP/HTTPS Inbound Admin browser Local UI (node management, content upload)
30003 TCP/HTTPS Inbound Cluster nodes Internal container registry (image pulls)
22 TCP/SSH Inbound Admin workstation SSH access (installation and troubleshooting)

Bare Metal Cluster Ports

Ports required on each of the 3 bare-metal cluster nodes (10.25.233.4, .5, .6):

External Communication

Port Protocol Direction Source / Destination Purpose
443 TCP/HTTPS Outbound Nodes --> Palette VIP Agent heartbeat, profile sync, gRPC
30003 TCP/HTTPS Outbound Nodes --> Palette VIP Image pulls from internal registry
6443 TCP/HTTPS Inbound Palette VIP --> nodes K8s API (management operations)

Inter-Node Communication (Kubernetes)

These ports must be open between all 3 bare-metal nodes:

Port Protocol Purpose
6443 TCP/HTTPS Kubernetes API server
2379-2380 TCP etcd client and peer communication
10250 TCP Kubelet API
10259 TCP kube-scheduler
10257 TCP kube-controller-manager

Inter-Node Communication (Cilium)

Port Protocol Purpose
4240 TCP Cilium health checks
4244 TCP Hubble server
4245 TCP Hubble relay
8472 UDP VXLAN overlay (if used)
51871 UDP WireGuard encryption (if enabled)

Portworx Ports (Inter-Node)

All Portworx ports are inter-node only -- they run between the 3 bare-metal nodes on the same subnet. No external firewall rules are required for Portworx traffic.

Port Protocol Purpose
9001 TCP/REST Portworx management API
9002 UDP Gossip protocol (node discovery)
9003 TCP Storage data replication between nodes
9010 TCP/REST Object store (if enabled)
9012 TCP/gRPC Node-to-node communication
9013 TCP/gRPC Namespace management
9014 TCP/gRPC Diagnostics
9015 TCP SDK auto-scaling (if enabled)
9018 TCP/gRPC Internal KVDB peer
9019 TCP/gRPC Internal KVDB client
9020 TCP/REST SDK gateway
9021 TCP/REST Health monitor REST
9022 TCP/REST Health monitor gRPC

Same-Subnet Rule

Because all 3 nodes are on the same /24 subnet (10.25.233.0/24), Portworx inter-node traffic does not cross any firewall boundaries. These ports only need to be accessible between the 3 cluster nodes.

VMO / KubeVirt Ports (Inter-Node)

Port Protocol Purpose
16509 TCP libvirt API (live migration)
49152-49215 TCP Live migration data transfer

MetalLB Ports

Port Protocol Purpose
7946 TCP/UDP memberlist (inter-node)

Summary Diagram

graph TB
    subgraph External["External Access"]
        ADMIN["Admin Browser"]
    end

    subgraph PMA["Palette Management Appliance<br/>10.25.232.155 / .252"]
        P443["443 - UI/API"]
        P5080["5080 - Local UI"]
        P30003["30003 - Registry"]
        P22["22 - SSH"]
    end

    subgraph Cluster["Bare Metal Cluster<br/>10.25.233.4-6"]
        C443["443 out - Agent"]
        C6443["6443 - K8s API"]
        C30003["30003 out - Images"]
        INTER["Inter-node:<br/>2379-2380, 10250<br/>9001-9022 (PX)<br/>16509 (VMO)"]
    end

    ADMIN -->|HTTPS| P443
    ADMIN -->|HTTPS| P5080
    PMA -->|"6443"| C6443
    Cluster -->|"443"| P443
    Cluster -->|"30003"| P30003

    style PMA fill:#1F7A78,color:#fff
    style Cluster fill:#005B5B,color:#fff

Firewall Rules Summary

For the network team, here are the required firewall rules in a simplified format:

Rule Source Destination Ports Protocol Direction
Admin to PMA Admin workstation 10.25.232.155 443, 5080 TCP Inbound
SSH to PMA Admin workstation 10.25.232.252 22 TCP Inbound
PMA to Cluster 10.25.232.155 10.25.233.4-6 6443 TCP Outbound
Cluster to PMA 10.25.233.4-6 10.25.232.155 443, 30003 TCP Outbound
Inter-node (K8s) 10.25.233.4-6 10.25.233.4-6 2379-2380, 6443, 10250 TCP Bidirectional
Inter-node (PX) 10.25.233.4-6 10.25.233.4-6 9001-9022 TCP/UDP Bidirectional
Inter-node (VMO) 10.25.233.4-6 10.25.233.4-6 16509, 49152-49215 TCP Bidirectional

RFC Status

The firewall change request (RFC) was approved on 4/21. Ramana submitted the port requirements as part of the RFC process.