diff --git a/docs/howto_firewall.md b/docs/howto_firewall.md index 6537e18ce9..ce4fb70dd3 100644 --- a/docs/howto_firewall.md +++ b/docs/howto_firewall.md @@ -24,7 +24,7 @@ The following ports are optional and they should be considered for MicroShift if The following commands can be used for enabling `firewalld` and opening all the above mentioned source IP addresses and ports. > Use the appropriate pod IP range if it is different from the default `10.42.0.0/16` setting. -> Use the appropriate optional settings when requiring external access to services running on MicroShift (e.g. port 6443 for api server, ports 80 and 443 for applications exposed through the router, etc.). +> Use the appropriate optional settings when requiring external access to services running on MicroShift (e.g. port 6443 for api server, ports 80 and 443 for applications exposed through the router, mdns service for receiving mdns query etc.). ```bash sudo dnf install -y firewalld @@ -32,7 +32,6 @@ sudo systemctl enable firewalld --now # Mandatory settings sudo firewall-cmd --permanent --zone=trusted --add-source=10.42.0.0/16 sudo firewall-cmd --permanent --zone=trusted --add-source=169.254.169.1 -sudo firewall-cmd --permanent --add-service=mdns sudo firewall-cmd --reload # Optional settings sudo firewall-cmd --permanent --zone=public --add-port=80/tcp @@ -41,5 +40,6 @@ sudo firewall-cmd --permanent --zone=public --add-port=5353/udp sudo firewall-cmd --permanent --zone=public --add-port=30000-32767/tcp sudo firewall-cmd --permanent --zone=public --add-port=30000-32767/udp sudo firewall-cmd --permanent --zone=public --add-port=6443/tcp +sudo firewall-cmd --permanent --zone=public --add-service=mdns sudo firewall-cmd --reload ``` diff --git a/scripts/devenv-builder/configure-vm.sh b/scripts/devenv-builder/configure-vm.sh index 4a5043f40b..7742d8b917 100644 --- a/scripts/devenv-builder/configure-vm.sh +++ b/scripts/devenv-builder/configure-vm.sh @@ -131,7 +131,6 @@ if [ $BUILD_AND_INSTALL = true ] ; then sudo systemctl enable firewalld --now sudo firewall-cmd --permanent --zone=trusted --add-source=10.42.0.0/16 sudo firewall-cmd --permanent --zone=trusted --add-source=169.254.169.1 - sudo firewall-cmd --permanent --add-service=mdns sudo firewall-cmd --reload # Run MicroShift Executable > Configuring MicroShift