Searching the Help
To search for information in the Help, type a word or phrase in the Search box. When you enter a group of words, OR is inferred. You can use Boolean operators to refine your search.
Results returned are case insensitive. However, results ranking takes case into account and assigns higher scores to case matches. Therefore, a search for "cats" followed by a search for "Cats" would return the same number of Help topics, but the order in which the topics are listed would be different.

Search for | Example | Results |
---|---|---|
A single word | cat
|
Topics that contain the word "cat". You will also find its grammatical variations, such as "cats". |
A phrase. You can specify that the search results contain a specific phrase. |
"cat food" (quotation marks) |
Topics that contain the literal phrase "cat food" and all its grammatical variations. Without the quotation marks, the query is equivalent to specifying an OR operator, which finds topics with one of the individual words instead of the phrase. |

Search for | Operator | Example |
---|---|---|
Two or more words in the same topic |
|
|
Either word in a topic |
|
|
Topics that do not contain a specific word or phrase |
|
|
Topics that contain one string and do not contain another | ^ (caret) |
cat ^ mouse
|
A combination of search types | ( ) parentheses |
|
Enable firewall on a running node
Follow the steps below on each running node to enable firewall.
On the NFS server
Run the following commands to enable firewall on the NFS server.
systemctl start firewalld;systemctl enable firewalld
firewall-cmd --permanent --add-port=111/udp
firewall-cmd --permanent --add-port=111/tcp
firewall-cmd --permanent --add-port=2049/tcp
firewall-cmd --permanent --add-port=20048/tcp
firewall-cmd --reload
On the running master nodes
For the single-master node deployment
Run the following commands to enable firewall on the running master node.
systemctl start firewalld; systemctl enable firewalld
firewall-cmd --permanent --add-port=4001/tcp
firewall-cmd --permanent --add-port=2380/tcp
firewall-cmd --permanent --add-port=8200/tcp
firewall-cmd --permanent --add-port=8201/tcp
firewall-cmd --permanent --add-port=8443/tcp
firewall-cmd --permanent --add-port=10250/tcp
firewall-cmd --permanent--direct --add-rule ipv4 filter FORWARD 1 -o docker0 -j ACCEPT -m comment --comment "docker subnet"
firewall-cmd --permanent --direct --add-rule ipv4 filter INPUT 1 -i docker0 -j ACCEPT -m comment --comment 'kube-proxy redirects'
firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="<MasterNodeIP>/32" port protocol="tcp" port="10255" accept'
firewall-cmd --reload
For the multiple-master node deployment
Run the following commands to enable firewall on each running master node.
systemctl start firewalld; systemctl enable firewalld
firewall-cmd --permanent --add-port=4001/tcp
firewall-cmd --permanent --add-port=2380/tcp
firewall-cmd --permanent --add-port=8200/tcp
firewall-cmd --permanent --add-port=8201/tcp
firewall-cmd --permanent --add-port=8443/tcp
firewall-cmd --permanent --add-port=10250/tcp
firewall-cmd --permanent--direct --add-rule ipv4 filter FORWARD 1 -o docker0 -j ACCEPT -m comment --comment "docker subnet"
firewall-cmd --permanent --direct --add-rule ipv4 filter INPUT 1 -i docker0 -j ACCEPT -m comment --comment 'kube-proxy redirects'
firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="<MasterNode1IP>/32" port protocol="tcp" port="10255" accept'
firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="<MasterNode2IP>/32" port protocol="tcp" port="10255" accept'
firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="<MasterNode3IP>/32" port protocol="tcp" port="10255" accept'
firewall-cmd --reload
On the running worker nodes
For the single-master node deployment
Run the following commands to enable firewall on each running worker node.
systemctl start firewalld; systemctl enable firewalld
firewall-cmd --permanent --add-port=10250/tcp
firewall-cmd --permanent--direct --add-rule ipv4 filter FORWARD 1 -o docker0 -j ACCEPT -m comment --comment "docker subnet"
firewall-cmd --permanent --direct --add-rule ipv4 filter INPUT 1 -i docker0 -j ACCEPT -m comment --comment 'kube-proxy redirects'
firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="<MasterNodeIP>/32" port protocol="tcp" port="10255" accept'
firewall-cmd --reload
For the multiple-master node deployment
Run the following commands to enable firewall on each running worker node.
systemctl start firewalld; systemctl enable firewalld
firewall-cmd --permanent --add-port=10250/tcp
firewall-cmd --permanent--direct --add-rule ipv4 filter FORWARD 1 -o docker0 -j ACCEPT -m comment --comment "docker subnet"
firewall-cmd --permanent --direct --add-rule ipv4 filter INPUT 1 -i docker0 -j ACCEPT -m comment --comment 'kube-proxy redirects'
firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="<MasterNode1IP>/32" port protocol="tcp" port="10255" accept'
firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="<MasterNode2IP>/32" port protocol="tcp" port="10255" accept'
firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="<MasterNode3IP>/32" port protocol="tcp" port="10255" accept'
firewall-cmd --reload
We welcome your comments!
To open the configured email client on this computer, open an email window.
Otherwise, copy the information below to a web mail client, and send this email to ovdoc-asm@hpe.com.
Help Topic ID:
Product:
Topic Title:
Feedback: