Skip to content

Commit ca9fa96

Browse files
authored
Extract port into variable
1 parent b92026e commit ca9fa96

File tree

3 files changed

+11
-1
lines changed

3 files changed

+11
-1
lines changed

doc/source/configuration/cephadm.rst

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -344,6 +344,8 @@ should be used in the Kolla Manila configuration e.g.:
344344
345345
manila_cephfs_filesystem_name: manila-cephfs
346346
347+
.. _RGWs-Ceph:
348+
347349
RADOS Gateways
348350
--------------
349351

doc/source/configuration/firewall.rst

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -108,6 +108,9 @@ Storage firewalld Configuration
108108
# - state: enabled
109109
storage_firewalld_rules: "{{ stackhpc_firewalld_rules }}"
110110
111+
If using RADOS Gateway, you can customise ``stackhpc_ceph_firewalld_radosgw_port`` to match
112+
the ``rgw_frontend_port`` as documented in :ref:`RGWs-with-Ceph`.
113+
111114
Monitoring firewalld Configuration
112115
----------------------------------
113116

@@ -234,6 +237,7 @@ The following workaround is needed to prevent VM network traffic from being bloc
234237

235238
.. code-block:: yaml
236239
:caption: ``seed_hypervisor.yml``
240+
237241
seed_hypervisor_sysctl_parameters:
238242
# By default this is 1, which causes layer 2 traffic flowing through Linux
239243
# bridges to pass through iptables. This blocks traffic from VMs (seed, wazuh) to

etc/kayobe/inventory/group_vars/all/firewall

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -211,6 +211,10 @@ stackhpc_compute_firewalld_rules_template:
211211
###############################################################################
212212
# Ceph firewalld rules
213213

214+
# Port on which radosgw is exposed.
215+
# See: https://stackhpc-kayobe-config.readthedocs.io/en/stackhpc-2024.1/configuration/cephadm.html#rados-gateways
216+
stackhpc_ceph_firewalld_radosgw_port: 8100
217+
214218
stackhpc_ceph_firewalld_rules_template:
215219
# Ceph Prometheus exporter
216220
- rules:
@@ -229,7 +233,7 @@ stackhpc_ceph_firewalld_rules_template:
229233
- service: ceph-mon
230234
network: "{{ storage_net_name }}"
231235
state: "{{ 'enabled' if 'mons' in group_names else 'disabled' }}"
232-
- port: 8100/tcp
236+
- port: "{{ stackhpc_ceph_firewalld_radosgw_port }}/tcp"
233237
network: "{{ storage_net_name }}"
234238
state: "{{ 'enabled' if 'rgws' in group_names else 'disabled' }}"
235239
enabled: "{{ 'ceph' in group_names }}"

0 commit comments

Comments
 (0)