Chapter 5. Network ports and protocols
Red Hat Ansible Automation Platform uses several ports to communicate with its services. These ports must be open and available for incoming connections to the Red Hat Ansible Automation Platform server in order for it to work. Ensure that these ports are available and are not being blocked by the server firewall.
The following architectural diagram is an example of a fully deployed Ansible Automation Platform with all possible components.
The following tables show the default Red Hat Ansible Automation Platform destination ports required for each application.
The following default destination ports and installer inventory listed are configurable. If you choose to configure them to suit your environment, you might experience a change in behavior.
| Port | Protocol | Service | Direction | Installer Inventory Variable | Required for |
|---|---|---|---|---|---|
| 22 | TCP | SSH | Inbound and Outbound |
| Remote access during installation |
| 5432 | TCP | Postgres | Inbound and Outbound |
| Default port ALLOW connections from controller(s) to database port |
| Port | Protocol | Service | Direction | Installer Inventory Variable | Required for |
|---|---|---|---|---|---|
| 22 | TCP | SSH | Inbound and Outbound |
| Installation |
| 80 | TCP | HTTP | Inbound |
| UI/API |
| 443 | TCP | HTTPS | Inbound |
| UI/API |
| 5432 | TCP | PostgreSQL | Inbound and Outbound |
| Open only if the internal database is used along with another component. Otherwise, this port should not be open Hybrid mode in a cluster |
| 27199 | TCP | Receptor | Inbound and Outbound |
| ALLOW receptor listener port across all controllers for mandatory and automatic control plane clustering |
| Port | Protocol | Service | Direction | Installer Inventory Variable | Required for |
|---|---|---|---|---|---|
| 22 | TCP | SSH | Inbound and Outbound |
| Installation |
| 27199 | TCP | Receptor | Inbound and Outbound |
| Mesh ALLOW connection from controller(s) to Receptor port |
| Port | Protocol | Service | Direction | Installer Inventory Variable | Required for |
|---|---|---|---|---|---|
| 22 | TCP | SSH | Inbound and Outbound |
| Installation |
| 80/443 | TCP | SSH | Inbound and Outbound | Fixed value (maps to Table 5.7 Automation hub’s "User interface" port) | Allows execution nodes to pull the execution environment image from automation hub |
| 27199 | TCP | Receptor | Inbound and Outbound |
| Mesh - Nodes directly peered to controllers. No hop nodes involved. 27199 is bi-directional for the execution nodes ALLOW connections from controller(s) to Receptor port (non-hop connected nodes) ALLOW connections from hop node(s) to Receptor port (if relayed through hop nodes) |
| Port | Protocol | Service | Direction | Installer Inventory Variable | Required for |
|---|---|---|---|---|---|
| 22 | TCP | SSH | Inbound and Outbound |
| Installation |
| 27199 | TCP | Receptor | Inbound and Outbound |
| Mesh - Nodes directly peered to controllers. Direct nodes involved. 27199 is bi-directional for execution nodes ENABLE connections from controller(s) to Receptor port for non-hop connected nodes ENABLE connections from hop node(s) to Receptor port if relayed through hop nodes |
| 443 | TCP | Podman | Inbound |
| UI/API |
| Port | Protocol | Service | Direction | Installer Inventory Variable | Required for |
|---|---|---|---|---|---|
| 22 | TCP | SSH | Inbound and Outbound |
| Installation |
| 27199 | TCP | Receptor | Inbound and Outbound |
| Mesh - Nodes directly peered to controllers. No hop nodes involved. 27199 is bi-directional for the execution nodes ENABLE connections from controller(s) to Receptor port for non-hop connected nodes ENABLE connections from hop node(s) to Receptor port if relayed through hop nodes |
| 443 | TCP | Podman | Inbound |
| UI/API |
| Port | Protocol | Service | Direction | Installer Inventory Variable | Required for |
|---|---|---|---|---|---|
| 22 | TCP | SSH | Inbound and Outbound |
| Installation |
| 80 | TCP | HTTP | Inbound | Fixed value | User interface |
| 443 | TCP | HTTPS | Inbound | Fixed value | User interface |
| 5432 | TCP | PostgreSQL | Inbound and Outbound |
| Open only if the internal database is used along with another component. Otherwise, this port should not be open |
| Port | Protocol | Service | Direction | Installer Inventory Variable | Required for |
|---|---|---|---|---|---|
| 22 | TCP | SSH | Inbound and Outbound |
| Installation |
| 443 | TCP | HTTPS | Inbound |
| Access to Service Catalog user interface |
| 5432 | TCP | PostgreSQL | Inbound and Outbound |
| Open only if the internal database is used. Otherwise, this port should not be open |
| URL | Required for |
|---|---|
| General account services, subscriptions | |
| Insights data upload | |
| Inventory upload and Cloud Connector connection | |
| Access to Insights dashboard |
| URL | Required for |
|---|---|
| General account services, subscriptions | |
| Indexing execution environments | |
| TCP | |
| https://automation-hub-prd.s3.amazonaws.com https://automation-hub-prd.s3.us-east-2.amazonaws.com/ | Firewall access |
| Ansible Community curated Ansible content | |
| https://ansible-galaxy-ng.s3.dualstack.us-east-1.amazonaws.com | |
| Access to container images provided by Red Hat and partners | |
| Red Hat and partner curated Ansible Collections |
| URL | Required for |
|---|---|
| Access to container images provided by Red Hat and partners | |
|
| Access to container images provided by Red Hat and partners |
|
| Access to container images provided by Red Hat and partners |
|
| Access to container images provided by Red Hat and partners |
|
| Access to container images provided by Red Hat and partners |
Image manifests and filesystem blobs are served directly from registry.redhat.io. However, from 1 May 2023, filesystem blobs are served from quay.io instead. To avoid problems pulling container images, you must enable outbound connections to the listed quay.io hostnames.
Make this change to any firewall configuration that specifically enables outbound connections to registry.redhat.io.
Use the hostnames instead of IP addresses when configuring firewall rules.
After making this change, you can continue to pull images from registry.redhat.io. You do not require a quay.io login, or need to interact with the quay.io registry directly in any way to continue pulling Red Hat container images.
For more information, see the article here