Search

Chapter 5. Network ports and protocols

download PDF

Red Hat Ansible Automation Platform uses several ports to communicate with its services. These ports must be open and available for incoming connections to the Red Hat Ansible Automation Platform server in order for it to work. Ensure that these ports are available and are not blocked by the server firewall.

The following architectural diagram is an example of a fully deployed Ansible Automation Platform with all possible components.

Figure 5.1. Ansible Automation Platform Network ports and protocols

Interaction of Ansible Automation Platform components on the network with information about the ports and protocols that are used.

The following table indicates the destination port and the direction of network traffic:

Note

The following default destination ports and installer inventory listed are configurable. If you choose to configure them to suit your environment, you might experience a change in behavior.

Table 5.1. Network ports and protocols
PortProtocolServiceSourceDestinationRequired forInstaller Inventory Variable

22

TCP

SSH

Installer node

Automation hub

Installation (temporary)

ansible_port

22

TCP

SSH

Installer node

Controller node

Installation (temporary)

ansible_port

22

TCP

SSH

Installer node

EDA node

Installation (temporary)

ansible_port

22

TCP

SSH

Installer node

Execution node

Installation (temporary)

ansible_port

22

TCP

SSH

Installer node

Hop node

Installation (temporary)

ansible_port

22

TCP

SSH

Installer node

Hybrid node

Installation (temporary)

ansible_port

22

TCP

SSH

Installer node

PostgreSQL database

Remote access during installation (temporary)

pg_port

80/443

TCP

HTTP/HTTPS

Installer node

Automation hub

Allows installer node to push the execution environment image to automation hub when using the bundle installer.

Fixed value

80/443

TCP

HTTP/HTTPS

Execution node

Automation hub

Allows execution nodes to pull the execution environment image from automation hub.

Fixed value

443

TCP

HTTPS

Controller node

Client

Web UI/API

nginx_https_port

443

TCP

HTTPS

Controller node

OpenShift Container Platform

Only required when using container groups to run jobs.

Host name of OpenShift API server

5432

TCP

PostgreSQL

Controller node

PostgreSQL database

Open only if the internal database is used along with another component. Otherwise, this port should not be open.

automationcontroller_pg_port

5432

TCP

PostgreSQL

EDA node

PostgreSQL database

Open only if the internal database is used along with another component. Otherwise, this port should not be open.

automationedacontroller_pg_port

5432

TCP

PostgreSQL

Automation hub

PostgreSQL database

Open only if the internal database is used along with another component. Otherwise, this port should not be open.

automationhub_pg_port

27199

TCP

Receptor

Controller node

Execution node

Configurable

Mesh nodes directly peered to controllers.

Direct nodes involved. 27199 communication can be both ways (depending on installation inventory) for execution nodes

receptor_listener_port

peers

27199

TCP

Receptor

Controller node

Hop node

Configurable

ENABLE connections from hop nodes to Receptor port if relayed through hop nodes.

receptor_listener_port

peers

27199

TCP

Receptor

Controller node

Hybrid node

Configurable

ENABLE connections from controllers to Receptor port if relayed through non-hop connected nodes.

receptor_listener_port

peers

27199

TCP

Receptor

Execution node

Hop node

Configurable

Mesh 27199 communication can be both ways (depending on installation inventory) for execution nodes

ALLOW connection from controller(s) to Receptor port

receptor_listener_port

peers

27199

TCP

Receptor

Execution node

Controller node

Configurable

Mesh 27199 communication can be both ways (depending on installation inventory) for execution nodes

ALLOW connection from controller(s) to Receptor port

receptor_listener_port

peers

Note
  • Hybrid nodes act as a combination of control and execution nodes, and therefore Hybrid nodes share the connections of both.
  • If receptor_listener_port is defined, the machine also requires an available open port on which to establish inbound TCP connections, for example, 27199.
Table 5.2. Red Hat Insights for Red Hat Ansible Automation Platform
URLRequired for

https://api.access.redhat.com:443

General account services, subscriptions

https://cert-api.access.redhat.com:443

Insights data upload

https://cert.console.redhat.com:443

Inventory upload and Cloud Connector connection

https://console.redhat.com:443

Access to Insights dashboard

Table 5.3. Automation Hub
URLRequired for

https://console.redhat.com:443

General account services, subscriptions

https://catalog.redhat.com:443

Indexing execution environments

https://sso.redhat.com:443

TCP

https://automation-hub-prd.s3.amazonaws.com:443https://automation-hub-prd.s3.us-east-2.amazonaws.com:443

Firewall access

https://galaxy.ansible.com:443

Ansible Community curated Ansible content

https://ansible-galaxy-ng.s3.dualstack.us-east-1.amazonaws.com:443

Dual Stack IPv6 endpoint for Community curated Ansible content repository

https://registry.redhat.io:443

Access to container images provided by Red Hat and partners

https://cert.console.redhat.com:443

Red Hat and partner curated Ansible Collections

Table 5.4. Execution Environments (EE)
URLRequired for

https://registry.redhat.io:443

Access to container images provided by Red Hat and partners

cdn.quay.io:443

Access to container images provided by Red Hat and partners

cdn01.quay.io:443

Access to container images provided by Red Hat and partners

cdn02.quay.io:443

Access to container images provided by Red Hat and partners

cdn03.quay.io:443

Access to container images provided by Red Hat and partners

Important

Image manifests and filesystem blobs are served directly from registry.redhat.io. However, from 1 May 2023, filesystem blobs are served from quay.io instead. To avoid problems pulling container images, you must enable outbound connections to the listed quay.io hostnames.

This change should be made to any firewall configuration that specifically enables outbound connections to registry.redhat.io.

Use the hostnames instead of IP addresses when configuring firewall rules.

After making this change, you can continue to pull images from registry.redhat.io. You do not require a quay.io login, or need to interact with the quay.io registry directly in any way to continue pulling Red Hat container images.

For more information, see Firewall changes for container image pulls.

Red Hat logoGithubRedditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

© 2024 Red Hat, Inc.