Search

Chapter 6. Network ports and protocols

download PDF

Red Hat Ansible Automation Platform uses several ports to communicate with its services. These ports must be open and available for incoming connections to the Red Hat Ansible Automation Platform server in order for it to work. Ensure that these ports are available and are not blocked by the server firewall.

The following architectural diagram is an example of a fully deployed Ansible Automation Platform with all possible components.

Note

In some of the following use cases, hop nodes are used instead of a direct link from an execution node. Hop nodes are an option for connecting control and execution nodes. Hop nodes use minimal CPU and memory, so vertically scaling hop nodes does not impact system capacity.

Figure 6.1. Ansible Automation Platform Network ports and protocols

Interaction of Ansible Automation Platform components on the network with information about the ports and protocols that are used.

The following table indicates the destination port and the direction of network traffic:

Note

The following default destination ports and installer inventory listed are configurable. If you choose to configure them to suit your environment, you might experience a change in behavior.

Table 6.1. Network ports and protocols
PortProtocolServiceSourceDestinationRequired forInstaller Inventory Variable

22

TCP

SSH

Installer node

Automation hub

Installation (temporary)

ansible_port

22

TCP

SSH

Installer node

Controller node

Installation (temporary)

ansible_port

22

TCP

SSH

Installer node

Event-Driven Ansible node

Installation (temporary)

ansible_port

22

TCP

SSH

Installer node

Execution node

Installation (temporary)

ansible_port

22

TCP

SSH

Installer node

Hop node

Installation (temporary)

ansible_port

22

TCP

SSH

Installer node

Hybrid node

Installation (temporary)

ansible_port

22

TCP

SSH

Installer node

PostgreSQL database

Remote access during installation (temporary)

pg_port

80/443

TCP

HTTP/HTTPS

Installer node

Automation hub

Allows installer node to push the execution environment image to automation hub when using the bundle installer.

Fixed value

80/443

TCP

HTTP/HTTPS

Event-Driven Ansible node

Automation hub

 

Fixed value

80/443

TCP

HTTP/HTTPS

Event-Driven Ansible node

Automation controller

 

Fixed value

80/443

TCP

HTTP/HTTPS

Automation controller

Automation hub

 

Fixed value

80/443

TCP

HTTP/HTTPS

Execution node

Automation hub

Allows execution nodes to pull the execution environment image from automation hub.

Fixed value

443

TCP

HTTPS

Controller node

Client

Web UI/API

This exposes the mesh ingress receptor entry point for inbound connections.

nginx_https_port

443

TCP

HTTPS

Controller node

OpenShift Container Platform

Only required when using container groups to run jobs.

Host name of OpenShift API server

443

TCP

HTTPS

HA Proxy load balancer

Platform gateway

This is the ingress above the gateway that is customer controlled and can load balance requests to multiple gateways.

This port is customer managed outside of Ansible Automation Platform.

443

TCP

HTTPS

Platform gateway

Automation controller

  

443

TCP

HTTPS

Platform gateway

Automation hub

  

443

TCP

HTTPS

Platform gateway

Event-Driven Ansible

  

443

HTTPS

Receptor

Execution node

OCP Mesh ingress

  

443

HTTPS

Receptor

Hop node

OCP Mesh ingress

  

5432

TCP

PostgreSQL

Controller node

PostgreSQL database

Open only if the internal database is used along with another component. Otherwise, this port should not be open.

automationcontroller_pg_port

5432

TCP

PostgreSQL

Event-Driven Ansible node

PostgreSQL database

Open only if the internal database is used along with another component. Otherwise, this port should not be open.

automationedacontroller_pg_port

5432

TCP

PostgreSQL

Automation hub

PostgreSQL database

Open only if the internal database is used along with another component. Otherwise, this port should not be open.

automationhub_pg_port

5432

TCP

PostgreSQL

Platform gateway

External database

Open only if the internal database is used along with another component. Otherwise, this port should not be open.

automationgateway_pg_port

6379

TCP

PostgreSQL

Event-Driven Ansible

Redis node

  

6379

TCP

PostgreSQL

Platform gateway

Redis node

  

8443

TCP

HTTPS

Platform gateway

Platform gateway

nginx

 

16379

TCP

Redis

Redis nodes

Redis nodes

Redis cluster bus port for a resilient Redis configuration

 

27199

TCP

Receptor

Controller node

Execution node

Configurable

Mesh nodes directly peered to controllers.

Direct nodes involved. 27199 communication can be both ways (depending on installation inventory) for execution nodes

receptor_listener_port

peers

27199

TCP

Receptor

Controller node

Hop node

Configurable

ENABLE connections from hop nodes to Receptor port if relayed through hop nodes.

receptor_listener_port

peers

27199

TCP

Receptor

Controller node

Hybrid node

Configurable

ENABLE connections from controllers to Receptor port if relayed through non-hop connected nodes.

receptor_listener_port

peers

27199

TCP

Receptor

Execution node

Hop node

Configurable

Mesh 27199 communication can be both ways (depending on installation inventory) for execution nodes

ALLOW connection from controller(s) to Receptor port

receptor_listener_port

peers

27199

TCP

Receptor

Hop node

Execution node

 

receptor_listener_port

peers

27199

TCP

Receptor

Execution node

Controller node

Configurable

Mesh 27199 communication can be both ways (depending on installation inventory) for execution nodes

ALLOW connection from controller(s) to Receptor port

receptor_listener_port

peers

27199

TCP

Receptor

OCP cluster

Execution node

  

50051

TCP

GRPC

Platform gateway

Platform gateway

  
Note
  • Hybrid nodes act as a combination of control and execution nodes, and therefore Hybrid nodes share the connections of both.
  • If receptor_listener_port is defined, the machine also requires an available open port on which to establish inbound TCP connections, for example, 27199.
Table 6.2. Red Hat Insights for Red Hat Ansible Automation Platform
URLRequired for

https://api.access.redhat.com:443

General account services, subscriptions

https://cert-api.access.redhat.com:443

Insights data upload

https://cert.console.redhat.com:443

Inventory upload and Cloud Connector connection

https://console.redhat.com:443

Access to Insights dashboard

Table 6.3. Automation Hub
URLRequired for

https://console.redhat.com:443

General account services, subscriptions

https://catalog.redhat.com:443

Indexing execution environments

https://sso.redhat.com:443

TCP

https://automation-hub-prd.s3.amazonaws.com
https://automation-hub-prd.s3.us-east-2.amazonaws.com

Firewall access

https://galaxy.ansible.com:443

Ansible Community curated Ansible content

https://ansible-galaxy-ng.s3.dualstack.us-east-1.amazonaws.com

Dual Stack IPv6 endpoint for Community curated Ansible content repository

https://registry.redhat.io:443

Access to container images provided by Red Hat and partners

https://cert.console.redhat.com:443

Red Hat and partner curated Ansible Collections

Table 6.4. Execution Environments (EE)
URLRequired for

https://registry.redhat.io:443

Access to container images provided by Red Hat and partners

cdn.quay.io:443

Access to container images provided by Red Hat and partners

cdn01.quay.io:443

Access to container images provided by Red Hat and partners

cdn02.quay.io:443

Access to container images provided by Red Hat and partners

cdn03.quay.io:443

Access to container images provided by Red Hat and partners

Important

Image manifests and filesystem blobs are served directly from registry.redhat.io. However, from 1 May 2023, filesystem blobs are served from quay.io instead. To avoid problems pulling container images, you must enable outbound connections to the listed quay.io hostnames.

This change should be made to any firewall configuration that specifically enables outbound connections to registry.redhat.io.

Use the hostnames instead of IP addresses when configuring firewall rules.

After making this change, you can continue to pull images from registry.redhat.io. You do not require a quay.io login, or need to interact with the quay.io registry directly in any way to continue pulling Red Hat container images.

For more information, see Firewall changes for container image pulls.

Red Hat logoGithubRedditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

© 2024 Red Hat, Inc.