Este contenido no está disponible en el idioma seleccionado.

Chapter 5. Network ports and protocols


Red Hat Ansible Automation Platform uses several ports to communicate with its services. These ports must be open and available for incoming connections to the Red Hat Ansible Automation Platform server in order for it to work. Ensure that these ports are available and are not blocked by the server firewall.

The following architectural diagram is an example of a fully deployed Ansible Automation Platform with all possible components.

Figure 5.1. Ansible Automation Platform Network ports and protocols

The following table indicates the destination port and the direction of network traffic:

Note

The following default destination ports and installer inventory listed are configurable. If you choose to configure them to suit your environment, you might experience a change in behavior.

Expand
Table 5.1. Network ports and protocols
PortProtocolServiceSourceDestinationRequired forInstaller Inventory Variable

22

TCP

SSH

Installer node

Automation hub

Installation (temporary)

ansible_port

22

TCP

SSH

Installer node

Controller node

Installation (temporary)

ansible_port

22

TCP

SSH

Installer node

EDA node

Installation (temporary)

ansible_port

22

TCP

SSH

Installer node

Execution node

Installation (temporary)

ansible_port

22

TCP

SSH

Installer node

Hop node

Installation (temporary)

ansible_port

22

TCP

SSH

Installer node

Hybrid node

Installation (temporary)

ansible_port

22

TCP

SSH

Installer node

PostgreSQL database

Remote access during installation (temporary)

pg_port

80/443

TCP

HTTP/HTTPS

Installer node

Automation hub

Allows installer node to push the execution environment image to automation hub when using the bundle installer.

Fixed value

80/443

TCP

HTTP/HTTPS

Execution node

Automation hub

Allows execution nodes to pull the execution environment image from automation hub.

Fixed value

80/443

TCP

HTTP/HTTPS

Automation controller

Automation hub

For pulling collections and/or container images execution environments.

Fixed value

443

TCP

HTTPS

Controller node

Client

Web UI/API

nginx_https_port

443

TCP

HTTPS

Controller node

OpenShift Container Platform

Only required when using container groups to run jobs.

Host name of OpenShift API server

5432

TCP

PostgreSQL

Controller node

PostgreSQL database

Open only if the internal database is used along with another component. Otherwise, this port should not be open.

automationcontroller_pg_port

5432

TCP

PostgreSQL

EDA node

PostgreSQL database

Open only if the internal database is used along with another component. Otherwise, this port should not be open.

automationedacontroller_pg_port

5432

TCP

PostgreSQL

Automation hub

PostgreSQL database

Open only if the internal database is used along with another component. Otherwise, this port should not be open.

automationhub_pg_port

27199

TCP

Receptor

Controller node

Execution node

Configurable

Mesh nodes directly peered to controllers.

Direct nodes involved. 27199 communication can be both ways (depending on installation inventory) for execution nodes

receptor_listener_port

peers

27199

TCP

Receptor

Controller node

Hop node

Configurable

ENABLE connections from hop nodes to Receptor port if relayed through hop nodes.

receptor_listener_port

peers

27199

TCP

Receptor

Controller node

Hybrid node

Configurable

ENABLE connections from controllers to Receptor port if relayed through non-hop connected nodes.

receptor_listener_port

peers

27199

TCP

Receptor

Execution node

Hop node

Configurable

Mesh 27199 communication can be both ways (depending on installation inventory) for execution nodes

ALLOW connection from controller(s) to Receptor port

receptor_listener_port

peers

27199

TCP

Receptor

Execution node

Controller node

Configurable

Mesh 27199 communication can be both ways (depending on installation inventory) for execution nodes

ALLOW connection from controller(s) to Receptor port

receptor_listener_port

peers

Note
  • Hybrid nodes act as a combination of control and execution nodes, and therefore Hybrid nodes share the connections of both.
  • If receptor_listener_port is defined, the machine also requires an available open port on which to establish inbound TCP connections, for example, 27199.
  • It might be the case that some servers do not listen on receptor port (the default is 27199)

    Suppose you have a Control plane with nodes A, B, C, D

    The RPM installer creates a strongly connected peering between the control plane nodes with a least privileged approach and opens the tcp listener only on those nodes where it is required. All the receptor connections are bidirectional, so once the connection is created, the receptor can communicate in both directions.

    The following is an example peering set up for three controller nodes:

    Controller node A -→ Controller node B

    Controller node A -→ Controller node C

    Controller node B -→ Controller node C

    You can force the listener by setting

    receptor_listener=True

    However, a connection Controller B -→ A is likely to be rejected as that connection already exists.

    This means that nothing connects to Controller A as Controller A is creating the connections to the other nodes, and the following command does not return anything on Controller A:

    [root@controller1 ~]# ss -ntlp | grep 27199 [root@controller1 ~]#

Expand
Table 5.2. Red Hat Insights for Red Hat Ansible Automation Platform
URLRequired for

https://api.access.redhat.com:443

General account services, subscriptions

https://cert-api.access.redhat.com:443

Insights data upload

https://cert.console.redhat.com:443

Inventory upload and Cloud Connector connection

https://console.redhat.com:443

Access to Insights dashboard

Expand
Table 5.3. Automation Hub
URLRequired for

https://console.redhat.com:443

General account services, subscriptions

https://catalog.redhat.com:443

Indexing execution environments

https://sso.redhat.com:443

TCP

https://automation-hub-prd.s3.amazonaws.com:443https://automation-hub-prd.s3.us-east-2.amazonaws.com:443

Firewall access

https://galaxy.ansible.com:443

Ansible Community curated Ansible content

https://ansible-galaxy-ng.s3.dualstack.us-east-1.amazonaws.com:443

Dual Stack IPv6 endpoint for Community curated Ansible content repository

https://registry.redhat.io:443

Access to container images provided by Red Hat and partners

https://cert.console.redhat.com:443

Red Hat and partner curated Ansible Collections

Expand
Table 5.4. Execution Environments (EE)
URLRequired for

https://registry.redhat.io:443

Access to container images provided by Red Hat and partners

cdn.quay.io:443

Access to container images provided by Red Hat and partners

cdn01.quay.io:443

Access to container images provided by Red Hat and partners

cdn02.quay.io:443

Access to container images provided by Red Hat and partners

cdn03.quay.io:443

Access to container images provided by Red Hat and partners

Important

As of April 1st, 2025, quay.io is adding three additional endpoints. As a result, customers must adjust allow/block lists within their firewall systems lists to include the following endpoints:

  • cdn04.quay.io
  • cdn05.quay.io
  • cdn06.quay.io

To avoid problems pulling container images, customers must allow outbound TCP connections (ports 80 and 443) to the following hostnames:

  • cdn.quay.io
  • cdn01.quay.io
  • cdn02.quay.io
  • cdn03.quay.io
  • cdn04.quay.io
  • cdn05.quay.io
  • cdn06.quay.io

This change should be made to any firewall configuration that specifically enables outbound connections to registry.redhat.io or registry.access.redhat.com.

Use the hostnames instead of IP addresses when configuring firewall rules.

After making this change, you can continue to pull images from registry.redhat.io or registry.access.redhat.com. You do not require a quay.io login, or need to interact with the quay.io registry directly in any way to continue pulling Red Hat container images.

For more information, see Firewall changes for container image pulls 2024/2025.

Volver arriba
Red Hat logoGithubredditYoutubeTwitter

Aprender

Pruebe, compre y venda

Comunidades

Acerca de la documentación de Red Hat

Ayudamos a los usuarios de Red Hat a innovar y alcanzar sus objetivos con nuestros productos y servicios con contenido en el que pueden confiar. Explore nuestras recientes actualizaciones.

Hacer que el código abierto sea más inclusivo

Red Hat se compromete a reemplazar el lenguaje problemático en nuestro código, documentación y propiedades web. Para más detalles, consulte el Blog de Red Hat.

Acerca de Red Hat

Ofrecemos soluciones reforzadas que facilitan a las empresas trabajar en plataformas y entornos, desde el centro de datos central hasta el perímetro de la red.

Theme

© 2025 Red Hat