此内容没有您所选择的语言版本。

9.10.7. Configuring the Port Proxy


All OpenShift Enterprise applications are contained within gears. These applications listen for connections on the loopback interface. The node host uses iptables to listen on external-facing ports and forwards incoming requests to the appropriate application.

Procedure 9.9. To Configure the OpenShift Port Proxy:

  1. Verify that iptables is running and will start on boot.
    # service iptables restart
    # chkconfig iptables on
    Copy to Clipboard Toggle word wrap
  2. Verify that the port proxy starts on boot:
    # chkconfig openshift-iptables-port-proxy on
    Copy to Clipboard Toggle word wrap
  3. Modify the iptables rules:
    # sed -i '/:OUTPUT ACCEPT \[.*\]/a :rhc-app-comm - [0:0]' /etc/sysconfig/iptables
    # sed -i '/-A INPUT -i lo -j ACCEPT/a -A INPUT -j rhc-app-comm' /etc/sysconfig/iptables
    
    Copy to Clipboard Toggle word wrap

    Warning

    After you run these commands, do not run any further lokkit commands on the node host. Running lokkit commands after this point overwrites the required iptables rules and causes the openshift-iptables-port-proxy service to fail during startup.
    Restart the iptables service for the changes to take effect:
    # service iptables restart
    Copy to Clipboard Toggle word wrap
  4. Start the service immediately:
    # service openshift-iptables-port-proxy start
    Copy to Clipboard Toggle word wrap
  5. Run the following command so that the openshift-gears service script starts on boot. The openshift-gears service script starts gears when a node host is rebooted:
    # chkconfig openshift-gears on
    Copy to Clipboard Toggle word wrap

Note

If you use the kickstart or bash script, the configure_port_proxy function performs these steps.
返回顶部
Red Hat logoGithubredditYoutubeTwitter

学习

尝试、购买和销售

社区

关于红帽文档

通过我们的产品和服务,以及可以信赖的内容,帮助红帽用户创新并实现他们的目标。 了解我们当前的更新.

让开源更具包容性

红帽致力于替换我们的代码、文档和 Web 属性中存在问题的语言。欲了解更多详情,请参阅红帽博客.

關於紅帽

我们提供强化的解决方案,使企业能够更轻松地跨平台和环境(从核心数据中心到网络边缘)工作。

Theme

© 2025 Red Hat