[ 
https://issues.apache.org/jira/browse/BROOKLYN-41?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Svetoslav Neykov resolved BROOKLYN-41.
--------------------------------------
       Resolution: Fixed
    Fix Version/s: 0.12.0

Should've been fixed with https://github.com/apache/brooklyn-server/pull/713.

> openIptables config appears to customise entries for requested ports, not 
> assigned
> ----------------------------------------------------------------------------------
>
>                 Key: BROOKLYN-41
>                 URL: https://issues.apache.org/jira/browse/BROOKLYN-41
>             Project: Brooklyn
>          Issue Type: Bug
>            Reporter: Sam Corbett
>             Fix For: 0.12.0
>
>
> I set the openIptables config option on a location and deployed an app with 
> one Java app and seven Redis databases.
> I expected Brooklyn to configure the Iptables firewall with an entry for each 
> Redis databse port, but instead saw only one entry. My guess is that it's 
> customising based on the requested ports, not those that were assigned.
> Output from the server:
> {code}
> [sam@brooklyn-muyh-sam-margini-i1lw-redis-and-datafu-rxek-ac1 ~]$ ps aux | 
> grep redis
> sam       8153  0.0  0.0 137344  7256 ?        Ssl  16:51   0:00 
> ./bin/redis-server *:6383
> sam       8173  0.0  0.0 137344  7380 ?        Ssl  16:51   0:00 
> ./bin/redis-server *:6382
> sam       8499  0.0  0.0 137344  7348 ?        Ssl  16:51   0:00 
> ./bin/redis-server *:6380
> sam       8641  0.0  0.0 137344  7376 ?        Ssl  16:51   0:00 
> ./bin/redis-server *:6385
> sam       9362  0.0  0.0 137344  7256 ?        Ssl  16:51   0:00 
> ./bin/redis-server *:6379
> sam       9547  0.0  0.0 137344  7380 ?        Ssl  16:52   0:00 
> ./bin/redis-server *:6381
> sam      10043  0.0  0.0 137344  7380 ?        Ssl  16:52   0:00 
> ./bin/redis-server *:6384
> sam      17293  0.0  0.0 103248   840 pts/0    S+   17:02   0:00 grep redis
> [sam@brooklyn-muyh-sam-margini-i1lw-redis-and-datafu-rxek-ac1 ~]$ sudo 
> service iptables status
> Table: filter
> Chain INPUT (policy ACCEPT)
> num  target     prot opt source               destination
> 1    ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:1099
> 2    ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp 
> dpt:31001
> 3    ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp 
> dpt:61616
> 4    ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:6379
> 5    ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:22
> 6    ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0           state 
> RELATED,ESTABLISHED
> 7    ACCEPT     icmp --  0.0.0.0/0            0.0.0.0/0
> 8    ACCEPT     all  --  0.0.0.0/0            0.0.0.0/0
> 9    ACCEPT     tcp  --  0.0.0.0/0            0.0.0.0/0           state NEW 
> tcp dpt:22
> 10   REJECT     all  --  0.0.0.0/0            0.0.0.0/0           reject-with 
> icmp-host-prohibited
> Chain FORWARD (policy ACCEPT)
> num  target     prot opt source               destination
> 1    REJECT     all  --  0.0.0.0/0            0.0.0.0/0           reject-with 
> icmp-host-prohibited
> Chain OUTPUT (policy ACCEPT)
> num  target     prot opt source               destination
> [sam@brooklyn-muyh-sam-margini-i1lw-redis-and-datafu-rxek-ac1 ~]$
> {code}
> I would expect six more entries of the form 'tcp dpt:6379' for ports 
> 6380-6385.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)

Reply via email to