Skip to main content
logoTetrate Istio Subscription PlusVersion: Latest

Firewall Information

If your environment has strict network policies that prevent any unauthorized communication between two namespaces, you may need to add one or more exceptions to your network policies to allow communication between the sidecars and the local Istio Control Plane, as well as between the local Istio Control Plane and the TIS+ management plane.

The following information can be used to derive the appropriate set of firewall rules.

Communication between TIS+, Control Plane and Workloads

Between Istio and TIS+

TIS+ Load Balancer port

TIS+ Load Balancer (also known as front-envoy) has default port 8443. This port value is user configurable. For example, it can be changed to 443. If the default port is changed, then all components that communicate via front-envoy need to be adjusted accordingly to match the user-defined value of the front-envoy port.

SourceDestination
xcp-edge.istio-systemTIS+ Load Balancer IP, port 9443
oap.istio-systemTIS+ Load Balancer IP, port 8443 or user defined front-envoy port
otel-collector.istio-systemTIS+ Load Balancer IP, port 8443 or user defined front-envoy port
oap.istio-systemElasticsearch target IP and port
(If using demo deployment of Elasticsearch or using front-envoy as Elasticsearch proxy, change to TIS+ Load Balancer IP, port 8443 or user defined front-envoy port)

Between Sidecars on k8s and TIS+ Control Plane

SourceDestination
Sidecars or load balancers in any application namespace or
shared load balancer in any namespace to access OAP metrics server.
oap.istio-system, port 11800
Sidecars or load balancers in any application namespace or
shared load balancer in any namespace to access OAP trace server.
oap.istio-system, port 9411

Between Sidecars on VMs and TIS+ Control Plane

SourceDestination
Sidecars on VMs to access Istio Pilot xDS server,
OAP metrics server, trace server
Without a VM Gateway (oap.istio-system) Load Balancer IP,
port 11800 or 9411

Between workloads in cluster A and workloads in cluster B

SourceDestination
k8s pods or VMs (cluster A)per-Service Gateway Load Balancer IP,
port 15443 (cluster B)
k8s pods or VMs (cluster B)per-Service Gateway Load Balancer IP,
port 15443 (cluster A)
Shared Load Balancers

If you are using a shared load balancer, then the load balancer envoy will need to be able to talk to all attached applications and their services. Since this information is not known in advance, we cannot provide definitive information on the ports to open in a firewall.

TIS+ components ports

Following are ports and protocols used by TIS+ components.

Cert manager

PortProtocolDescription
10250HTTPSWebhooks service port
6080HTTPHealth checks

Management plane

PortProtocolDescription
Management plane operator
tsb-operator-management-plane.tsb
8383HTTPPrometheus telemetry
443HTTPSWebhooks service port
9443HTTPSWebhook container port, forwarded from 443
TIS+ API server tsb.tsb
8000HTTPHTTP API
9080GRPCGRPC API
42422HTTPPrometheus telemetry
9082HTTPHealth checks
Open Telemetry otel-collector.tsb
9090HTTPPrometheus telemetry
9091HTTPCollector endpoint
13133HTTPHealth checks
TIS+ front-envoy envoy.tsb
8443HTTP/GRPCTSB HTTP and GRPC API port
9443TCPXCP port
IAM iamserver.tsb
8000HTTPHTTP API
9080GRPCGRPC API
42422HTTPPrometheus telemetry
9082HTTPHealth checks
MPC mpc.tsb
9080GRPCGRPC API
42422HTTPPrometheus telemetry
9082HTTPHealth checks
OAP oap.tsb
11800GRPCGRPC API
12800HTTPREST API
1234HTTPPrometheus telemetry
9411HTTPTrace query
9412HTTPTrace collect
TIS+ UI web.tsb
8080HTTPHTTP service port and health check
XCP operator central
xcp-operator-central.tsb
8383HTTPPrometheus telemetry
443HTTPSWebhooks service port
XCP central central.tsb
8090HTTPDebug interface
9080GRPCGRPC API
8080HTTPPrometheus telemetry
443HTTPSWebhooks service port
8443HTTPSWebhook container port, forwarded from 443

Control plane

PortProtocolDescription
Control plane operator
tsb-operator-control-plane.istio-system
8383HTTPPrometheus telemetry
443HTTPSWebhooks service port
9443HTTPSWebhook container port, forwarded from 443
Open Telemetry otel-collector.tsb
9090HTTPPrometheus telemetry
9091HTTPCollector endpoint
13133HTTPHealth checks
OAP oap.istio-system
11800GRPCGRPC API
12800HTTPREST API
1234HTTPPrometheus telemetry
15021HTTPEnvoy sidecar health check
15020HTTPEnvoy sidecar Merged Prometheus telemetry from Istio agent, Envoy, and application
9411HTTPTrace query
9412HTTPTrace collect
XCP operator central
xcp-operator-edge.istio-system
8383HTTPPrometheus telemetry
443HTTPSWebhooks service port
XCP central edge.istio-system
8090HTTPDebug interface
9080GRPCGRPC API
8080HTTPPrometheus telemetry
443HTTPSWebhooks service port
8443HTTPSWebhook container port, forwarded from 443

Sidecars

Refer to Ports used by Istio for list of ports and protocols used by Istio sidecar proxy (Envoy).