æ¦è¦
ãå½ã¨ã³ããªã¼ã§ã¯ãNutanix Clusters on AWS (以å¾NCA) æ§ç¯æã«èªåçã«ä½æ&ã¢ã¿ãããããã»ãã¥ãªãã£ã°ã«ã¼ã(以å¾SG)ã®ããã©ã«ãè¨å®ã«ã¤ãã¦è©³ç´°ã«ã¤ãã¦AWSã¤ã³ãã©ç®¡çè è¦ç¹ã§ç¢ºèªãã¦ããã¾ãã
- æ¦è¦
- NCAã®éä¿¡å¶å¾¡ã¯ã©ãããã¹ãã
- NCAã®ã»ãã¥ãªãã£ã°ã«ã¼ãä¸è¦§
- NCAæ§ç¯æã«ä½æãããSGã®ã«ã¼ã«ä¸è¦§
- ãã£ããã¤ã¡ã¼ã¸
- 1. SG: Internal Management (sg-06177da99a42251aa)
- 2. SG: User Management (sg-0d435f750d4503cd8)
- 3. SG: UVM (sg-0c74189b464692708)
- ã¾ã¨ã
- é¢é£ã¨ã³ããªã¼
NCAã®éä¿¡å¶å¾¡ã¯ã©ãããã¹ãã
ãNCAã®ããã«AWSã¤ã³ãã©ä¸ã«Nutanix Clusterãæ§ç¯ãããç°å¢ã®å ´åã¯ã AWSã¬ã¤ã¤ã¼ã§ãNutanixã¬ã¤ã¤ã¼ã§ãä¼¼ããããªéä¿¡å¶å¾¡ã®æ©è½ãæã¤
å½¢ã¨ãªãçºãã©ã®ããã«å®æ½ãã¹ããã«ã¤ãã¦ã¯æ©ã¾ããã¨ãããããã¨æãã¾ãã®ã§ç¢ºèªãã¤ã¤èãã¦ããã¾ãã
以ä¸ããã¥ã¢ã«ã§NCAã®UVMã®ãããã¯ã¼ã¯ã»ãã¥ãªãã£ã«é¢ããè¨åã確èªåºæ¥ã¾ãã
Network security for UVM networks is managed by the cluster itself (networking service). This security covers all UVM traffic that is either entering the cluster or entering a subnet. All traffic between UVMs on the same subnet is allowed. You can achieve more granular network security by using the Flow product. See the Flow Microsegmentation Guide for more information.
AWSã¤ã³ãã©è¦ç¹ã ã¨ä»¥ä¸ã®éã解éã§ãã¾ãã
UVMãããã¯ã¼ã¯ã®ãããã¯ã¼ã¯ã»ãã¥ãªãã£ã¯ãã¯ã©ã¹ã¿ã¼èªä½ï¼ãããã¯ã¼ã¯ãµã¼ãã¹ï¼ã«ãã£ã¦ç®¡çãããããã®ã»ãã¥ãªãã£ã¯ãã¯ã©ã¹ã¿ã«å ¥ãã¾ãã¯ãµããããã«å ¥ããã¹ã¦ã®UVMãã©ãã£ãã¯ãã«ãã¼ãã
- -> NCAããã³å é¨ã®UVMã¯ãæ§ç¯æã«èªåä½æãããSGã®ãããã¯ã¼ã¯å¶å¾¡ãé©ç¨ããã¦ãã
UVMç¨ãµããããä¸ã®UVMéã®ãã¹ã¦ã®ãã©ãã£ãã¯ã許å¯ããã
- -> UVMãµããããå ã®éä¿¡ã¯å ¨ã¦ã®ãã©ãã£ãã¯ã許å¯ããã¦ãã
Flow製åã使ç¨ããã¨ãããããç´°ãããããã¯ã¼ã¯ã»ãã¥ãªãã£ãå®ç¾ã§ãã
- -> ç´°ãããã©ãã£ãã¯å¶å¾¡ãå®ç¾ãããå ´åã¯ãNutanixã® Flowã¨ãã製åãå©ç¨ãã¦å¶å¾¡ãå®æ½ãã¹ãã§ãã (1ã¤ã®ENIã®ã»ã«ã³ããªIPã¢ãã¬ã¹ã¨ãã¦UVMãé¢é£ä»ããããä»æ§ã®çºãSGã§ã¯UVMåä½ã®ç´°ããå¶å¾¡ã¯ä¸å¯)
ã¾ããèªåä½æãããSGã®ã«ã¼ã«ã«é¢ãã¦ä»¥ä¸è¨åãããã¾ãã
If you want to modify these default rules, you must modify the user security group for management from the AWS console or APIs directly.
ç·¨éãããªã¨ãã訳ã§ã¯ãªãããããå¤æ´ãå¿ è¦ãªå ´åã¯AWSå´ã®ãªãã¬ã¼ã·ã§ã³ã§å®æ½ãã¦ãã ããããã¨ãã£ãå 容ã§ãã
çµè«
å¾ã£ã¦ããã£ããNCAã®éä¿¡å¶å¾¡ã®ååã¨ãã¦ã¯ä»¥ä¸2ç¹ãæèããã®ãè¯ãããã§ãã
- UVMéã®éä¿¡ã¯ããã©ã«ãã§å ¨ã¦è¨±å¯ããã¦ãããããå¶å¾¡ãããå ´åã¯AWSã®æ©è½(SGããNACL)ã§ã¯ãªããNutanixã®æ©è½(Flow)ãå©ç¨ãã
- NutanixããNCAã®çºã«èªåä½æãããSGã«ã¤ãã¦ã¯ãå¿ è¦ãªå ´åã®ã¿AWSå´ã®ãªãã¬ã¼ã·ã§ã³ã§å¤æ´ãã
ç¶ãã¦ãNCAã稼åããããã«Nutanixå´ããèªåä½æãããSGã®è©³ç´°ãè¦ã¦ããã¾ãã
NCAã®ã»ãã¥ãªãã£ã°ã«ã¼ãä¸è¦§
ãNCAæ§ç¯å¾ã¯ä»¥ä¸ã®ãããªã«3ã¤ã®ç¨éã§ä½æããã¾ãã
(å³å¯ã«ã¯4ã¤ã§ããdefaultã¯Nutanixã®äºç´ENIç¨éã®ç©ã便å®ä¸å©ç¨ãã¦ããã ããªã®ã§ä»åã¯çç¥)
No | å称 | ãªãã£ã·ã£ã«ã®ç¨é説æ |
---|---|---|
1 | Internal Management | ã¯ã©ã¹ã¿ã¼å ã®AHVã¨CVMéã®ãã¹ã¦ã®éä¿¡ãè¨±å¯ |
2 | User Management | UVMããCVMã¸ã®éä¿¡ã«ç¹å®ã®ãã¼ããè¨±å¯ |
3 | UVM | User VMéã®éä¿¡ãå¯è½ã¨ãã |
SG IDãã許å¯ããè¨å®ãããçºãIDãæè¨ã¨ãã¾ãã
[cloudshell-user@ip-10-0-121-89 tmp]$ echo "VpcId^GroupName^GroupId^Description" > /tmp/awscli.tmp;\ > aws ec2 describe-security-groups --query "SecurityGroups[].[VpcId,GroupName,GroupId,Description]" --output text | tr "\t" "^" >> /tmp/awscli.tmp ;\ > column -s^ -t /tmp/awscli.tmp;\ > rm /tmp/awscli.tmp VpcId GroupName GroupId Description vpc-06d2c707a03ca8651 default sg-04f38705e55fdba86 default VPC security group vpc-06d2c707a03ca8651 Nutanix Cluster CC229F2B7E01 Internal Management sg-06177da99a42251aa Internal management security group vpc-06d2c707a03ca8651 Nutanix Cluster CC229F2B7E01 UVM sg-0c74189b464692708 UVM security group vpc-06d2c707a03ca8651 Nutanix Cluster CC229F2B7E01 User Management sg-0d435f750d4503cd8 Security group for management interfaces [cloudshell-user@ip-10-0-121-89 tmp]$
NCAæ§ç¯æã«ä½æãããSGã®ã«ã¼ã«ä¸è¦§
ãä»åã¯ä»¥ä¸ã³ãã³ãã§å¿ è¦æå°éã®ã«ã©ã ã ããè¦ã¦ããã¾ãã
å©ç¨ã³ãã³ã(AWS CLI)
echo "GroupId^IpProtocol^FromPort^ToPort^CidrIpv4^SourceGroupId^Description" > /tmp/awscli.tmp ;\ aws ec2 describe-security-group-rules \ --query "SecurityGroupRules[].\ [GroupId,\ IpProtocol,\ FromPort,\ ToPort,\ CidrIpv4,\ ReferencedGroupInfo.GroupId,\ Description]" \ --output text | tr "\t" "^" >> /tmp/awscli.tmp ;\ column -s^ -t /tmp/awscli.tmp ;\ rm /tmp/awscli.tmp
çµæ
以ä¸ã®æ¡ä»¶ã§æ§ç¯ããNCAã§èªåçã«ä½æãããã»ãã¥ãªãã£ã°ã«ã¼ãã®ã«ã¼ã«ä¸è¦§ã¯ä»¥ä¸ã®ããã«ãªãã¾ããã
- Public ãã Prismã¸ã®ã¢ã¯ã»ã¹ã許å¯
- NCAã§ã® Management Serviceèµ·åãæå¹åã㤠10.0.0.0/22 ããã®ã¿æ¥ç¶ã許å¯
GroupId IsEgress IpProtocol FromPort ToPort CidrIpv4 SourceGroupId Description sg-0c74189b464692708 False tcp 9440 9440 None sg-0d435f750d4503cd8 RESP API calls and Prism access sg-0d435f750d4503cd8 False tcp 2020 2020 10.0.0.0/22 None Disaster Recovery sg-0c74189b464692708 False tcp 2027 2027 None sg-0d435f750d4503cd8 CVM to FSVM management sg-0c74189b464692708 True -1 -1 -1 0.0.0.0/0 None None sg-0d435f750d4503cd8 False tcp 3205 3205 10.0.0.0/22 None Stargate iscsi access for Files sg-04f38705e55fdba86 False -1 -1 -1 None sg-04f38705e55fdba86 None sg-06177da99a42251aa False -1 -1 -1 None sg-06177da99a42251aa Allow hosts and CVMs to communicate sg-0d435f750d4503cd8 False tcp 3205 3205 None sg-0c74189b464692708 Stargate iscsi access for Files sg-0d435f750d4503cd8 False tcp 111 111 10.0.0.0/22 None Nutanix Move appliance sg-0c74189b464692708 False tcp 22 22 None sg-0d435f750d4503cd8 SSH from CVM/PE to UVMs sg-0d435f750d4503cd8 False tcp 3260 3260 10.0.0.0/22 None Stargate iscsi access for Files sg-0c74189b464692708 False icmp 0 0 None sg-0d435f750d4503cd8 eco reply (to ping) sg-0d435f750d4503cd8 False tcp 22 22 10.0.0.0/22 None SSH to both CVM and Hypervisor sg-0d435f750d4503cd8 False tcp 8443 8443 None sg-0c74189b464692708 Cluster remote support sg-0d435f750d4503cd8 False tcp 2073 2073 None sg-0c74189b464692708 NGT tools sg-0c74189b464692708 False icmp 8 0 None sg-0d435f750d4503cd8 eco request sg-0c74189b464692708 False tcp 2100 2100 None sg-0d435f750d4503cd8 Cluster configuration sg-0d435f750d4503cd8 False udp 111 111 None sg-0c74189b464692708 Nutanix Move appliance sg-0d435f750d4503cd8 False udp 2049 2049 None sg-0c74189b464692708 Nutanix Move appliance sg-0c74189b464692708 False tcp 3000 3000 None sg-0d435f750d4503cd8 Analytics clients Analytics UI sg-0d435f750d4503cd8 False tcp 2020 2020 None sg-0c74189b464692708 Disaster Recovery sg-0d435f750d4503cd8 False tcp 2090 2090 None sg-0c74189b464692708 Ergon access sg-0d435f750d4503cd8 False icmp 0 0 None sg-0c74189b464692708 eco reply (to ping) sg-0d435f750d4503cd8 False udp 123 123 None sg-0c74189b464692708 NTP Service sg-0d435f750d4503cd8 False udp 111 111 10.0.0.0/22 None Nutanix Move appliance sg-04f38705e55fdba86 True -1 -1 -1 0.0.0.0/0 None None sg-0c74189b464692708 False tcp 7502 7502 None sg-0d435f750d4503cd8 Access services running on Files sg-0d435f750d4503cd8 False tcp 2009 2009 None sg-0c74189b464692708 Disaster Recovery sg-0d435f750d4503cd8 False tcp 9440 9440 None sg-0c74189b464692708 Prism web console, Citrix MCS sg-0d435f750d4503cd8 False tcp 2036 2036 None sg-0c74189b464692708 Anduril access sg-0c74189b464692708 False tcp 443 443 None sg-0d435f750d4503cd8 Analytics clients Gateway API access sg-0d435f750d4503cd8 False tcp 2049 2049 None sg-0c74189b464692708 Nutanix Move appliance sg-0c74189b464692708 False udp 123 123 None sg-0d435f750d4503cd8 NTP Service sg-0d435f750d4503cd8 False tcp 80 80 10.0.0.0/22 None Cluster remote support sg-0d435f750d4503cd8 False tcp 8443 8443 10.0.0.0/22 None Cluster remote support sg-06177da99a42251aa True -1 -1 -1 0.0.0.0/0 None None sg-0d435f750d4503cd8 False tcp 7501 7501 None sg-0c74189b464692708 AFS services on CVM access for Files sg-0c74189b464692708 False tcp 7501 7501 None sg-0d435f750d4503cd8 Access services running on Files sg-0d435f750d4503cd8 False tcp 2009 2009 10.0.0.0/22 None Disaster Recovery sg-0d435f750d4503cd8 False tcp 5000 5000 None sg-0c74189b464692708 NTG user VM sg-0d435f750d4503cd8 False tcp 111 111 None sg-0c74189b464692708 Nutanix Move appliance sg-0d435f750d4503cd8 False tcp 9440 9440 10.0.3.207/32 None Prism access for Load balancer nodes sg-0d435f750d4503cd8 False tcp 3260 3260 None sg-0c74189b464692708 Stargate iscsi access for Files sg-0d435f750d4503cd8 False tcp 2030 2030 None sg-0c74189b464692708 Acropolis access sg-0d435f750d4503cd8 False udp 2049 2049 10.0.0.0/22 None Nutanix Move appliance sg-0d435f750d4503cd8 False icmp 8 0 None sg-0c74189b464692708 eco request sg-0c74189b464692708 False -1 -1 -1 None sg-0c74189b464692708 Allow UVMs to communicate sg-0c74189b464692708 False tcp 29092 29092 None sg-0d435f750d4503cd8 FSVM internal IPs Kafka broker access sg-0d435f750d4503cd8 False tcp 22 22 None sg-0c74189b464692708 SSH to both CVM and Hypervisor sg-0c74189b464692708 False tcp 7 7 None sg-0d435f750d4503cd8 TCP echo request from CVM/PE to UVMs sg-0c74189b464692708 False tcp 2090 2090 None sg-0d435f750d4503cd8 CVM to file server management and task status sg-0d435f750d4503cd8 False tcp 2074 2074 None sg-0c74189b464692708 NGT tools sg-0d435f750d4503cd8 False udp 123 123 10.0.0.0/22 None NTP Service sg-0d435f750d4503cd8 False tcp 2049 2049 10.0.0.0/22 None Nutanix Move appliance sg-0d435f750d4503cd8 True -1 -1 -1 0.0.0.0/0 None None sg-0d435f750d4503cd8 False tcp 7501 7501 10.0.0.0/22 None AFS services on CVM access for Files sg-0d435f750d4503cd8 False tcp 80 80 None sg-0c74189b464692708 Cluster remote support
â» IsEgress ã Trueã®å 容ãã¢ã¦ããã¦ã³ãå¶å¾¡ã¨ãªãã¾ããã以ä¸ã®éãä»åã¯ãã¹ã¦ããã©ã«ãã®ã¢ã¦ããã¦ã³ãå¶å¾¡ãå®æ½ããªã(ALL許å¯)è¨å®ã¨ãªã£ã¦ãã¾ããã®ã§ä»¥å¾ã®ç¢ºèªããã¯å²æãã¾ãã
GroupId IsEgress IpProtocol FromPort ToPort CidrIpv4 SourceGroupId Description sg-0c74189b464692708 True -1 -1 -1 0.0.0.0/0 None None sg-04f38705e55fdba86 True -1 -1 -1 0.0.0.0/0 None None sg-06177da99a42251aa True -1 -1 -1 0.0.0.0/0 None None sg-0d435f750d4503cd8 True -1 -1 -1 0.0.0.0/0 None None
ãã£ããã¤ã¡ã¼ã¸
ãNCAã¯EC2ãã¢ã¡ã¿ã«ã¤ã³ã¹ã¿ã³ã¹ãå©ç¨ããAWSã¤ã³ãã©è¦ç¹ã§å°ãç¹æ®ãªç°å¢ãªã®ã§å³ã§æ´çãã¦ã¿ã¾ãã
åSGã®Fromåä½ã§ãã£ããä½ã許å¯ãã¦ãããã«ã¤ãã¦åãã¦èã詳細ãè¦ã¦ããã¾ãã
ã³ãã©ã®å³ã®ãããã¯ã¼ã¯ãªã½ã¼ã¹ã«é¢ãã詳細ã¯ä»¥ä¸blogãåç §ãã¦ãã ãã
1. SG: Internal Management (sg-06177da99a42251aa)
ãç¨éã«é¢ãããªãã£ã·ã£ã«ã®è¨è¼ã¯ä»¥ä¸ã§ã
internal_management: Allows all communication between AHV and CVM within a cluster
ã¯ã©ã¹ã¿ã¼å ã®AHV(Acropolis Hypervisor) ã¨CVM(Controler VM)éã®ãã¹ã¦ã®éä¿¡ã許å¯ããã¨ãã£ãå 容ã§ãã
â SG: Internal Management (èªèº«)ããå ¨ã¦ã®ãã©ãã£ãã¯ã許å¯
ãã¢ã¡ã¿ã«ã¤ã³ã¹ã¿ã³ã¹ã®ENIã«ã¢ã¿ãããããSGã®ããããã®ENIãä»ãã¦å©ç¨ãããNutanixã®éä¿¡ãå ¨ã¦è¨±å¯ãã¦ããå 容ã¨ç解åºæ¥ã¾ãã
GroupId IsEgress IpProtocol FromPort ToPort CidrIpv4 SourceGroupId Description sg-06177da99a42251aa False -1 -1 -1 None sg-06177da99a42251aa Allow hosts and CVMs to communicate
2. SG: User Management (sg-0d435f750d4503cd8)
ãç¨éã«é¢ãããªãã£ã·ã£ã«ã®è¨è¼ã¯ä»¥ä¸ã§ã
user_management: Allows specific ports for UVM to CVM communication
UVMããCVMã¸ã®éä¿¡ã«ç¹å®ã®ãã¼ãã許å¯ãããã®ã¨ããã¾ã
â¡ SG:UVM ããNutanixç¬èªéä¿¡ã許å¯
SG: UVMç¨ãªã®ã§ UVMã¨ãã¦èµ·åãã¦ãããã·ã³ -> EC2ãã¢ã¡ã¿ã«ã¤ã³ã¹ã¿ã³ã¹ã®ä¸ã§ç¨¼åããNCAã®æ¹åã§å¿ è¦ãªä»¥ä¸éä¿¡ã許å¯ããã¦ãã¾ãã
ä¸è¬çãªãããã³ã«ã¯ICMPã¨NTPãããã§ãä»ã¯Nutanixç¬èªã®ãã¼ãã¨ãªã£ã¦ãã¾ãã
GroupId IsEgress IpProtocol FromPort ToPort CidrIpv4 SourceGroupId Description sg-0d435f750d4503cd8 False tcp 3205 3205 None sg-0c74189b464692708 Stargate iscsi access for Files sg-0d435f750d4503cd8 False tcp 8443 8443 None sg-0c74189b464692708 Cluster remote support sg-0d435f750d4503cd8 False tcp 2073 2073 None sg-0c74189b464692708 NGT tools sg-0d435f750d4503cd8 False udp 111 111 None sg-0c74189b464692708 Nutanix Move appliance sg-0d435f750d4503cd8 False udp 2049 2049 None sg-0c74189b464692708 Nutanix Move appliance sg-0d435f750d4503cd8 False tcp 2020 2020 None sg-0c74189b464692708 Disaster Recovery sg-0d435f750d4503cd8 False tcp 2090 2090 None sg-0c74189b464692708 Ergon access sg-0d435f750d4503cd8 False icmp 0 0 None sg-0c74189b464692708 eco reply (to ping) sg-0d435f750d4503cd8 False udp 123 123 None sg-0c74189b464692708 NTP Service sg-0d435f750d4503cd8 False tcp 2009 2009 None sg-0c74189b464692708 Disaster Recovery sg-0d435f750d4503cd8 False tcp 9440 9440 None sg-0c74189b464692708 Prism web console, Citrix MCS sg-0d435f750d4503cd8 False tcp 2036 2036 None sg-0c74189b464692708 Anduril access sg-0d435f750d4503cd8 False tcp 2049 2049 None sg-0c74189b464692708 Nutanix Move appliance sg-0d435f750d4503cd8 False tcp 7501 7501 None sg-0c74189b464692708 AFS services on CVM access for Files sg-0d435f750d4503cd8 False tcp 5000 5000 None sg-0c74189b464692708 NTG user VM sg-0d435f750d4503cd8 False tcp 111 111 None sg-0c74189b464692708 Nutanix Move appliance sg-0d435f750d4503cd8 False tcp 3260 3260 None sg-0c74189b464692708 Stargate iscsi access for Files sg-0d435f750d4503cd8 False tcp 2030 2030 None sg-0c74189b464692708 Acropolis access sg-0d435f750d4503cd8 False icmp 8 0 None sg-0c74189b464692708 eco request sg-0d435f750d4503cd8 False tcp 22 22 None sg-0c74189b464692708 SSH to both CVM and Hypervisor sg-0d435f750d4503cd8 False tcp 2074 2074 None sg-0c74189b464692708 NGT tools sg-0d435f750d4503cd8 False tcp 80 80 None sg-0c74189b464692708 Cluster remote support
⢠Core Nutanix Serviceã¸ã®éä¿¡è¨±å¯ (æå¹åããå ´åã®ã¿)
以ä¸ãMy Nutanixç»é¢ã®NCAæ§ç¯æã«æå®ããé ç®ã¨ãªãã¾ãã NCAå ã§Management Serviceã稼åããããå¦ããæå®åºæ¥ãé ç®ãããããã¡ãã®æå®å 容ã«ãã£ã¦SGã¸èªåçã«ã«ã¼ã«ã追å ããã¾ãã
Disableã§ããã°ä»¥ä¸è¨è¼ããã«ã¼ã«ã¯è¿½å ããããEnableã§ããã°æé»ã§Restrictedã¨ãªãæ¥ç¶åºæ¥ããããã¯ã¼ã¯CIDRã®æå®ãæ±ãããã¾ãã
VPCã®ãããã¯ã¼ã¯CIDRã®æå®ã¯å¿ é ã¨ãªããæ´ã«è¿½å ãããå ´åã¯ãã¡ãã«æå®ããäºã§VPCã®ãããã¯ã¼ã¯CIDRã¨ã¯å¥ã«ã«ã¼ã«ãèªåçã«ä½æããã¾ãã
GroupId IsEgress IpProtocol FromPort ToPort CidrIpv4 SourceGroupId Description sg-0d435f750d4503cd8 False tcp 2020 2020 10.0.0.0/22 None Disaster Recovery sg-0d435f750d4503cd8 False tcp 3205 3205 10.0.0.0/22 None Stargate iscsi access for Files sg-0d435f750d4503cd8 False tcp 111 111 10.0.0.0/22 None Nutanix Move appliance sg-0d435f750d4503cd8 False tcp 3260 3260 10.0.0.0/22 None Stargate iscsi access for Files sg-0d435f750d4503cd8 False tcp 22 22 10.0.0.0/22 None SSH to both CVM and Hypervisor sg-0d435f750d4503cd8 False udp 111 111 10.0.0.0/22 None Nutanix Move appliance sg-0d435f750d4503cd8 False tcp 80 80 10.0.0.0/22 None Cluster remote support sg-0d435f750d4503cd8 False tcp 8443 8443 10.0.0.0/22 None Cluster remote support sg-0d435f750d4503cd8 False tcp 2009 2009 10.0.0.0/22 None Disaster Recovery sg-0d435f750d4503cd8 False udp 2049 2049 10.0.0.0/22 None Nutanix Move appliance sg-0d435f750d4503cd8 False udp 123 123 10.0.0.0/22 None NTP Service sg-0d435f750d4503cd8 False tcp 2049 2049 10.0.0.0/22 None Nutanix Move appliance sg-0d435f750d4503cd8 False tcp 7501 7501 10.0.0.0/22 None AFS services on CVM access for Files
AWSã¤ã³ãã©è¦ç¹ã ã¨User Managementç¨ã®SGã¨Core Nutanix Serviceç¨ã®SGã¯å¥ç©ã¨ãã¦åããã¦ããæ¹ã å人çã«è¨è¨ã¨ãã¦ç¶ºéºãªããã«ãæããã®ã§ããä½ãNutanixå´ã§ä½ãäºæ ãããã®ããããã¾ããã
⣠Prismã¢ã¯ã»ã¹ç¨NLBããã®éä¿¡ã許å¯
ä»åã®ç°å¢ã§èªåä½æãããNLBã® Private IPã¢ãã¬ã¹ã 10.0.3.207/32
ã§ãã£ãçºããã®ããã«ã«ã¼ã«ã«åãè¾¼ã¾ãã¦ãã¾ãã
GroupId IsEgress IpProtocol FromPort ToPort CidrIpv4 SourceGroupId Description sg-0d435f750d4503cd8 False tcp 9440 9440 10.0.3.207/32 None Prism access for Load balancer nodes
ã¡ãªã¿ã«ãã©ã¦ã¶ããHTTPSç¸å½ã§å©ç¨ããPrismã¸ã®ã¢ã¯ã»ã¹ç¨ã®ãã¼ã㯠TCP: 9440
ãå©ç¨ãã¾ãã
NLBã¨ãé£åãã¦ããã®ã§Nutanixç¬èªãã¼ãã®ä¸ã§ãAWSã¤ã³ãã©æ å½ã¨ãã¦ææ¡ãã¦ãããããã¼ãçªå·ã«ãªãã¾ãã
3. SG: UVM (sg-0c74189b464692708)
ãç¨éã«é¢ãããªãã£ã·ã£ã«ã®è¨è¼ã¯ä»¥ä¸ã§ã
UVM: Allows communication between user VMs
UVMéã®éä¿¡ã許å¯ãããã®ã¨ããã¾ã
⤠SG: User Management ããUVMã«å¯¾ããé信許å¯
ãã¡ãã®SGãã¢ã¿ããããããEC2ãã¢ã¡ã¿ã«ã¤ã³ã¹ã¿ã³ã¹ã®ENIã¨ãªãã®ã§ãNCA->UVMã®æ¹åã§è¨±å¯ããã¦ããå 容ã以ä¸ã«ã¼ã«ã¨ãªãã¾ãã
GroupId IsEgress IpProtocol FromPort ToPort CidrIpv4 SourceGroupId Description sg-0c74189b464692708 False tcp 9440 9440 None sg-0d435f750d4503cd8 RESP API calls and Prism access sg-0c74189b464692708 False tcp 2027 2027 None sg-0d435f750d4503cd8 CVM to FSVM management sg-0c74189b464692708 False tcp 22 22 None sg-0d435f750d4503cd8 SSH from CVM/PE to UVMs sg-0c74189b464692708 False icmp 0 0 None sg-0d435f750d4503cd8 eco reply (to ping) sg-0c74189b464692708 False icmp 8 0 None sg-0d435f750d4503cd8 eco request sg-0c74189b464692708 False tcp 2100 2100 None sg-0d435f750d4503cd8 Cluster configuration sg-0c74189b464692708 False tcp 3000 3000 None sg-0d435f750d4503cd8 Analytics clients Analytics UI sg-0c74189b464692708 False tcp 7502 7502 None sg-0d435f750d4503cd8 Access services running on Files sg-0c74189b464692708 False tcp 443 443 None sg-0d435f750d4503cd8 Analytics clients Gateway API access sg-0c74189b464692708 False udp 123 123 None sg-0d435f750d4503cd8 NTP Service sg-0c74189b464692708 False tcp 7501 7501 None sg-0d435f750d4503cd8 Access services running on Files sg-0c74189b464692708 False tcp 29092 29092 None sg-0d435f750d4503cd8 FSVM internal IPs Kafka broker access sg-0c74189b464692708 False tcp 7 7 None sg-0d435f750d4503cd8 TCP echo request from CVM/PE to UVMs sg-0c74189b464692708 False tcp 2090 2090 None sg-0d435f750d4503cd8 CVM to file server management and task status
⥠SG:UVM (èªèº«) ããå ¨ã¦ã®ãã©ãã£ãã¯ã許å¯
ãã¡ãã®ã«ã¼ã«ãããäºã§ãUVMéãå ¨ã¦éä¿¡å¯è½ãªç¶æ ã¨ãªã£ã¦ãã¾ãã
ç°ãªãUVMãµããããããããã¯ã¼ã¯é¢é£ä»ãã¦æ¡å¼µããå ´åã§ãèªåä½æãããENIã«åãSGãã¢ã¿ãããããæ§æã¨ãªãçºãç°ãªãUVMãµããããéã§ãåæ§ã«éä¿¡ã¯å ¨ã¦è¨±å¯ããã¾ãã
GroupId IsEgress IpProtocol FromPort ToPort CidrIpv4 SourceGroupId Description sg-0c74189b464692708 False -1 -1 -1 None sg-0c74189b464692708 Allow UVMs to communicate
ã¾ã¨ã
ãNCAæ§ç¯æã«èªåä½æããã¢ã¿ãããããSGã®ããã©ã«ãã®ã«ã¼ã«ç¶æ ã«ã¤ãã¦ç¢ºèªãã¦ã¿ã¾ããã
NCAã¯ã1ã¤ã®ENIã§è¤æ°ã®å½¹å²ãæ ãæ§æã¨ãªã£ã¦ããäºãããããã«ã¢ã¿ãããããSGãå³ã¨ãã§æ´çãã¦ãããªãã¨ãããã©ãã«ã·ã¥ã¼ãã£ã³ã°ã®éã«æ··ä¹±ãã¦ãã¾ãå¯è½æ§ãããã®ã§åãã¦ãããããã®ã§ãã