Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Security GroupDescriptionPortsDetailsNotesTemp rule notes
CHF-Access-WebCHF internal web access80, 443IT has the See list of addresses, may need to be updated for California offices?internal addresses [[here]]Includes Offsite access addresses for Jonathan

Management-Access

worldwide ssh access22All machines MUST have this group to allow ssh access. Currently allows worldwide ssh access, we're using keys to lock things down.

Public-Access-Web

Public web access80, 443Open worldwide, to be applied to public web facing servers. App servers only.

Temp-Development

short term dev firewall rules??Please use this for short term access, rules in here may be cleared off

Temp-Production

short term production firewall rules??Please use this for short term access, rules in here may be cleared offWill be adding Cat and Sarah to Hydra for off-site access in case of Septa strike.
Roger Turner has his address (75.75.165.67) added for offsite access to Hydra.

Temp-Staging

short term staging firewall rules??Please use this for short term access, rules in here may be cleared offAndrew, for rebranding, has access.
internal-networking-productionAccess between production machines808080, 8983, 4436379, 80805432, 898319999All Samvera machines must be members of this group so they can communicate to share REST data, port 8080 is fedora and Fedora, 8983 is Solr.EFSAccess to Elastic File System??Not in use yet, will allow access to EFS connections, 6379 is Redis, 5432 is Postgres, 19999 is netdata for monitoring.Do not mix production and staging boxes, this divide avoids security group rule tests from impacting production. The only box on both is monitor to watch both groups.
internal-networking-stagingAccess between staging machines8080, 8983, 6379, 5432, 19999All Samvera machines must be members of this group so they can communicate to share REST data, port 8080 is Fedora, 8983 is Solr, 6379 is Redis, 5432 is Postgres, 19999 is netdata for monitoring.Do not mix production and staging boxes, this divide avoids security group rule tests from impacting production. The only box on both is monitor to watch both groups.


When a machine has multiple security groups, as long as any one of the groups allows access the connection will work through the firewall. Anything not covered will be rejected however.