Failsafe rules
To avoid completely cutting off a host via incorrect or malformed policy, Calico has a failsafe mechanism that keeps various pinholes open in the firewall.
By default, Calico keeps the following ports open on all host endpoints:
Port | Protocol | Direction | Purpose |
---|---|---|---|
22 | TCP | Inbound | SSH access |
53 | UDP | Outbound | DNS queries |
67 | UDP | Outbound | DHCP access |
68 | UDP | Inbound | DHCP access |
179 | TCP | Inbound & Outbound | BGP access (Calico networking) |
2379 | TCP | Inbound & Outbound | etcd access |
2380 | TCP | Inbound & Outbound | etcd access |
5473 | TCP | Inbound & Outbound | etcd access |
6443 | TCP | Inbound & Outbound | Kubernetes API server access |
6666 | TCP | Inbound & Outbound | etcd self-hosted service access |
6667 | TCP | Inbound & Outbound | etcd self-hosted service access |
The lists of failsafe ports can be configured via the configuration parameters
FailsafeInboundHostPorts
and FailsafeOutboundHostPorts
described in Configuring Felix
. They
can be disabled by setting each configuration value to "[]".
Removing the inbound failsafe rules can leave a host inaccessible.
Removing the outbound failsafe rules can leave Felix unable to connect to etcd.
Before disabling the failsafe rules, we recommend creating a policy to replace it with more-specific rules for your environment: see Creating policy for basic connectivity.