UiPath Documentation
automation-suite
2.2510
true
UiPath logo, featuring letters U and I in white

Automation Suite on Linux installation guide

Last updated Mar 26, 2026

Step 10: Configuring the node ports

Note:

Changes to IP tables are not recommended or supported.

Make sure to enable the following ports on your firewall for each source:

PortProtocolSourcePurposeRequirements
22TCPJump Server / client machineFor SSH (installation, cluster management debugging)Do not open this port to the internet. Allow access to the client machine or jump server.
443TCPAll nodes in a cluster and the load balancerFor HTTPS (accessing Automation Suite)This port must have inbound and outbound connectivity from all the nodes in the cluster and the load balancer.
2379TCPAll nodes in a clusteretcd client portDo not open this port to the internet. Access between nodes must be ensured over a private IP address.
2380TCPAll nodes in a clusteretcd peer portDo not open this port to the internet. Access between nodes must be ensured over a private IP address.
6443TCPAll nodes in a clusterFor accessing Kube API using HTTPS, and required for node joiningThis port must have inbound and outbound connectivity from all the nodes in the cluster.
8472UDPAll nodes in a clusterRequired for Cilium.Do not open this port to the internet. Access between nodes must be ensured over a private IP address.
9090TCPAll nodes in the clusterUsed by Cilium for monitoring and handling pod crashesThis port must have inbound and outbound connectivity from all the nodes in the cluster.
9345TCPAll nodes in a cluster and the load balancerFor accessing Kube API using HTTPS, required for node joiningThis port must have inbound and outbound connectivity from all nodes in the cluster and the load balancer.
10250TCPAll nodes in a clusterkubelet / metrics serverDo not open this port to the internet. Access between nodes must be ensured over a private IP address.
30071TCPAll nodes in a clusterNodePort port for internal communication between nodes in a clusterDo not open this port to the internet. Access between nodes must be ensured over a private IP address.

The following additional ports are required in offline installations:

PortProtocolSourcePurposeRequirements
80TCPAll nodes in the clusterRequired for sending system email notificationsDo not open this port to the internet. Access between nodes and the SMTP server must be ensured over a private IP address.
587TCPAll nodes in the clusterRequired for sending system email notificationsDo not open this port to the internet. Access between nodes and the SMTP server must be ensured over a private IP address.
300701TCPThe machine on which you plan to trigger the installation or upgrade.For accessing the temporary registry during installation and upgrade using HTTP.Traffic on this port must be forwarded to the Temporary Registry Pool.

1 If an external registry is not available in the offline installation, open port 30070 on the machine on which you plan to trigger the installation or upgrade.

Important:

Exposing port 6443 outside the cluster boundary is mandatory if there is a direct connection to the Kerberos API.

Port 9345 is used by nodes to discover existing nodes and join the cluster in the multi-node deployment. To keep the high availability discovery mechanisms running, we recommend exposing it via the load balancer with health check.

Additionally, make sure you have connectivity from all nodes to the SQL server. Do not expose the SQL server on one of the Istio reserved ports, as it may lead to connection failures.

If you have a firewall set up in the network, make sure that it has these ports open and allows traffic according to the aforementioned requirements.

Was this page helpful?

Connect

Need help? Support

Want to learn? UiPath Academy

Have questions? UiPath Forum

Stay updated