How to auto-generate security group for the connection relationship

When two Bash components are in a connection relationship, the orchestration engine can auto-generate a security group to enable the traffic between them. For the auto generation of security groups, users specify the port property.

  • On the component Bash_1, specify the port 8080.
  • On the component Bash_2, specify the port 27017.

Fig. Specify the port property for auto-generated security group

Expected result:

  • Because Compute_1 is a public compute node, a security group is generated for the Compute_1, which allows the traffic from the public network (i.e., allow the TCP protocol from the remote host on port 8080).
  • Because Bash_1 connects to Bash_2 internally, a security group is generated for the Compute_2, which allows the private traffic from the Compute_1 (i.e., allow the TCP protocol from the remote security group of Compute_1 on port 27017).
  • The Open Telekom Cloud console also shows the auto-generated security groups attached to the ports of the two compute nodes. The figure below shows an example that the security group is auto-generated for the Compute_2 accordingly.

Fig. Example of auto-generated security group on the OTC console