Skip to main content

Firewall configuration

In order for the SSM agent and optionally the Fleet Control Installer tool to be able to work properly on the target machines, outbound connections to HTTPS endpoints listed in the following section on port 443 should be allowed by the firewall. If those connections can not be made directly due to security restrictions applied on the machine the appropriate proxy settings should be applied.

Endpoints to be allowed

info

Some endpoints contain <placeholders> described in the section below.

EndpointDescription
fleet-control-prod-host-installer-cli.s3.eu-west-1.amazonaws.comHost Installer CLI
fleet-control-prod-uk-host-installer-cli.s3.eu-west-2.amazonaws.comHost Installer CLI for UK FleetControl instance
fleet-control-prod-us-host-installer-cli.s3.us-east-2.amazonaws.comHost Installer CLI for US FleetControl instance
api.fleetcontrol.nordcloudapp.comFleet Control API
api.fleetcontrol.uk.nordcloudapp.comFleet Control API for UK FleetControl instance
api.fleetcontrol.us.nordcloudapp.comFleet Control API for US FleetControl instance
ssm.<region>.amazonaws.comSSM agent operation
ec2messages.<region>.amazonaws.comSSM agent operation
ssmmessages.<region>.amazonaws.comSSM agent operation
ec2.<region>.amazonaws.comSSM agent operation
kms.<region>.amazonaws.comLogs encryption
s3.amazonaws.comSSM documents and logs storage
s3-<region>.amazonaws.comLogs storage
s3.<region>.amazonaws.comLogs storage
s3.dualstack.<region>.amazonaws.comLogs storage
<logs-bucket>.s3.<region>.amazonaws.comLogs storage
aws-ssm-<region>.s3.<region>.amazonaws.comSSM documents
aws-windows-downloads-<region>.s3.<region>.amazonaws.comSSM documents
amazon-ssm-<region>.s3.<region>.amazonaws.comSSM documents
amazon-ssm-packages-<region>.s3.<region>.amazonaws.comSSM documents
<region>-birdwatcher-prod.s3.<region>.amazonaws.comSSM documents
patch-baseline-snapshot-<region>.s3.<region>.amazonaws.comSSM documents
nordcloud-fleetcontrol-patch-baseline-prod.s3.eu-west-1.amazonaws.comSSM documents
nordcloud-fleetcontrol-patch-baseline-prod-uk.s3.eu-west-2.amazonaws.comSSM documents for UK FleetControl instance
nordcloud-fleetcontrol-patch-baseline-prod-us.s3.us-east-2.amazonaws.comSSM documents for US FleetControl instance

How to fill in the placeholders

<region>

Endpoints with the <region> placeholder must be replaced with AWS region codes for every region where the SSM agent will operate. This means that a single endpoint entry from the table above should be replaced with multiple entries, one for each region. List of regions to be considered must also include a region where EC2 instances are located.

In which regions the SSM agent operates?

List of those region can be found under customerSettings field in our API. Execute the following GraphQL query to get them:

query getAllCustomerSettings {
customers {
id
name
customerSettings {
regions
}
}
}

Find the customer you are interested in and look for the regions field in the returned JSON.


<logs-bucket>

Endpoints with the <logs-bucket> placeholder must be replaced with the name of the S3 bucket where the SSM agent will store logs.

How to get the logs bucket name?

For now, the only way to get the bucket name is by extracting it from the AWS template generated by our API for the onboarding process. Execute the following GraphQL query to get the template:

query getAwsOnboardingTemplate {
awsOnboardingTemplate
}

In the returned YAML template look for the section that look like this:

# ...
# Access to S3 bucket used for logs storage
- Effect: Allow
Action:
- "s3:PutObject"
# ...
Resource:
- "arn:aws:s3:::fleet-control-resources-logsbucket-1q9hi4x7j9s4h8"
# ...

In this example the bucket name you are looking for is fleet-control-resources-logsbucket-1q9hi4x7j9s4h8.