Skip to main content

Trident ports

Contributors netapp-aruldeepa juliantap joan-ing netapp-rlithman

Learn more about the ports that Trident uses for communication.

Overview

Trident uses various ports for communication inside Kubernetes clusters and with storage backends. The following is a summary of key ports, their purposes, and security considerations.

  • Outbound focus: Kubernetes nodes (controller and worker) primarily initiate traffic to storage LIFs/IPs, so iptables rules should allow outbound from node IPs to specific storage IPs on these ports. Avoid broad "any-to-any" rules.

  • Inbound restrictions: Limit internal Trident ports to cluster-internal traffic (for example, using CNI like Calico). No unnecessary inbound exposure on host firewalls.

  • Protocol security:

    • Use TCP where possible (more reliable).

    • Enable CHAP/IPsec for iSCSI if sensitive; TLS/HTTPS for management (port 443/8443).

    • For NFSv4 (default in Trident), prune UDP/older NFSv3 ports (for example, 4045-4049) if not needed.

    • Restrict to trusted subnets; monitor with tools like Prometheus (optional port 8001).

Ports for controller nodes

These ports are primarily for Trident operator (backend management). All internal ports are pod-level; allow on nodes only if host firewall interferes with CNI.

Port/Protocol Direction Purpose Driver/Protocol Security Notes

TCP 8000

Inbound/Outbound (cluster-internal)

Trident REST server (operator-controller comms)

All

Restrict to pod CIDRs; no external exposure.

TCP 8443

Inbound/Outbound (cluster-internal)

Backchannel HTTPS (secure internal API)

All

TLS-encrypted; limit to Kubernetes service mesh if used.

TCP 8001

Inbound (cluster-internal, optional)

Prometheus metrics

All

Expose only to monitoring tools (for example, using RBAC); disable if unused.

TCP 443

Outbound

HTTPS to ONTAP SVM/cluster mgmt LIF

ONTAP (all), ANF

Require TLS cert validation; restrict to mgmt LIF IPs only.

TCP 8443

Outbound

HTTPS to E-Series Web Services Proxy

E-Series (iSCSI)

Default REST API; use certs; configurable in backend YAML.

Ports for worker nodes

These ports are for CSI node daemonsets and pod mounts. Data ports are outbound to storage data LIFs; include NFSv3 extras if using NFSv3 (optional for NFSv4).

Port/Protocol Direction Purpose Driver/Protocol Security Notes

TCP 17546

Inbound (local to pod)

CSI node liveness/readiness probes

All

Configurable (--probe-port); ensure no host conflicts; local-only.

TCP 8000

Inbound/Outbound (cluster-internal)

Trident REST server

All

As above; pod-internal.

TCP 8443

Inbound/Outbound (cluster-internal)

Backchannel HTTPS

All

As above.

TCP 8001

Inbound (cluster-internal, optional)

Prometheus metrics

All

As above.

TCP 443

Outbound

HTTPS to ONTAP SVM/cluster mgmt LIF

ONTAP (all), ANF

As above; used for discovery.

TCP 8443

Outbound

HTTPS to E-Series Web Services Proxy

E-Series (iSCSI)

As above.

TCP/UDP 111

Outbound

RPCBIND/portmapper

ONTAP-NAS (NFSv3/v4), ANF (NFS)

Required for v3; optional for v4 (firewall offload); restrict if using NFSv4-only.

TCP/UDP 2049

Outbound

NFS daemon

ONTAP-NAS (NFSv3/v4), ANF (NFS)

Core data; well-known; use TCP for reliability.

TCP/UDP 635

Outbound

Mount daemon

ONTAP-NAS (NFSv3/v4), ANF (NFS)

Mounting; bidirectional callbacks possible (allow inbound ephemeral if needed).

UDP 4045

Outbound

NFS lock manager (nlockmgr)

ONTAP-NAS (NFSv3)

File locking; skip for v4 (pNFS handles); UDP-only.

UDP 4046

Outbound

NFS status monitor (statd)

ONTAP-NAS (NFSv3)

Notifications; may need inbound ephemeral ports (1024-65535) for callbacks.

UDP 4049

Outbound

NFS quota daemon (rquotad)

ONTAP-NAS (NFSv3)

Quotas; skip for v4.

TCP 3260

Outbound

iSCSI target (discovery/data/CHAP)

ONTAP-SAN (iSCSI), E-Series (iSCSI)

Well-known; CHAP auth over this port; enable mutual CHAP for security.

TCP 445

Outbound

SMB/CIFS

ONTAP-NAS (SMB), ANF (SMB)

Well-known; use SMB3 with encryption (Trident annotation netapp.io/smb-encryption=true).

TCP/UDP 88 (optional)

Outbound

Kerberos auth

ONTAP (NFS/SMB/iSCSI with Kerb)

If using Kerberos (not default); to AD servers, not storage.

TCP/UDP 389 (optional)

Outbound

LDAP

ONTAP (NFS/SMB with LDAP)

Similar; for name resolution/auth; restrict to AD.

Note The liveness/readiness probe port can be changed during installation using the --probe-port flag. It is important to make sure this port isn't being used by another process on the worker nodes.