Connect to an Aerospike cluster deployed by Aerospike Kubernetes Operator (AKO) through Aerospike Admin (asadm) or through applications that use Aerospike client libraries.
Port Access
Configure the firewall rules for the Kubernetes cluster depending on the number of pods per Kubernetes host.
If the Aerospike cluster is deployed with a single pod per host (multiPodPerHost set to its default value ‘false’), make ports 3000 (service port) and 4333 (TLS port) on all hosts accessible to all clients and tools.
If the Aerospike cluster is deployed with multiple pods per host (multiPodPerHost set to ‘true’), make port range 30000–32767 on all hosts accessible to all clients and tools.
The Status > Pods section provides pod-wise access, alternate access, TLS access, and TLS alternate access endpoints as well as the TLS name (if TLS is configured) to be used to access the cluster.
When connecting from outside the Kubernetes cluster network, use the host external IP addresses.
By default, AKO configures access endpoints to use Kubernetes host internal IPs and alternate access endpoints to use host external IP addresses.
From the example status output, for pod aerocluster-0-0, the alternate access endpoint is 34.70.193.192:31312
With a Client
To use a client from outside the Kubernetes network using external IP addresses, set the following for the client policy using the appropriate client API.
host: 34.70.193.192
port: :31312
username: admin
password: admin123# based on the configured secret