Skip to content

Commit 1a0586e

Browse files
committed
acrolinx edits
1 parent 34bc5fe commit 1a0586e

File tree

1 file changed

+15
-15
lines changed

1 file changed

+15
-15
lines changed

articles/openshift/howto-restrict-egress.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.date: 02/16/2023
99
---
1010
# Control egress traffic for your Azure Red Hat OpenShift (ARO) cluster
1111

12-
This article provides the necessary details that allow you to secure outbound traffic from your Azure Red Hat OpenShift cluster (ARO). With the release of the [Egress Lockdown Feature](./concepts-egress-lockdown.md), all of the required connections for a private cluster will be proxied through the service. There are additional destinations that you may want to allow to use features such as Operator Hub, or Red Hat telemetry. An [example](#private-aro-cluster-setup) will be provided at the end on how to configure these requirements with Azure Firewall. Keep in mind, you can apply this information to Azure Firewall or to any outbound restriction method or appliance.
12+
This article provides the necessary details that allow you to secure outbound traffic from your Azure Red Hat OpenShift cluster (ARO). With the release of the [Egress Lockdown Feature](./concepts-egress-lockdown.md), all of the required connections for a private cluster are proxied through the service. There are additional destinations that you may want to allow to use features such as Operator Hub, or Red Hat telemetry. An [example](#private-aro-cluster-setup) is be provided at the end showing how to configure these requirements with Azure Firewall. Keep in mind, you can apply this information to Azure Firewall or to any outbound restriction method or appliance.
1313

1414
## Before you begin
1515

@@ -19,19 +19,19 @@ This article assumes that you're creating a new cluster. If you need a basic ARO
1919

2020
This list is based on the list of FQDNs found in the OpenShift docs here: https://docs.openshift.com/container-platform/latest/installing/install_config/configuring-firewall.html
2121

22-
The following FQDNs are proxied through the service, and will not need additional firewall rules. They are here for informational purposes.
22+
The following FQDNs are proxied through the service, and won't need additional firewall rules. They're here for informational purposes.
2323

2424
| Destination FQDN | Port | Use |
2525
| ----------- | ----------- | ------------- |
26-
| **`arosvc.azurecr.io`** | **HTTPS:443** | Global Internal Private registry for ARO Operators. Required if you do not allow the service-endpoints Microsoft.ContainerRegistry on your subnets. |
27-
| **`arosvc.$REGION.data.azurecr.io`** | **HTTPS:443** | Regional Internal Private registry for ARO Operators. Required if you do not allow the service-endpoints Microsoft.ContainerRegistry on your subnets. |
28-
| **`management.azure.com`** | **HTTPS:443** | This is used by the cluster to access Azure APIs. |
29-
| **`login.microsoftonline.com`** | **HTTPS:443** | This is used by the cluster for authentication to Azure. |
30-
| **`*.monitor.core.windows.net`** | **HTTPS:443** | This is used for Microsoft Geneva Monitoring so that the ARO team can monitor the customer's cluster(s). |
31-
| **`*.monitoring.core.windows.net`** | **HTTPS:443** | This is used for Microsoft Geneva Monitoring so that the ARO team can monitor the customer's cluster(s). |
32-
| **`*.blob.core.windows.net`** | **HTTPS:443** | This is used for Microsoft Geneva Monitoring so that the ARO team can monitor the customer's cluster(s). |
33-
| **`*.servicebus.windows.net`** | **HTTPS:443** | This is used for Microsoft Geneva Monitoring so that the ARO team can monitor the customer's cluster(s). |
34-
| **`*.table.core.windows.net`** | **HTTPS:443** | This is used for Microsoft Geneva Monitoring so that the ARO team can monitor the customer's cluster(s). |
26+
| **`arosvc.azurecr.io`** | **HTTPS:443** | Global Internal Private registry for ARO Operators. Required if you don't allow the service-endpoints Microsoft.ContainerRegistry on your subnets. |
27+
| **`arosvc.$REGION.data.azurecr.io`** | **HTTPS:443** | Regional Internal Private registry for ARO Operators. Required if you don't allow the service-endpoints Microsoft.ContainerRegistry on your subnets. |
28+
| **`management.azure.com`** | **HTTPS:443** | Used by the cluster to access Azure APIs. |
29+
| **`login.microsoftonline.com`** | **HTTPS:443** | Used by the cluster for authentication to Azure. |
30+
| **`*.monitor.core.windows.net`** | **HTTPS:443** | Used for Microsoft Geneva Monitoring so that the ARO team can monitor the customer's cluster(s). |
31+
| **`*.monitoring.core.windows.net`** | **HTTPS:443** | Used for Microsoft Geneva Monitoring so that the ARO team can monitor the customer's cluster(s). |
32+
| **`*.blob.core.windows.net`** | **HTTPS:443** | Used for Microsoft Geneva Monitoring so that the ARO team can monitor the customer's cluster(s). |
33+
| **`*.servicebus.windows.net`** | **HTTPS:443** | Used for Microsoft Geneva Monitoring so that the ARO team can monitor the customer's cluster(s). |
34+
| **`*.table.core.windows.net`** | **HTTPS:443** | Used for Microsoft Geneva Monitoring so that the ARO team can monitor the customer's cluster(s). |
3535

3636
> [!NOTE]
3737
> For many customers exposing *.blob, *.table and other large address spaces creates a potential data exfiltration concern. You may want to consider using the [OpenShift Egress Firewall](https://docs.openshift.com/container-platform/latest/networking/openshift_sdn/configuring-egress-firewall.html) to protect applications deployed in the cluster from reaching these destinations and use Azure Private Link for specific application needs.
@@ -43,13 +43,13 @@ The following FQDNs are proxied through the service, and will not need additiona
4343
### ADDITIONAL CONTAINER IMAGES
4444

4545
- **`registry.redhat.io`**: Used to provide images for things such as Operator Hub.
46-
- **`*.quay.io`**: May be used to download images from the Red Hat managed Quay registry. Also a possible fall-back target for ARO required system images. If your firewall cannot use wildcards, you can find the [full list of subdomains in the Red Hat documentation.](https://docs.openshift.com/container-platform/latest/installing/install_config/configuring-firewall.html)
46+
- **`*.quay.io`**: May be used to download images from the Red Hat managed Quay registry. Also a possible fall-back target for ARO required system images. If your firewall can't use wildcards, you can find the [full list of subdomains in the Red Hat documentation.](https://docs.openshift.com/container-platform/latest/installing/install_config/configuring-firewall.html)
4747

4848
---
4949

5050
### TELEMETRY
5151

52-
All this section can be opted out, but before we know how, please check what it is: https://docs.openshift.com/container-platform/4.6/support/remote_health_monitoring/about-remote-health-monitoring.html
52+
You can opt out of telemetry, but make sure you understand this feature before doing so: https://docs.openshift.com/container-platform/4.6/support/remote_health_monitoring/about-remote-health-monitoring.html
5353
- **`cert-api.access.redhat.com`**: Used for Red Hat telemetry.
5454
- **`api.access.redhat.com`**: Used for Red Hat telemetry.
5555
- **`infogw.api.openshift.com`**: Used for Red Hat telemetry.
@@ -198,7 +198,7 @@ Keep the saved `pull-secret.txt` file somewhere safe - it will be used in each c
198198

199199
When running the `az aro create` command, you can reference your pull secret using the `--pull-secret @pull-secret.txt` parameter. Execute `az aro create` from the directory where you stored your `pull-secret.txt` file. Otherwise, replace `@pull-secret.txt` with `@<path-to-my-pull-secret-file`.
200200

201-
If you are copying your pull secret or referencing it in other scripts, your pull secret should be formatted as a valid JSON string.
201+
If you're copying your pull secret or referencing it in other scripts, format your pull secret as a valid JSON string.
202202

203203
```azurecli
204204
az aro create \
@@ -248,7 +248,7 @@ az network route-table route create -g $RESOURCEGROUP --name aro-udr --route-tab
248248
```
249249

250250
### Add Application Rules for Azure Firewall
251-
Example rule for telemetry to work. Additional possibilities can be found on this [list](https://docs.openshift.com/container-platform/4.3/installing/install_config/configuring-firewall.html#configuring-firewall_configuring-firewall):
251+
Example rule for telemetry to work. Additional possibilities are listed [here](https://docs.openshift.com/container-platform/4.3/installing/install_config/configuring-firewall.html#configuring-firewall_configuring-firewall):
252252
```azurecli
253253
az network firewall application-rule create -g $RESOURCEGROUP -f aro-private \
254254
--collection-name 'ARO' \

0 commit comments

Comments
 (0)