Skip to content

Commit 31df9a4

Browse files
authored
Merge pull request #115589 from dlepow/dde
[ACR] Dedicated endpoints - portal
2 parents 1cf0552 + 452c235 commit 31df9a4

File tree

2 files changed

+29
-8
lines changed

2 files changed

+29
-8
lines changed

articles/container-registry/container-registry-firewall-access-rules.md

Lines changed: 29 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Firewall access rules
33
description: Configure rules to access an Azure container registry from behind a firewall, by allowing access to ("whitelisting") REST API and data endpoint domain names or service-specific IP address ranges.
44
ms.topic: article
5-
ms.date: 05/07/2020
5+
ms.date: 05/18/2020
66
---
77

88
# Configure rules to access an Azure container registry behind a firewall
@@ -13,7 +13,7 @@ If instead you want to configure inbound network access to a container registry
1313

1414
## About registry endpoints
1515

16-
To pull or push images or other artifacts to an Azure container registry, a client such as a Docker daemon needs to interact over HTTPS with two distinct endpoints. For clients that access a registry from behind a firewall, you need to configure access rules for both endpoints.
16+
To pull or push images or other artifacts to an Azure container registry, a client such as a Docker daemon needs to interact over HTTPS with two distinct endpoints. For clients that access a registry from behind a firewall, you need to configure access rules for both endpoints. Both endpoints are reached over port 443.
1717

1818
* **Registry REST API endpoint** - Authentication and registry management operations are handled through the registry's public REST API endpoint. This endpoint is the login server name of the registry. Example: `myregistry.azurecr.io`
1919

@@ -26,7 +26,7 @@ If your registry is [geo-replicated](container-registry-geo-replication.md), a c
2626
* **REST endpoint** - Allow access to the fully qualified registry login server name, `<registry-name>.azurecr.io`, or an associated IP address range
2727
* **Storage (data) endpoint** - Allow access to all Azure blob storage accounts using the wildcard `*.blob.core.windows.net`, or an associated IP address range.
2828
> [!NOTE]
29-
> Azure Container Registry is introducing [dedicated data endpoints](#enable-dedicated-data-endpoints-preview) (preview), allowing you to tightly scope client firewall rules for your registry storage. Optionally enable data endpoints in all regions where the registry is located or replicated, using the form `<registry-name>.<region>.data.azurecr.io`.
29+
> Azure Container Registry is introducing [dedicated data endpoints](#enable-dedicated-data-endpoints), allowing you to tightly scope client firewall rules for your registry storage. Optionally enable data endpoints in all regions where the registry is located or replicated, using the form `<registry-name>.<region>.data.azurecr.io`.
3030
3131
## Allow access by IP address range
3232

@@ -112,26 +112,45 @@ In an Azure virtual network, use network security rules to filter traffic from a
112112

113113
For example, create an outbound network security group rule with destination **AzureContainerRegistry** to allow traffic to an Azure container registry. To allow access to the service tag only in a specific region, specify the region in the following format: **AzureContainerRegistry**.[*region name*].
114114

115-
## Enable dedicated data endpoints (preview)
115+
## Enable dedicated data endpoints
116116

117117
> [!WARNING]
118118
> If you previously configured client firewall access to the existing `*.blob.core.windows.net` endpoints, switching to dedicated data endpoints will impact client connectivity, causing pull failures. To ensure clients have consistent access, add the new data endpoint rules to the client firewall rules. Once completed, enable dedicated data endpoints for your registries using the Azure CLI or other tools.
119119

120-
Dedicated data endpoints is an optional feature of the **Premium** container registry service tier. For information about registry service tiers and limits, see [Azure Container Registry Tiers](container-registry-skus.md). To enable data endpoints using the Azure CLI, use Azure CLI version 2.4.0 or higher. If you need to install or upgrade, see [Install Azure CLI](/cli/azure/install-azure-cli).
120+
Dedicated data endpoints is an optional feature of the **Premium** container registry service tier. For information about registry service tiers and limits, see [Azure Container Registry service tiers](container-registry-skus.md).
121121

122-
The following [az acr update][az-acr-update] command enables dedicated data endpoints on a registry *myregistry*. For demonstration purpose, assume that the registry is replicated in two regions:
122+
You can enable dedicated data endpoints using the Azure portal or the Azure CLI. The data endpoints follow a regional pattern, `<registry-name>.<region>.data.azurecr.io`. In a geo-replicated registry, enabling data endpoints enables endpoints in all replica regions.
123+
124+
### Portal
125+
126+
To enable data endpoints using the portal:
127+
128+
1. Navigate to your container registry.
129+
1. Select **Networking** > **Public access**.
130+
1. Select the **Enable dedicated data endpoint** checkbox.
131+
1. Select **Save**.
132+
133+
The data endpoint or endpoints appear in the portal.
134+
135+
![Dedicated data endpoints in portal](./media/container-registry-firewall-access-rules/dedicated-data-endpoints-portal.png)
136+
137+
### Azure CLI
138+
139+
To enable data endpoints using the Azure CLI, use Azure CLI version 2.4.0 or higher. If you need to install or upgrade, see [Install Azure CLI](/cli/azure/install-azure-cli).
140+
141+
The following [az acr update][az-acr-update] command enables dedicated data endpoints on a registry *myregistry*.
123142

124143
```azurecli
125144
az acr update --name myregistry --data-endpoint-enabled
126145
```
127146

128-
The data endpoints use a regional pattern, `<registry-name>.<region>.data.azurecr.io`. To view the data endpoints, use the [az acr show-endpoints][az-acr-show-endpoints] command:
147+
To view the data endpoints, use the [az acr show-endpoints][az-acr-show-endpoints] command:
129148

130149
```azurecli
131150
az acr show-endpoints --name myregistry
132151
```
133152

134-
Output:
153+
Output for demonstration purposes shows two regional endpoints
135154

136155
```
137156
{
@@ -161,6 +180,8 @@ If you need to access Microsoft Container Registry (MCR) from behind a firewall,
161180

162181
* Learn more about [security groups](/azure/virtual-network/security-overview) in an Azure virtual network
163182

183+
* Learn more about setting up [Private Link](container-registry-private-link.md) for a container registry
184+
164185
* Learn more about [dedicated data endpoints](https://azure.microsoft.com/blog/azure-container-registry-mitigating-data-exfiltration-with-dedicated-data-endpoints/) for Azure Container Registry
165186

166187

108 KB
Loading

0 commit comments

Comments
 (0)