Skip to content

Commit 348679f

Browse files
Merge pull request #227669 from johnmarco/jm-aro-add-redhat-registry
Add redhat registry
2 parents d859640 + 1a0586e commit 348679f

File tree

1 file changed

+17
-16
lines changed

1 file changed

+17
-16
lines changed

articles/openshift/howto-restrict-egress.md

Lines changed: 17 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,11 @@ author: joharder
55
ms.author: joharder
66
ms.service: azure-redhat-openshift
77
ms.topic: article
8-
ms.date: 12/15/2022
8+
ms.date: 02/16/2023
99
---
1010
# Control egress traffic for your Azure Red Hat OpenShift (ARO) cluster
1111

12-
This article provides the necessary details that allow you to secure outbound traffic from your Azure Red Hat OpenShift cluster (ARO). With the release of the [Egress Lockdown Feature](./concepts-egress-lockdown.md), all of the required connections for a private cluster will be proxied through the service. There are additional destinations that you may want to allow to use features such as Operator Hub, or Red Hat telemetry. An [example](#private-aro-cluster-setup) will be provided at the end on how to configure these requirements with Azure Firewall. Keep in mind, you can apply this information to Azure Firewall or to any outbound restriction method or appliance.
12+
This article provides the necessary details that allow you to secure outbound traffic from your Azure Red Hat OpenShift cluster (ARO). With the release of the [Egress Lockdown Feature](./concepts-egress-lockdown.md), all of the required connections for a private cluster are proxied through the service. There are additional destinations that you may want to allow to use features such as Operator Hub, or Red Hat telemetry. An [example](#private-aro-cluster-setup) is be provided at the end showing how to configure these requirements with Azure Firewall. Keep in mind, you can apply this information to Azure Firewall or to any outbound restriction method or appliance.
1313

1414
## Before you begin
1515

@@ -19,19 +19,19 @@ This article assumes that you're creating a new cluster. If you need a basic ARO
1919

2020
This list is based on the list of FQDNs found in the OpenShift docs here: https://docs.openshift.com/container-platform/latest/installing/install_config/configuring-firewall.html
2121

22-
The following FQDNs are proxied through the service, and will not need additional firewall rules. They are here for informational purposes.
22+
The following FQDNs are proxied through the service, and won't need additional firewall rules. They're here for informational purposes.
2323

2424
| Destination FQDN | Port | Use |
2525
| ----------- | ----------- | ------------- |
26-
| **`arosvc.azurecr.io`** | **HTTPS:443** | Global Internal Private registry for ARO Operators. Required if you do not allow the service-endpoints Microsoft.ContainerRegistry on your subnets. |
27-
| **`arosvc.$REGION.data.azurecr.io`** | **HTTPS:443** | Regional Internal Private registry for ARO Operators. Required if you do not allow the service-endpoints Microsoft.ContainerRegistry on your subnets. |
28-
| **`management.azure.com`** | **HTTPS:443** | This is used by the cluster to access Azure APIs. |
29-
| **`login.microsoftonline.com`** | **HTTPS:443** | This is used by the cluster for authentication to Azure. |
30-
| **`*.monitor.core.windows.net`** | **HTTPS:443** | This is used for Microsoft Geneva Monitoring so that the ARO team can monitor the customer's cluster(s). |
31-
| **`*.monitoring.core.windows.net`** | **HTTPS:443** | This is used for Microsoft Geneva Monitoring so that the ARO team can monitor the customer's cluster(s). |
32-
| **`*.blob.core.windows.net`** | **HTTPS:443** | This is used for Microsoft Geneva Monitoring so that the ARO team can monitor the customer's cluster(s). |
33-
| **`*.servicebus.windows.net`** | **HTTPS:443** | This is used for Microsoft Geneva Monitoring so that the ARO team can monitor the customer's cluster(s). |
34-
| **`*.table.core.windows.net`** | **HTTPS:443** | This is used for Microsoft Geneva Monitoring so that the ARO team can monitor the customer's cluster(s). |
26+
| **`arosvc.azurecr.io`** | **HTTPS:443** | Global Internal Private registry for ARO Operators. Required if you don't allow the service-endpoints Microsoft.ContainerRegistry on your subnets. |
27+
| **`arosvc.$REGION.data.azurecr.io`** | **HTTPS:443** | Regional Internal Private registry for ARO Operators. Required if you don't allow the service-endpoints Microsoft.ContainerRegistry on your subnets. |
28+
| **`management.azure.com`** | **HTTPS:443** | Used by the cluster to access Azure APIs. |
29+
| **`login.microsoftonline.com`** | **HTTPS:443** | Used by the cluster for authentication to Azure. |
30+
| **`*.monitor.core.windows.net`** | **HTTPS:443** | Used for Microsoft Geneva Monitoring so that the ARO team can monitor the customer's cluster(s). |
31+
| **`*.monitoring.core.windows.net`** | **HTTPS:443** | Used for Microsoft Geneva Monitoring so that the ARO team can monitor the customer's cluster(s). |
32+
| **`*.blob.core.windows.net`** | **HTTPS:443** | Used for Microsoft Geneva Monitoring so that the ARO team can monitor the customer's cluster(s). |
33+
| **`*.servicebus.windows.net`** | **HTTPS:443** | Used for Microsoft Geneva Monitoring so that the ARO team can monitor the customer's cluster(s). |
34+
| **`*.table.core.windows.net`** | **HTTPS:443** | Used for Microsoft Geneva Monitoring so that the ARO team can monitor the customer's cluster(s). |
3535

3636
> [!NOTE]
3737
> For many customers exposing *.blob, *.table and other large address spaces creates a potential data exfiltration concern. You may want to consider using the [OpenShift Egress Firewall](https://docs.openshift.com/container-platform/latest/networking/openshift_sdn/configuring-egress-firewall.html) to protect applications deployed in the cluster from reaching these destinations and use Azure Private Link for specific application needs.
@@ -43,13 +43,13 @@ The following FQDNs are proxied through the service, and will not need additiona
4343
### ADDITIONAL CONTAINER IMAGES
4444

4545
- **`registry.redhat.io`**: Used to provide images for things such as Operator Hub.
46-
- **`*.quay.io`**: May be used to download images from the Red Hat managed Quay registry. Also a possible fall-back target for ARO required system images. If your firewall cannot use wildcards, you can find the [full list of subdomains in the Red Hat documentation.](https://docs.openshift.com/container-platform/latest/installing/install_config/configuring-firewall.html)
46+
- **`*.quay.io`**: May be used to download images from the Red Hat managed Quay registry. Also a possible fall-back target for ARO required system images. If your firewall can't use wildcards, you can find the [full list of subdomains in the Red Hat documentation.](https://docs.openshift.com/container-platform/latest/installing/install_config/configuring-firewall.html)
4747

4848
---
4949

5050
### TELEMETRY
5151

52-
All this section can be opted out, but before we know how, please check what it is: https://docs.openshift.com/container-platform/4.6/support/remote_health_monitoring/about-remote-health-monitoring.html
52+
You can opt out of telemetry, but make sure you understand this feature before doing so: https://docs.openshift.com/container-platform/4.6/support/remote_health_monitoring/about-remote-health-monitoring.html
5353
- **`cert-api.access.redhat.com`**: Used for Red Hat telemetry.
5454
- **`api.access.redhat.com`**: Used for Red Hat telemetry.
5555
- **`infogw.api.openshift.com`**: Used for Red Hat telemetry.
@@ -64,6 +64,7 @@ In OpenShift Container Platform, customers can opt out of reporting health and u
6464
- **`*.apps.<cluster_name>.<base_domain>`** (OR EQUIVALENT ARO URL): When allowlisting domains, this is used in your corporate network to reach applications deployed in OpenShift, or to access the OpenShift console.
6565
- **`api.openshift.com`**: Used by the cluster for release graph parsing. https://access.redhat.com/labs/ocpupgradegraph/ can be used as an alternative.
6666
- **`registry.access.redhat.com`**: Registry access is required in your VDI or laptop environment to download dev images when using the ODO CLI tool. (This CLI tool is an alternative CLI tool for developers who aren't familiar with kubernetes). https://docs.openshift.com/container-platform/4.6/cli_reference/developer_cli_odo/understanding-odo.html
67+
- **`access.redhat.com`**: Used in conjunction with `registry.access.redhat.com` when pulling images. Failure to add this access could result in an error message.
6768

6869
## ARO integrations
6970

@@ -197,7 +198,7 @@ Keep the saved `pull-secret.txt` file somewhere safe - it will be used in each c
197198

198199
When running the `az aro create` command, you can reference your pull secret using the `--pull-secret @pull-secret.txt` parameter. Execute `az aro create` from the directory where you stored your `pull-secret.txt` file. Otherwise, replace `@pull-secret.txt` with `@<path-to-my-pull-secret-file`.
199200

200-
If you are copying your pull secret or referencing it in other scripts, your pull secret should be formatted as a valid JSON string.
201+
If you're copying your pull secret or referencing it in other scripts, format your pull secret as a valid JSON string.
201202

202203
```azurecli
203204
az aro create \
@@ -247,7 +248,7 @@ az network route-table route create -g $RESOURCEGROUP --name aro-udr --route-tab
247248
```
248249

249250
### Add Application Rules for Azure Firewall
250-
Example rule for telemetry to work. Additional possibilities can be found on this [list](https://docs.openshift.com/container-platform/4.3/installing/install_config/configuring-firewall.html#configuring-firewall_configuring-firewall):
251+
Example rule for telemetry to work. Additional possibilities are listed [here](https://docs.openshift.com/container-platform/4.3/installing/install_config/configuring-firewall.html#configuring-firewall_configuring-firewall):
251252
```azurecli
252253
az network firewall application-rule create -g $RESOURCEGROUP -f aro-private \
253254
--collection-name 'ARO' \

0 commit comments

Comments
 (0)