Skip to content

Commit 355853b

Browse files
edits
1 parent dd51b57 commit 355853b

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/container-registry/container-registry-private-link.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -339,7 +339,7 @@ az acr update --name $REGISTRY_NAME --public-network-enabled false
339339
Consider the following options to execute the `az acr build` successfully.
340340
> [!NOTE]
341341
> Once you disable public network [access here](#disable-public-access), then `az acr build` commands will no longer work.
342-
> Unless you are utilizing dedicated agent pools, it's typically necessary to whitelist the public IP's. Tasks reserve a set of public IPs in each region for outbound requests. If needed, we have the option to add these IPs to our firewall's allowed list for seamless communication.`az acr build` command uses the same set of IPs as the tasks. For more information, see [Azure DevOps IP ranges](/azure/devops/organizations/security/allow-list-ip-url?view=azure-devops#azure-devops-ip-ranges).
342+
> Unless you are utilizing dedicated agent pools, it's typically require the public IP's. Tasks reserve a set of public IPs in each region for outbound requests. If needed, we have the option to add these IPs to our firewall's allowed list for seamless communication.`az acr build` command uses the same set of IPs as the tasks. For more information, see [Azure DevOps IP ranges](/azure/devops/organizations/security/allow-list-ip-url?view=azure-devops#azure-devops-ip-ranges).
343343
344344
1. Assign a [dedicated agent pool.](./tasks-agent-pools.md)
345345
2. If agent pool is not available in the region, add the regional [Azure Container Registry Service Tag IPv4](../virtual-network/service-tags-overview.md#use-the-service-tag-discovery-api) to the [firewall access rules.](./container-registry-firewall-access-rules.md#allow-access-by-ip-address-range)

0 commit comments

Comments
 (0)