Skip to content

Commit 9a5165f

Browse files
Merge pull request #264576 from tejaswikolli-web/publicupdate
update on public IP's
2 parents 79f3261 + 01de9bf commit 9a5165f

File tree

1 file changed

+6
-4
lines changed

1 file changed

+6
-4
lines changed

articles/container-registry/container-registry-private-link.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -336,13 +336,15 @@ az acr update --name $REGISTRY_NAME --public-network-enabled false
336336

337337
## Execute the `az acr build` with private endpoint and private registry
338338

339-
Consider the following options to execute the `az acr build` successfully.
340339
> [!NOTE]
341340
> Once you disable public network [access here](#disable-public-access), then `az acr build` commands will no longer work.
341+
> Unless you are utilizing dedicated agent pools, it's typically require the public IP's. Tasks reserve a set of public IPs in each region for outbound requests. If needed, we have the option to add these IPs to our firewall's allowed list for seamless communication.`az acr build` command uses the same set of IPs as the tasks.
342+
343+
Consider the following options to execute the `az acr build` successfully.
342344

343-
1. Assign a [dedicated agent pool.](./tasks-agent-pools.md)
344-
2. If agent pool is not available in the region, add the regional [Azure Container Registry Service Tag IPv4](../virtual-network/service-tags-overview.md#use-the-service-tag-discovery-api) to the [firewall access rules.](./container-registry-firewall-access-rules.md#allow-access-by-ip-address-range)
345-
3. Create an ACR task with a managed identity, and enable trusted services to [access network restricted ACR.](./allow-access-trusted-services.md#example-acr-tasks)
345+
* Assign a [dedicated agent pool.](./tasks-agent-pools.md)
346+
* If agent pool is not available in the region, add the regional [Azure Container Registry Service Tag IPv4](../virtual-network/service-tags-overview.md#use-the-service-tag-discovery-api) to the [firewall access rules.](./container-registry-firewall-access-rules.md#allow-access-by-ip-address-range). Tasks reserve a set of public IPs in each region (a.k.a. AzureContainerRegistry Service Tag) for outbound requests. You can choose to add the IPs in the firewall allowed list.
347+
* Create an ACR task with a managed identity, and enable trusted services to [access network restricted ACR.](./allow-access-trusted-services.md#example-acr-tasks)
346348

347349
## Disable access to a container registry using a service endpoint
348350

0 commit comments

Comments
 (0)