Skip to content

Commit dd51b57

Browse files
edits
1 parent 13f3cda commit dd51b57

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/container-registry/container-registry-private-link.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -339,7 +339,7 @@ az acr update --name $REGISTRY_NAME --public-network-enabled false
339339
Consider the following options to execute the `az acr build` successfully.
340340
> [!NOTE]
341341
> Once you disable public network [access here](#disable-public-access), then `az acr build` commands will no longer work.
342-
> Unless you are utilizing dedicated agent pools, it's typically necessary to whitelist the public IP ranges associated with the Azure machine pools used by the DevOps agents. These public IPs facilitate outbound requests from the Azure machine pools to reach the ACR instance. Failure to whitelist these IPs may result in connectivity issues between DevOps agents and ACR.
342+
> Unless you are utilizing dedicated agent pools, it's typically necessary to whitelist the public IP's. Tasks reserve a set of public IPs in each region for outbound requests. If needed, we have the option to add these IPs to our firewall's allowed list for seamless communication.`az acr build` command uses the same set of IPs as the tasks. For more information, see [Azure DevOps IP ranges](/azure/devops/organizations/security/allow-list-ip-url?view=azure-devops#azure-devops-ip-ranges).
343343
344344
1. Assign a [dedicated agent pool.](./tasks-agent-pools.md)
345345
2. If agent pool is not available in the region, add the regional [Azure Container Registry Service Tag IPv4](../virtual-network/service-tags-overview.md#use-the-service-tag-discovery-api) to the [firewall access rules.](./container-registry-firewall-access-rules.md#allow-access-by-ip-address-range)

0 commit comments

Comments
 (0)