Skip to content

Commit e3025e3

Browse files
authored
Merge pull request #196780 from tejaswikolli-web/FQDN
FQDN
2 parents 6c0a52c + 0c68467 commit e3025e3

File tree

1 file changed

+9
-0
lines changed

1 file changed

+9
-0
lines changed

articles/container-registry/container-registry-firewall-access-rules.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,15 @@ If your registry is [geo-replicated](container-registry-geo-replication.md), a c
2828
> [!NOTE]
2929
> Azure Container Registry is introducing [dedicated data endpoints](#enable-dedicated-data-endpoints), allowing you to tightly scope client firewall rules for your registry storage. Optionally enable data endpoints in all regions where the registry is located or replicated, using the form `<registry-name>.<region>.data.azurecr.io`.
3030
31+
## About Registry FQDN's
32+
33+
Registry has two FQDN's, the **login url** and the **data endpoint**.
34+
35+
* Both the **login url** and the **data endpoint** are accessible from within the virtual network, using private IP's by enabling a private link.
36+
* A registry that does not use data endpoints would have to access the data from an endpoint of the form `*.blob.core.windows.net` and does not provide the isolation required when configuring firewall rules.
37+
* A registry with a private link enabled gets the dedicated data endpoint automatically.
38+
* A dedicated data endpoint is created per region for a registry.
39+
* Login url remains the same irrespective of whether data endpoint is enabled or disabled.
3140
## Allow access by IP address range
3241

3342
If your organization has policies to allow access only to specific IP addresses or address ranges, download [Azure IP Ranges and Service Tags – Public Cloud](https://www.microsoft.com/download/details.aspx?id=56519).

0 commit comments

Comments
 (0)