Skip to content

Commit e92bf26

Browse files
author
Jill Grant
authored
Merge pull request #274599 from tejaswikolli-web/gitissue117085
Gitissue117085
2 parents ab10169 + e9eee68 commit e92bf26

File tree

4 files changed

+57
-1
lines changed

4 files changed

+57
-1
lines changed

articles/container-registry/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -347,6 +347,8 @@
347347
href: ./policy-reference.md
348348
- name: Monitoring data
349349
href: monitor-service-reference.md
350+
- name: Service Tag
351+
href: container-registry-service-tag.md
350352
- name: Troubleshoot
351353
expanded: false
352354
items:

articles/container-registry/container-registry-auto-purge.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ At a minimum, specify the following when you run `acr purge`:
4444

4545
* `--untagged` - Specifies that all manifests that don't have associated tags (*untagged manifests*) are deleted. This parameter also deletes untagged manifests in addition to tags that are already being deleted.
4646
* `--dry-run` - Specifies that no data is deleted, but the output is the same as if the command is run without this flag. This parameter is useful for testing a purge command to make sure it does not inadvertently delete data you intend to preserve.
47-
* `--keep` - Specifies that the latest x number of to-be-deleted tags are retained.
47+
* `--keep` - Specifies that the latest x number of to-be-deleted tags are retained. The latest tags are determined by the last modified time of the tag.
4848
* `--concurrency` - Specifies a number of purge tasks to process concurrently. A default value is used if this parameter is not provided.
4949

5050
> [!NOTE]
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
---
2+
title: "Service tags for Azure Container Registry"
3+
description: "Learn and understand the service tags for Azure Container Registry. Service tags are used to define network access controls for Azure resources."
4+
author: tejaswikolli-web
5+
ms.author: tejaswikolli
6+
ms.service: container-registry
7+
ms.topic: best-practice #Don't change
8+
ms.date: 04/30/2024
9+
10+
---
11+
12+
# Service tags for Azure Container Registry
13+
14+
Service tags help set rules to allow or deny traffic to a specific Azure service. A service tag represents a group of IP address prefixes from a given Azure service. Service tags in Azure Container Registry (ACR), represents a group of IP address prefixes that can be used to access the service either globally or per Azure region. Microsoft manages the address prefixes encompassed by the service tag and automatically updates the service tag as addresses change, minimizing the complexity of frequent updates to network security rules.
15+
16+
Azure Container Registry (ACR) generates network traffic originating from the ACR service tag for features such as Image import, Webhook, and ACR Tasks.
17+
18+
When you configure a firewall for a registry, ACR serves the requests on its service tag IP addresses. For the scenarios mentioned in [Firewall access rules](container-registry-firewall-access-rules.md), customers can configure the firewall outbound rule to allow access to ACR service tag IP addresses.
19+
20+
## Import images
21+
22+
Azure Container Registry (ACR) initiates requests to external registry services via service tag IP addresses for image downloads. If the external registry service operates behind a firewall, it requires an inbound rule to accept ACR service tag IP addresses. These IPs fall under the ACR service tag, which includes the necessary IP ranges for importing images from public or Azure registries. Azure ensures these ranges are updated automatically. Establishing this security protocol is crucial for upholding the registry's integrity and ensuring its availability.
23+
24+
ACR sends requests to the external registry service through service tag IP addresses to download the images. If the external registry service runs behind firewall, it needs to have inbound rule to allow ACR service tag IP addresses. These IPs are part of the AzureContainerRegistry service tag, which encompasses IP ranges necessary for importing images from public or Azure registries. Configuring a security measure to maintain the registry's integrity and accessibility.
25+
26+
Learn about [registry endpoints](container-registry-firewall-access-rules.md#about-registry-endpoints) to configure network security rules and allow traffic from the ACR service tag for image import in ACR.
27+
28+
For detailed steps and guidance on how to use the service tag during image import, refer to the [Azure Container Registry documentation](container-registry-import-images.md).
29+
30+
## Webhooks
31+
32+
Service tags in Azure Container Registry (ACR) are used to manage network traffic for features like webhooks to ensure only trusted sources are able to trigger these events. When you set up a webhook in ACR, it can respond to events at the registry level or be scoped down to a specific repository tag. For geo-replicated registries, you configure each webhook to respond to events in a specific regional replica.
33+
34+
The endpoint for a webhook must be publicly accessible from the registry. You can configure registry webhook requests to authenticate to a secured endpoint. ACR sends the request to the configured webhook endpoint through service tag IP addresses. If the webhook endpoint runs behind firewall, it needs to have inbound rule to allow ACR service tag IP addresses. Additionally, to secure the webhook endpoint access, the customer must configure the proper authentication to validate the request.
35+
36+
For detailed steps on creating a webhook setup, refer to the [Azure Container Registry documentation](container-registry-webhook.md).
37+
38+
## ACR Tasks
39+
40+
ACR Tasks, such as when you’re building container images or automating workflows, the service tag represents the group of IP address prefixes that ACR uses. During the execution of tasks, Tasks send requests to external resources through service tag IP addresses. If the external resource runs behind firewall, it needs to have inbound rule to allow ACR service tag IP addresses. Applying these inbound rules is a common practice to ensure security and proper access management in cloud environments.
41+
42+
Learn more about [ACR Tasks](container-registry-tasks-overview.md) and how to use the service tag to set up [firewall access rules](container-registry-firewall-access-rules.md) for ACR Tasks.
43+
44+
## Best practices
45+
46+
* Configure and customize the network security rules to allow traffic from the AzureContainerRegistry service tag for features like image import, webhooks, and ACR Tasks, such as port numbers and protocols.
47+
48+
* Set up firewall rules to permit traffic solely from IP ranges associated with ACR service tags for each feature.
49+
50+
* Detect and prevent unauthorized traffic not originating from ACR service tag IP addresses.
51+
52+
* Monitor network traffic continuously and review security configurations periodically to address unexpected traffic for each ACR feature using [Azure Monitor](/azure/azure-monitor/overview) or [Network Watcher](/azure/network-watcher/frequently-asked-questions).

articles/container-registry/index.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -136,6 +136,8 @@ landingContent:
136136
url: policy-reference.md
137137
- text: Deprecated APIs
138138
url: container-registry-api-deprecation.md
139+
- text: Service Tags
140+
url: container-registry-service-tag.md
139141
# Card (optional)
140142
- title: Security
141143
linkLists:

0 commit comments

Comments
 (0)