Skip to content

Commit 6928da9

Browse files
committed
OCPBUGS-9122: Improved configuring your firewall install info
1 parent fa52eea commit 6928da9

File tree

2 files changed

+15
-9
lines changed

2 files changed

+15
-9
lines changed

modules/configuring-firewall.adoc

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -27,9 +27,9 @@ If your environment has a dedicated load balancer in front of your {product-titl
2727
|443, 80
2828
|Provides core container images
2929

30-
|`access.redhat.com`
30+
|`access.redhat.com` ^[1]^
3131
|443, 80
32-
|Provides core container images
32+
|Hosts all the container images that are stored on the Red Hat Ecosytem Catalog, including core container images.
3333

3434
|`quay.io`
3535
|443, 80
@@ -54,9 +54,14 @@ If your environment has a dedicated load balancer in front of your {product-titl
5454
|`sso.redhat.com`
5555
|443, 80
5656
|The `https://console.redhat.com/openshift` site uses authentication from `sso.redhat.com`
57-
57+
[.small]
5858
|===
5959
+
60+
[.small]
61+
--
62+
1. In a firewall environment, ensure that the `access.redhat.com` resource is on the allowlist. This resource hosts a signature store that a container tool requires for verifying images when pulling them from `registry.access.redhat.com`.
63+
--
64+
+
6065
You can use the wildcards `\*.quay.io` and `*.openshiftapps.com` instead of `cdn0[1-3].quay.io` in your allowlist. When you add a site, such as `quay.io`, to your allowlist, do not add a wildcard entry, such as `*.quay.io`, to your denylist. In most cases, image registries use a content delivery network (CDN) to serve images. If a firewall blocks access, image downloads are denied when the initial download request redirects to a hostname such as `cdn01.quay.io`.
6166

6267
. Allowlist any site that provides resources for a language or framework that your builds require.

modules/osd-aws-privatelink-firewall-prerequisites.adoc

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -57,9 +57,9 @@ This section provides the necessary details that enable you to control egress tr
5757
|443
5858
|Provides {op-system-first} images.
5959

60-
|`registry.access.redhat.com`
60+
|`registry.access.redhat.com` ^[1]^
6161
|443
62-
|Provides access to the `odo` CLI tool that helps developers build on OpenShift and Kubernetes.
62+
|Hosts all the container images that are stored on the Red Hat Ecosytem Catalog. Additionally, the registry provides access to the `odo` CLI tool that helps developers build on OpenShift and Kubernetes.
6363

6464
|`registry.connect.redhat.com`
6565
|443, 80
@@ -97,10 +97,11 @@ This section provides the necessary details that enable you to control egress tr
9797
|443
9898
|The `registry.access.redhat.com` and `https://registry.redhat.io` sites redirect through `catalog.redhat.com`.
9999
|===
100-
//[NOTE]
101-
//====
102-
//Creating a firewall with a ROSA private cluster (non-PrivateLink) is not supported.
103-
//====
100+
+
101+
[.small]
102+
--
103+
1. In a firewall environment, ensure that the `access.redhat.com` resource is on the allowlist. This resource hosts a signature store that a container tool requires for verifying images when pulling them from `registry.access.redhat.com`.
104+
--
104105
+
105106
When you add a site such as `quay.io` to your allowlist, do not add a wildcard entry such as `*.quay.io` to your denylist. In most cases, image registries use a content delivery network (CDN) to serve images. If a firewall blocks access, then image downloads are denied when the initial download request is redirected to a host name such as `cdn01.quay.io`.
106107
+

0 commit comments

Comments
 (0)