Skip to content

Commit a219c1c

Browse files
committed
BZ1886291: Added ports and wildcard URL, with a note about allowing the wildcard.
1 parent bb7c9b8 commit a219c1c

File tree

1 file changed

+39
-9
lines changed

1 file changed

+39
-9
lines changed

modules/configuring-firewall.adoc

Lines changed: 39 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -13,103 +13,133 @@ There are no special configuration considerations for services running on only c
1313

1414
. Allowlist the following registry URLs:
1515
+
16-
[cols="3,4",options="header"]
16+
[cols="3,2,4",options="header"]
1717
|===
18-
|URL | Function
18+
|URL | Port | Function
19+
1920
|`registry.redhat.io`
21+
|443, 80
2022
|Provides core container images
2123

2224
|`quay.io`
25+
|443 or 80
26+
|Provides core container images
27+
28+
|`*.quay.io`
29+
|443, 80
2330
|Provides core container images
2431

2532
|`sso.redhat.com`
33+
|443, 80
2634
|The `https://cloud.redhat.com/openshift` site uses authentication from `sso.redhat.com`
2735

2836
|`openshift.org`
37+
|443, 80
2938
|Provides {op-system-first} images
39+
3040
|===
3141
+
3242
When you add a site such as `quay.io` to your allowlist, do not add a wildcard entry such as `*.quay.io` to your denylist. In most cases, image registries use a content delivery network (CDN) to serve images. If a firewall blocks access, then image downloads are denied when the initial download request is redirected to a host name such as `cdn01.quay.io`.
43+
+
44+
CDN host names, such as `cdn01.quay.io` are covered when you add a wildcard entry such as `*.quay.io` in your allowlist.
3345

3446
. Allowlist any site that provides resources for a language or framework that your builds require.
3547

3648
. If you do not disable Telemetry, you must grant access to the following URLs to access Red Hat Insights:
3749
+
38-
[cols="3,4",options="header"]
50+
[cols="3,2,4",options="header"]
3951
|===
40-
|URL | Function
52+
|URL | Port | Function
4153

4254
|`cert-api.access.redhat.com`
55+
|443, 80
4356
|Required for Telemetry
4457

4558
|`api.access.redhat.com`
59+
|443, 80
4660
|Required for Telemetry
4761

4862
|`infogw.api.openshift.com`
63+
|443, 80
4964
|Required for Telemetry
5065

5166
|`https://cloud.redhat.com/api/ingress`
67+
|443, 80
5268
|Required for Telemetry and for `insights-operator`
5369
|===
5470

5571
. If you use Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP) to host your cluster, you must grant access to the URLs that provide the cloud provider API and DNS for that cloud:
5672
+
57-
[cols="2a,8a,8a",options="header"]
73+
[cols="2a,8a,2a,8a",options="header"]
5874
|===
59-
|Cloud |URL |Function
75+
|Cloud |URL | Port |Function
6076

6177
.2+|AWS
6278
|`*.amazonaws.com`
79+
|443, 80
6380
|Required to access AWS services and resources. Review the link:https://docs.aws.amazon.com/general/latest/gr/rande.html[AWS Service Endpoints] in the AWS documentation to determine the exact endpoints to allow for the regions that you use.
6481

6582
|`oso-rhc4tp-docker-registry.s3-us-west-2.amazonaws.com`
83+
|443, 80
6684
|Required to access AWS services and resources when using strict security requirements. Review the link:https://docs.aws.amazon.com/general/latest/gr/rande.html[AWS Service Endpoints] in the AWS documentation to determine the exact endpoints to allow for the regions that you use.
6785

6886
.2+|GCP
6987
|`*.googleapis.com`
88+
|443, 80
7089
|Required to access GCP services and resources. Review link:https://cloud.google.com/endpoints/[Cloud Endpoints] in the GCP documentation to determine the endpoints to allow for your APIs.
7190

7291
|`accounts.google.com`
92+
|443, 80
7393
| Required to access your GCP account.
7494

7595
|Azure
7696
|`management.azure.com`
97+
|443, 80
7798
|Required to access Azure services and resources. Review the link:https://docs.microsoft.com/en-us/rest/api/azure/[Azure REST API Reference] in the Azure documentation to determine the endpoints to allow for your APIs.
7899

79100
|===
80101

81102
. Allowlist the following URLs:
82103
+
83-
[cols="3,4",options="header"]
104+
[cols="3,2,4",options="header"]
84105
|===
85-
|URL | Function
106+
|URL | Port | Function
86107

87108
|`mirror.openshift.com`
109+
|443, 80
88110
|Required to access mirrored installation content and images. This site is also a source of release image signatures, although the Cluster Version Operator needs only a single functioning source.
89111

90112
|`storage.googleapis.com/openshift-release`
113+
|443, 80
91114
|A source of release image signatures, although the Cluster Version Operator needs only a single functioning source.
92115

93116
|`*.apps.<cluster_name>.<base_domain>`
117+
|443, 80
94118
|Required to access the default cluster routes unless you set an ingress wildcard during installation.
95119

96120
|`quay-registry.s3.amazonaws.com`
121+
|443, 80
97122
|Required to access Quay image content in AWS.
98123

99124
|`api.openshift.com`
125+
|443, 80
100126
|Required to check if updates are available for the cluster.
101127

102128
|`art-rhcos-ci.s3.amazonaws.com`
129+
|443, 80
103130
|Required to download {op-system-first} images.
104131

105132
|`api.openshift.com`
133+
|443, 80
106134
|Required for your cluster token.
107135

108136
|`cloud.redhat.com/openshift`
137+
|443, 80
109138
|Required for your cluster token.
110139

111140
|`registry.access.redhat.com`
112-
|Required for `odo` CLI.
141+
|443, 80
142+
|Required for `odo` CLI.
113143
|===
114144
+
115145
Operators require route access to perform health checks. Specifically, the

0 commit comments

Comments
 (0)