Skip to content

Commit ebf426a

Browse files
authored
Merge pull request #65772 from jneczypor/OSDOCS-7858
OSDOCS-7858: Add FedRAMP firewall prerequisites for ROSA
2 parents 07f4b04 + d1d1bac commit ebf426a

File tree

2 files changed

+32
-1
lines changed

2 files changed

+32
-1
lines changed

modules/osd-aws-privatelink-firewall-prerequisites.adoc

Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,16 @@
11
// Module included in the following assemblies:
22
//
3+
// * osd_planning/aws-ccs.adoc
34
// * rosa_install_access_delete_clusters/rosa_getting_started_iam/rosa-aws-prereqs.adoc
45
// * rosa_planning/rosa-sts-aws-prereqs.adoc
6+
// * rosa_planning/rosa-hcp-prereqs.adoc
7+
8+
ifeval::["{context}" == "rosa-sts-aws-prereqs"]
9+
:fedramp:
10+
endif::[]
11+
ifeval::["{context}" == "rosa-hcp-aws-prereqs"]
12+
:fedramp:
13+
endif::[]
514

615
:_content-type: PROCEDURE
716
[id="osd-aws-privatelink-firewall-prerequisites_{context}"]
@@ -98,11 +107,26 @@ This section provides the necessary details that enable you to control egress tr
98107
|`catalog.redhat.com`
99108
|443
100109
|The `registry.access.redhat.com` and `https://registry.redhat.io` sites redirect through `catalog.redhat.com`.
110+
111+
ifdef::fedramp[]
112+
|`time-a-g.nist.gov`
113+
|123 ^[2]^
114+
|Allows NTP traffic for FedRAMP.
115+
116+
|`time-a-wwv.nist.gov`
117+
|123 ^[2]^
118+
|Allows NTP traffic for FedRAMP.
119+
120+
|`time-a-b.nist.gov`
121+
|123 ^[2]^
122+
|Allows NTP traffic for FedRAMP.
123+
endif::fedramp[]
101124
|===
102125
+
103126
[.small]
104127
--
105128
1. In a firewall environment, ensure that the `access.redhat.com` resource is on the allowlist. This resource hosts a signature store that a container client requires for verifying images when pulling them from `registry.access.redhat.com`.
129+
2. Both TCP and UDP ports.
106130
--
107131
+
108132
When you add a site such as `quay.io` to your allowlist, do not add a wildcard entry such as `*.quay.io` to your denylist. In most cases, image registries use a content delivery network (CDN) to serve images. If a firewall blocks access, then image downloads are denied when the initial download request is redirected to a host name such as `cdn01.quay.io`.
@@ -293,3 +317,10 @@ The S3 endpoint should be in the following format:
293317

294318
. Allowlist any site that provides resources for a language or framework that your builds require.
295319
. Allowlist any outbound URLs that depend on the languages and frameworks used in OpenShift. See link:https://access.redhat.com/solutions/2998411[OpenShift Outbound URLs to Allow] for a list of recommended URLs to be allowed on the firewall or proxy.
320+
321+
ifeval::["{context}" == "rosa-sts-aws-prereqs"]
322+
:!fedramp:
323+
endif::[]
324+
ifeval::["{context}" == "rosa-hcp-aws-prereqs"]
325+
:!fedramp:
326+
endif::[]

rosa_planning/rosa-hcp-prereqs.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
:_content-type: ASSEMBLY
22
include::_attributes/attributes-openshift-dedicated.adoc[]
3-
:context: rosa-sts-aws-prereqs
3+
:context: rosa-hcp-aws-prereqs
44
[id="rosa-hcp-prereqs"]
55
= AWS prerequisites for {hcp-title}
66

0 commit comments

Comments
 (0)