|
1 | 1 | // Module included in the following assemblies:
|
2 | 2 | //
|
| 3 | +// * osd_planning/aws-ccs.adoc |
3 | 4 | // * rosa_install_access_delete_clusters/rosa_getting_started_iam/rosa-aws-prereqs.adoc
|
4 | 5 | // * rosa_planning/rosa-sts-aws-prereqs.adoc
|
| 6 | +// * rosa_planning/rosa-hcp-prereqs.adoc |
| 7 | + |
| 8 | +ifeval::["{context}" == "rosa-sts-aws-prereqs"] |
| 9 | +:fedramp: |
| 10 | +endif::[] |
| 11 | +ifeval::["{context}" == "rosa-hcp-aws-prereqs"] |
| 12 | +:fedramp: |
| 13 | +endif::[] |
5 | 14 |
|
6 | 15 | :_content-type: PROCEDURE
|
7 | 16 | [id="osd-aws-privatelink-firewall-prerequisites_{context}"]
|
@@ -98,11 +107,26 @@ This section provides the necessary details that enable you to control egress tr
|
98 | 107 | |`catalog.redhat.com`
|
99 | 108 | |443
|
100 | 109 | |The `registry.access.redhat.com` and `https://registry.redhat.io` sites redirect through `catalog.redhat.com`.
|
| 110 | + |
| 111 | +ifdef::fedramp[] |
| 112 | +|`time-a-g.nist.gov` |
| 113 | +|123 ^[2]^ |
| 114 | +|Allows NTP traffic for FedRAMP. |
| 115 | + |
| 116 | +|`time-a-wwv.nist.gov` |
| 117 | +|123 ^[2]^ |
| 118 | +|Allows NTP traffic for FedRAMP. |
| 119 | + |
| 120 | +|`time-a-b.nist.gov` |
| 121 | +|123 ^[2]^ |
| 122 | +|Allows NTP traffic for FedRAMP. |
| 123 | +endif::fedramp[] |
101 | 124 | |===
|
102 | 125 | +
|
103 | 126 | [.small]
|
104 | 127 | --
|
105 | 128 | 1. In a firewall environment, ensure that the `access.redhat.com` resource is on the allowlist. This resource hosts a signature store that a container client requires for verifying images when pulling them from `registry.access.redhat.com`.
|
| 129 | +2. Both TCP and UDP ports. |
106 | 130 | --
|
107 | 131 | +
|
108 | 132 | When you add a site such as `quay.io` to your allowlist, do not add a wildcard entry such as `*.quay.io` to your denylist. In most cases, image registries use a content delivery network (CDN) to serve images. If a firewall blocks access, then image downloads are denied when the initial download request is redirected to a host name such as `cdn01.quay.io`.
|
@@ -293,3 +317,10 @@ The S3 endpoint should be in the following format:
|
293 | 317 |
|
294 | 318 | . Allowlist any site that provides resources for a language or framework that your builds require.
|
295 | 319 | . Allowlist any outbound URLs that depend on the languages and frameworks used in OpenShift. See link:https://access.redhat.com/solutions/2998411[OpenShift Outbound URLs to Allow] for a list of recommended URLs to be allowed on the firewall or proxy.
|
| 320 | + |
| 321 | +ifeval::["{context}" == "rosa-sts-aws-prereqs"] |
| 322 | +:!fedramp: |
| 323 | +endif::[] |
| 324 | +ifeval::["{context}" == "rosa-hcp-aws-prereqs"] |
| 325 | +:!fedramp: |
| 326 | +endif::[] |
0 commit comments