Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions modules/configuring-firewall.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -46,13 +46,13 @@ There are no special configuration considerations for services running on only c
|443, 80
|The `https://console.redhat.com/openshift` site uses authentication from `sso.redhat.com`

|`rhcos-redirector.apps.art.xq1c.p1.openshiftapps.com`
|`rhcos.mirror.openshift.com`
|443, 80
|Provides {op-system-first} images

|===
+
You can use the wildcards `\*.quay.io` and `*.openshiftapps.com` instead of `cdn0[1-3].quay.io` and `rhcos-redirector.apps.art.xq1c.p1.openshiftapps.com` in your allowlist.
You can use the wildcards `\*.quay.io` and `*.mirror.openshift.com` instead of `cdn0[1-3].quay.io` and `rhcos.mirror.openshift.com` in your allowlist.
When you add a site, such as `quay.io`, to your allowlist, do not add a wildcard entry, such as `*.quay.io`, to your denylist. In most cases, image registries use a content delivery network (CDN) to serve images. If a firewall blocks access, then image downloads are denied when the initial download request is redirected to a hostname such as `cdn01.quay.io`.

. Allowlist any site that provides resources for a language or framework that your builds require.
Expand Down