Skip to content
Closed
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
9 changes: 3 additions & 6 deletions modules/configuring-firewall.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -30,10 +30,6 @@ There are no special configuration considerations for services running on only c
|443, 80
|Provides core container images

|`*.openshiftapps.com`
|443, 80
|Provides {op-system-first} images

|===
+
When you add a site, such as `quay.io`, to your allowlist, do not add a wildcard entry, such as `*.quay.io`, to your denylist. In most cases, image registries use a content delivery network (CDN) to serve images. If a firewall blocks access, then image downloads are denied when the initial download request is redirected to a hostname such as `cdn01.quay.io`.
Expand Down Expand Up @@ -102,7 +98,7 @@ CDN hostnames, such as `cdn01.quay.io`, are covered when you add a wildcard entr

. Allowlist the following URLs:
+
[cols="3,2,4",options="header"]
[cols="8,2,4",options="header"]
|===
|URL | Port | Function

Expand All @@ -126,7 +122,8 @@ CDN hostnames, such as `cdn01.quay.io`, are covered when you add a wildcard entr
|443, 80
|Required both for your cluster token and to check if updates are available for the cluster.

|`art-rhcos-ci.s3.amazonaws.com`
|`rhcos-redirector.apps.art.xq1c.p1.openshiftapps.com`, +
`rhcos.mirror.openshift.com`
|443, 80
|Required to download {op-system-first} images.

Expand Down