Skip to content

Files

Latest commit

17344d1 · Jan 20, 2025

History

History
44 lines (32 loc) · 3 KB

registry_firewall.md

File metadata and controls

44 lines (32 loc) · 3 KB
copyright lastupdated keywords subcollection
years
2024, 2025
2025-01-20
IBM Cloud Container Registry, firewall, access, communicate, domains, subdomains, traffic, allowlist
Registry

{{site.data.keyword.attribute-definition-list}}

Accessing {{site.data.keyword.registryshort}} through a firewall

{: #registry_firewall}

To authorize worker nodes to communicate with {{site.data.keyword.registrylong}}, you must allow outgoing network traffic from the worker nodes to {{site.data.keyword.registrylong_notm}} regions. {: shortdesc}

If you are using {{site.data.keyword.containerlong_notm}} or {{site.data.keyword.openshiftlong}}, by default the connection to {{site.data.keyword.registryshort}} is private. Therefore, you don't need to allow public access to {{site.data.keyword.registryshort}}. For more information about private connectivity, see Private network connection to icr.io registries. {: note}

You can configure your firewall to allow connections to {{site.data.keyword.registryshort}} by using a Layer 7 firewall{: external} with the domains listed in the following table.

When you access {{site.data.keyword.registrylong_notm}} over the public internet, you must not have any allowlist restrictions that are based on IP addresses in place. If you are concerned about opening your allowlist, you can configure private access to {{site.data.keyword.registrylong_notm}} by using the private {{site.data.keyword.cloud_notm}} network, see Securing your connection to {{site.data.keyword.registryshort}}. IP address lists are not provided because they can change frequently. {: important}

In addition to the following regional subdomains, you must also allow traffic from your worker nodes to port 443 on all subdomains of icr.io so that they can be redirected to other subdomains for delivery optimization. You must allow TCP port 443 FROM <each_worker_node_publicIP> TO *.icr.io, where <each_worker_node_publicIP> is the public IP address for each worker node. If you use the deprecated domain names, you must allow those domains too.

Region Registry address Deprecated addresses
Global icr.io registry.bluemix.net
AP North jp.icr.io Not applicable
AP South au.icr.io registry.au-syd.bluemix.net
EU Central de.icr.io registry.eu-de.bluemix.net
Madrid es.icr.io Not applicable
Osaka jp2.icr.io Not applicable
Sao Paolo br.icr.io Not applicable
Toronto ca.icr.io Not applicable
UK South uk.icr.io registry.eu-gb.bluemix.net
US South us.icr.io registry.ng.bluemix.net
{: caption="Addresses for {{site.data.keyword.registryshort}} traffic" caption-side="bottom"}
{: #table_registry_firewall_traffic_addresses}