Skip to content

Conversation

skanakal
Copy link

Fixes #1849

Reminders

  • See the README for more details on how to work with the Rancher docs.

  • Verify if changes pertain to other versions of Rancher. If they do, finalize the edits on one version of the page, then apply the edits to the other versions.

  • If the pull request is dependent on an upcoming release, remember to add a "MERGE ON RELEASE" label and set the proper milestone.

Description

Add allow-list to firewall configuration requirements for Rancher and Rancher-managed clusters

Comments

@skanakal skanakal force-pushed the config-your-firewall branch from 6d9c443 to acf59f9 Compare August 29, 2025 05:52
Copy link
Contributor

@pmkovar pmkovar left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you for the updates, LGTM.

@pmkovar pmkovar added the port/community-product Triggers a GitHub action to file a community sync issue for rancher-product-docs. label Aug 30, 2025
Copy link

@snasovich snasovich left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Added some comments. Overall I feel more research is needed into what exact URLs need to be whitelisted AND we probably want to split Community vs. Prime-only docs.


| URL | Port | Function |
|------------------------------------|------|---------------------------------------------------------------------------|
| `registry.rancher.com`, `registry.suse.com` | 443 | Provide Rancher system images, system-agent installer images, and RKE2/K3s artifacts. Both URLs resolve to the same SUSE registry backend, but either may appear in manifests or image references. |

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't believe we want to actually "advertise" SUSE Prime Registry URLs in Community docs. registry.rancher.com /registry.suse.com values are even in secrets in our GH CI workflows.

It's not a security issue per se but also for users running Community Rancher there is no value in whitelisting these URLs.

And vice-versa if users are running Rancher Prime they don't generally need to whitelist docker.io as all images Rancher Prime needs should be coming from Rancher Prime Registry.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@snasovich yeah, i want to keep this for SUSE Rancher Customer...
Can suggest me a place where i can this pr...

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just for posterity answered in DM

| URL | Port | Function |
|------------------------------------|------|---------------------------------------------------------------------------|
| `registry.rancher.com`, `registry.suse.com` | 443 | Provide Rancher system images, system-agent installer images, and RKE2/K3s artifacts. Both URLs resolve to the same SUSE registry backend, but either may appear in manifests or image references. |
| `*.suse.com` | 443 | Provides dynamic content and installation bundles required during RKE2/K3s provisioning |

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Could you point to examples of these? May want to be more specific than *.suse.com here.

| `registry.rancher.com`, `registry.suse.com` | 443 | Provide Rancher system images, system-agent installer images, and RKE2/K3s artifacts. Both URLs resolve to the same SUSE registry backend, but either may appear in manifests or image references. |
| `*.suse.com` | 443 | Provides dynamic content and installation bundles required during RKE2/K3s provisioning |
| `docker.io` | 443 | Provides community container images used by optional Rancher features |
| `ghcr.io` | 443 | Provides Rancher dependencies stored in the GitHub Container Registry |

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Curious what dependencies are we using from ghcr.io directly? I was under the impression necessary images are mirrored to DockerHub's rancher org and SUSE Rancher Prime Registry for community/Prime.

Copy link
Contributor

@btat btat left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Some of the info from this PR seems to overlap with the ideas present on this page (sourced from this file). It might be better to consolidate things, or at least have the files adjacent to each other.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
port/community-product Triggers a GitHub action to file a community sync issue for rancher-product-docs.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Missing Firewall and Network Access Requirements for Rancher and DS clusters
4 participants