-
Notifications
You must be signed in to change notification settings - Fork 256
Add firewall configuration requirements for Rancher and Rancher-managed clusters #1978
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,38 @@ | ||
--- | ||
title: Configuring Your Firewall | ||
--- | ||
|
||
<head> | ||
<link rel="canonical" href="https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/configure-your-firewall"/> | ||
</head> | ||
|
||
|
||
If you use an external firewall, you must configure it so that Rancher and Rancher-managed clusters can access the sites and ports required to function correctly. This section provides the firewall rules and network access requirements for Rancher deployments in secure environments. | ||
|
||
|
||
|
||
## Outbound Internet Access Requirements | ||
|
||
Rancher server nodes and managed cluster nodes require outbound HTTPS access to container registries and related services. | ||
|
||
Set the following registry URLs for your firewall’s allowlist: | ||
|
||
| URL | Port | Function | | ||
|------------------------------------|------|---------------------------------------------------------------------------| | ||
| `registry.rancher.com`, `registry.suse.com` | 443 | Provide Rancher system images, system-agent installer images, and RKE2/K3s artifacts. Both URLs resolve to the same SUSE registry backend, but either may appear in manifests or image references. | | ||
| `*.suse.com` | 443 | Provides dynamic content and installation bundles required during RKE2/K3s provisioning | | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Could you point to examples of these? May want to be more specific than |
||
| `docker.io` | 443 | Provides community container images used by optional Rancher features | | ||
| `ghcr.io` | 443 | Provides Rancher dependencies stored in the GitHub Container Registry | | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Curious what dependencies are we using from ghcr.io directly? I was under the impression necessary images are mirrored to DockerHub's |
||
|
||
|
||
## Inbound Access Requirements | ||
|
||
External clients and managed clusters require inbound access to the Rancher server. | ||
|
||
| Port | Protocol | Source | Purpose | | ||
|------|----------|-------------------------|-------------------------------------------------| | ||
| 80 | TCP | End users / clusters | HTTP access to Rancher (redirects to HTTPS) | | ||
| 443 | TCP | End users / clusters | HTTPS access to Rancher UI and API | | ||
|
||
|
||
- You can use the wildcard `*.suse.com` to simplify configuration and ensure that all required SUSE domains are allowed. |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,38 @@ | ||
--- | ||
title: Configuring Your Firewall | ||
--- | ||
|
||
<head> | ||
<link rel="canonical" href="https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/configure-your-firewall"/> | ||
</head> | ||
|
||
|
||
If you use an external firewall, you must configure it so that Rancher and Rancher-managed clusters can access the sites and ports required to function correctly. This section provides the firewall rules and network access requirements for Rancher deployments in secure environments. | ||
|
||
|
||
|
||
## Outbound Internet Access Requirements | ||
|
||
Rancher server nodes and managed cluster nodes require outbound HTTPS access to container registries and related services. | ||
|
||
Set the following registry URLs for your firewall’s allowlist: | ||
|
||
| URL | Port | Function | | ||
|------------------------------------|------|---------------------------------------------------------------------------| | ||
| `registry.rancher.com`, `registry.suse.com` | 443 | Provide Rancher system images, system-agent installer images, and RKE2/K3s artifacts. Both URLs resolve to the same SUSE registry backend, but either may appear in manifests or image references. | | ||
| `*.suse.com` | 443 | Provides dynamic content and installation bundles required during RKE2/K3s provisioning | | ||
| `docker.io` | 443 | Provides community container images used by optional Rancher features | | ||
| `ghcr.io` | 443 | Provides Rancher dependencies stored in the GitHub Container Registry | | ||
|
||
|
||
## Inbound Access Requirements | ||
|
||
External clients and managed clusters require inbound access to the Rancher server. | ||
|
||
| Port | Protocol | Source | Purpose | | ||
|------|----------|-------------------------|-------------------------------------------------| | ||
| 80 | TCP | End users / clusters | HTTP access to Rancher (redirects to HTTPS) | | ||
| 443 | TCP | End users / clusters | HTTPS access to Rancher UI and API | | ||
|
||
|
||
- You can use the wildcard `*.suse.com` to simplify configuration and ensure that all required SUSE domains are allowed. |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,38 @@ | ||
--- | ||
title: Configuring Your Firewall | ||
--- | ||
|
||
<head> | ||
<link rel="canonical" href="https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/configure-your-firewall"/> | ||
</head> | ||
|
||
|
||
If you use an external firewall, you must configure it so that Rancher and Rancher-managed clusters can access the sites and ports required to function correctly. This section provides the firewall rules and network access requirements for Rancher deployments in secure environments. | ||
|
||
|
||
|
||
## Outbound Internet Access Requirements | ||
|
||
Rancher server nodes and managed cluster nodes require outbound HTTPS access to container registries and related services. | ||
|
||
Set the following registry URLs for your firewall’s allowlist: | ||
|
||
| URL | Port | Function | | ||
|------------------------------------|------|---------------------------------------------------------------------------| | ||
| `registry.rancher.com`, `registry.suse.com` | 443 | Provide Rancher system images, system-agent installer images, and RKE2/K3s artifacts. Both URLs resolve to the same SUSE registry backend, but either may appear in manifests or image references. | | ||
| `*.suse.com` | 443 | Provides dynamic content and installation bundles required during RKE2/K3s provisioning | | ||
| `docker.io` | 443 | Provides community container images used by optional Rancher features | | ||
| `ghcr.io` | 443 | Provides Rancher dependencies stored in the GitHub Container Registry | | ||
|
||
|
||
## Inbound Access Requirements | ||
|
||
External clients and managed clusters require inbound access to the Rancher server. | ||
|
||
| Port | Protocol | Source | Purpose | | ||
|------|----------|-------------------------|-------------------------------------------------| | ||
| 80 | TCP | End users / clusters | HTTP access to Rancher (redirects to HTTPS) | | ||
| 443 | TCP | End users / clusters | HTTPS access to Rancher UI and API | | ||
|
||
|
||
- You can use the wildcard `*.suse.com` to simplify configuration and ensure that all required SUSE domains are allowed. |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,38 @@ | ||
--- | ||
title: Configuring Your Firewall | ||
--- | ||
|
||
<head> | ||
<link rel="canonical" href="https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/configure-your-firewall"/> | ||
</head> | ||
|
||
|
||
If you use an external firewall, you must configure it so that Rancher and Rancher-managed clusters can access the sites and ports required to function correctly. This section provides the firewall rules and network access requirements for Rancher deployments in secure environments. | ||
|
||
|
||
|
||
## Outbound Internet Access Requirements | ||
|
||
Rancher server nodes and managed cluster nodes require outbound HTTPS access to container registries and related services. | ||
|
||
Set the following registry URLs for your firewall’s allowlist: | ||
|
||
| URL | Port | Function | | ||
|------------------------------------|------|---------------------------------------------------------------------------| | ||
| `registry.rancher.com`, `registry.suse.com` | 443 | Provide Rancher system images, system-agent installer images, and RKE2/K3s artifacts. Both URLs resolve to the same SUSE registry backend, but either may appear in manifests or image references. | | ||
| `*.suse.com` | 443 | Provides dynamic content and installation bundles required during RKE2/K3s provisioning | | ||
| `docker.io` | 443 | Provides community container images used by optional Rancher features | | ||
| `ghcr.io` | 443 | Provides Rancher dependencies stored in the GitHub Container Registry | | ||
|
||
|
||
## Inbound Access Requirements | ||
|
||
External clients and managed clusters require inbound access to the Rancher server. | ||
|
||
| Port | Protocol | Source | Purpose | | ||
|------|----------|-------------------------|-------------------------------------------------| | ||
| 80 | TCP | End users / clusters | HTTP access to Rancher (redirects to HTTPS) | | ||
| 443 | TCP | End users / clusters | HTTPS access to Rancher UI and API | | ||
|
||
|
||
- You can use the wildcard `*.suse.com` to simplify configuration and ensure that all required SUSE domains are allowed. |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,38 @@ | ||
--- | ||
title: Configuring Your Firewall | ||
--- | ||
|
||
<head> | ||
<link rel="canonical" href="https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/configure-your-firewall"/> | ||
</head> | ||
|
||
|
||
If you use an external firewall, you must configure it so that Rancher and Rancher-managed clusters can access the sites and ports required to function correctly. This section provides the firewall rules and network access requirements for Rancher deployments in secure environments. | ||
|
||
|
||
|
||
## Outbound Internet Access Requirements | ||
|
||
Rancher server nodes and managed cluster nodes require outbound HTTPS access to container registries and related services. | ||
|
||
Set the following registry URLs for your firewall’s allowlist: | ||
|
||
| URL | Port | Function | | ||
|------------------------------------|------|---------------------------------------------------------------------------| | ||
| `registry.rancher.com`, `registry.suse.com` | 443 | Provide Rancher system images, system-agent installer images, and RKE2/K3s artifacts. Both URLs resolve to the same SUSE registry backend, but either may appear in manifests or image references. | | ||
| `*.suse.com` | 443 | Provides dynamic content and installation bundles required during RKE2/K3s provisioning | | ||
| `docker.io` | 443 | Provides community container images used by optional Rancher features | | ||
| `ghcr.io` | 443 | Provides Rancher dependencies stored in the GitHub Container Registry | | ||
|
||
|
||
## Inbound Access Requirements | ||
|
||
External clients and managed clusters require inbound access to the Rancher server. | ||
|
||
| Port | Protocol | Source | Purpose | | ||
|------|----------|-------------------------|-------------------------------------------------| | ||
| 80 | TCP | End users / clusters | HTTP access to Rancher (redirects to HTTPS) | | ||
| 443 | TCP | End users / clusters | HTTPS access to Rancher UI and API | | ||
|
||
|
||
- You can use the wildcard `*.suse.com` to simplify configuration and ensure that all required SUSE domains are allowed. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't believe we want to actually "advertise" SUSE Prime Registry URLs in Community docs.
registry.rancher.com
/registry.suse.com
values are even in secrets in our GH CI workflows.It's not a security issue per se but also for users running Community Rancher there is no value in whitelisting these URLs.
And vice-versa if users are running Rancher Prime they don't generally need to whitelist
docker.io
as all images Rancher Prime needs should be coming from Rancher Prime Registry.There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@snasovich yeah, i want to keep this for SUSE Rancher Customer...
Can suggest me a place where i can this pr...
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just for posterity answered in DM