Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
---
title: Configuring Your Firewall
---

<head>
<link rel="canonical" href="https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/configure-your-firewall"/>
</head>


If you use an external firewall, you must configure it so that Rancher and Rancher-managed clusters can access the sites and ports required to function correctly. This section provides the firewall rules and network access requirements for Rancher deployments in secure environments.



## Outbound Internet Access Requirements

Rancher server nodes and managed cluster nodes require outbound HTTPS access to container registries and related services.

Set the following registry URLs for your firewall’s allowlist:

| URL | Port | Function |
|------------------------------------|------|---------------------------------------------------------------------------|
| `registry.rancher.com`, `registry.suse.com` | 443 | Provide Rancher system images, system-agent installer images, and RKE2/K3s artifacts. Both URLs resolve to the same SUSE registry backend, but either may appear in manifests or image references. |

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't believe we want to actually "advertise" SUSE Prime Registry URLs in Community docs. registry.rancher.com /registry.suse.com values are even in secrets in our GH CI workflows.

It's not a security issue per se but also for users running Community Rancher there is no value in whitelisting these URLs.

And vice-versa if users are running Rancher Prime they don't generally need to whitelist docker.io as all images Rancher Prime needs should be coming from Rancher Prime Registry.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@snasovich yeah, i want to keep this for SUSE Rancher Customer...
Can suggest me a place where i can this pr...

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just for posterity answered in DM

| `*.suse.com` | 443 | Provides dynamic content and installation bundles required during RKE2/K3s provisioning |

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Could you point to examples of these? May want to be more specific than *.suse.com here.

| `docker.io` | 443 | Provides community container images used by optional Rancher features |
| `ghcr.io` | 443 | Provides Rancher dependencies stored in the GitHub Container Registry |

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Curious what dependencies are we using from ghcr.io directly? I was under the impression necessary images are mirrored to DockerHub's rancher org and SUSE Rancher Prime Registry for community/Prime.



## Inbound Access Requirements

External clients and managed clusters require inbound access to the Rancher server.

| Port | Protocol | Source | Purpose |
|------|----------|-------------------------|-------------------------------------------------|
| 80 | TCP | End users / clusters | HTTP access to Rancher (redirects to HTTPS) |
| 443 | TCP | End users / clusters | HTTPS access to Rancher UI and API |


- You can use the wildcard `*.suse.com` to simplify configuration and ensure that all required SUSE domains are allowed.
1 change: 1 addition & 0 deletions sidebars.js
Original file line number Diff line number Diff line change
Expand Up @@ -789,6 +789,7 @@ const sidebars = {
],
},
"how-to-guides/advanced-user-guides/open-ports-with-firewalld",
"how-to-guides/advanced-user-guides/configure-your-firewall",
"how-to-guides/advanced-user-guides/tune-etcd-for-large-installs",
"how-to-guides/advanced-user-guides/enable-api-audit-log",
"how-to-guides/advanced-user-guides/enable-api-audit-log-in-downstream-clusters",
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
---
title: Configuring Your Firewall
---

<head>
<link rel="canonical" href="https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/configure-your-firewall"/>
</head>


If you use an external firewall, you must configure it so that Rancher and Rancher-managed clusters can access the sites and ports required to function correctly. This section provides the firewall rules and network access requirements for Rancher deployments in secure environments.



## Outbound Internet Access Requirements

Rancher server nodes and managed cluster nodes require outbound HTTPS access to container registries and related services.

Set the following registry URLs for your firewall’s allowlist:

| URL | Port | Function |
|------------------------------------|------|---------------------------------------------------------------------------|
| `registry.rancher.com`, `registry.suse.com` | 443 | Provide Rancher system images, system-agent installer images, and RKE2/K3s artifacts. Both URLs resolve to the same SUSE registry backend, but either may appear in manifests or image references. |
| `*.suse.com` | 443 | Provides dynamic content and installation bundles required during RKE2/K3s provisioning |
| `docker.io` | 443 | Provides community container images used by optional Rancher features |
| `ghcr.io` | 443 | Provides Rancher dependencies stored in the GitHub Container Registry |


## Inbound Access Requirements

External clients and managed clusters require inbound access to the Rancher server.

| Port | Protocol | Source | Purpose |
|------|----------|-------------------------|-------------------------------------------------|
| 80 | TCP | End users / clusters | HTTP access to Rancher (redirects to HTTPS) |
| 443 | TCP | End users / clusters | HTTPS access to Rancher UI and API |


- You can use the wildcard `*.suse.com` to simplify configuration and ensure that all required SUSE domains are allowed.
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
---
title: Configuring Your Firewall
---

<head>
<link rel="canonical" href="https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/configure-your-firewall"/>
</head>


If you use an external firewall, you must configure it so that Rancher and Rancher-managed clusters can access the sites and ports required to function correctly. This section provides the firewall rules and network access requirements for Rancher deployments in secure environments.



## Outbound Internet Access Requirements

Rancher server nodes and managed cluster nodes require outbound HTTPS access to container registries and related services.

Set the following registry URLs for your firewall’s allowlist:

| URL | Port | Function |
|------------------------------------|------|---------------------------------------------------------------------------|
| `registry.rancher.com`, `registry.suse.com` | 443 | Provide Rancher system images, system-agent installer images, and RKE2/K3s artifacts. Both URLs resolve to the same SUSE registry backend, but either may appear in manifests or image references. |
| `*.suse.com` | 443 | Provides dynamic content and installation bundles required during RKE2/K3s provisioning |
| `docker.io` | 443 | Provides community container images used by optional Rancher features |
| `ghcr.io` | 443 | Provides Rancher dependencies stored in the GitHub Container Registry |


## Inbound Access Requirements

External clients and managed clusters require inbound access to the Rancher server.

| Port | Protocol | Source | Purpose |
|------|----------|-------------------------|-------------------------------------------------|
| 80 | TCP | End users / clusters | HTTP access to Rancher (redirects to HTTPS) |
| 443 | TCP | End users / clusters | HTTPS access to Rancher UI and API |


- You can use the wildcard `*.suse.com` to simplify configuration and ensure that all required SUSE domains are allowed.
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
---
title: Configuring Your Firewall
---

<head>
<link rel="canonical" href="https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/configure-your-firewall"/>
</head>


If you use an external firewall, you must configure it so that Rancher and Rancher-managed clusters can access the sites and ports required to function correctly. This section provides the firewall rules and network access requirements for Rancher deployments in secure environments.



## Outbound Internet Access Requirements

Rancher server nodes and managed cluster nodes require outbound HTTPS access to container registries and related services.

Set the following registry URLs for your firewall’s allowlist:

| URL | Port | Function |
|------------------------------------|------|---------------------------------------------------------------------------|
| `registry.rancher.com`, `registry.suse.com` | 443 | Provide Rancher system images, system-agent installer images, and RKE2/K3s artifacts. Both URLs resolve to the same SUSE registry backend, but either may appear in manifests or image references. |
| `*.suse.com` | 443 | Provides dynamic content and installation bundles required during RKE2/K3s provisioning |
| `docker.io` | 443 | Provides community container images used by optional Rancher features |
| `ghcr.io` | 443 | Provides Rancher dependencies stored in the GitHub Container Registry |


## Inbound Access Requirements

External clients and managed clusters require inbound access to the Rancher server.

| Port | Protocol | Source | Purpose |
|------|----------|-------------------------|-------------------------------------------------|
| 80 | TCP | End users / clusters | HTTP access to Rancher (redirects to HTTPS) |
| 443 | TCP | End users / clusters | HTTPS access to Rancher UI and API |


- You can use the wildcard `*.suse.com` to simplify configuration and ensure that all required SUSE domains are allowed.
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
---
title: Configuring Your Firewall
---

<head>
<link rel="canonical" href="https://ranchermanager.docs.rancher.com/how-to-guides/advanced-user-guides/configure-your-firewall"/>
</head>


If you use an external firewall, you must configure it so that Rancher and Rancher-managed clusters can access the sites and ports required to function correctly. This section provides the firewall rules and network access requirements for Rancher deployments in secure environments.



## Outbound Internet Access Requirements

Rancher server nodes and managed cluster nodes require outbound HTTPS access to container registries and related services.

Set the following registry URLs for your firewall’s allowlist:

| URL | Port | Function |
|------------------------------------|------|---------------------------------------------------------------------------|
| `registry.rancher.com`, `registry.suse.com` | 443 | Provide Rancher system images, system-agent installer images, and RKE2/K3s artifacts. Both URLs resolve to the same SUSE registry backend, but either may appear in manifests or image references. |
| `*.suse.com` | 443 | Provides dynamic content and installation bundles required during RKE2/K3s provisioning |
| `docker.io` | 443 | Provides community container images used by optional Rancher features |
| `ghcr.io` | 443 | Provides Rancher dependencies stored in the GitHub Container Registry |


## Inbound Access Requirements

External clients and managed clusters require inbound access to the Rancher server.

| Port | Protocol | Source | Purpose |
|------|----------|-------------------------|-------------------------------------------------|
| 80 | TCP | End users / clusters | HTTP access to Rancher (redirects to HTTPS) |
| 443 | TCP | End users / clusters | HTTPS access to Rancher UI and API |


- You can use the wildcard `*.suse.com` to simplify configuration and ensure that all required SUSE domains are allowed.
1 change: 1 addition & 0 deletions versioned_sidebars/version-2.10-sidebars.json
Original file line number Diff line number Diff line change
Expand Up @@ -755,6 +755,7 @@
]
},
"how-to-guides/advanced-user-guides/open-ports-with-firewalld",
"how-to-guides/advanced-user-guides/configure-your-firewall",
"how-to-guides/advanced-user-guides/tune-etcd-for-large-installs",
"how-to-guides/advanced-user-guides/enable-api-audit-log",
"how-to-guides/advanced-user-guides/enable-api-audit-log-in-downstream-clusters",
Expand Down
1 change: 1 addition & 0 deletions versioned_sidebars/version-2.11-sidebars.json
Original file line number Diff line number Diff line change
Expand Up @@ -756,6 +756,7 @@
]
},
"how-to-guides/advanced-user-guides/open-ports-with-firewalld",
"how-to-guides/advanced-user-guides/configure-your-firewall",
"how-to-guides/advanced-user-guides/tune-etcd-for-large-installs",
"how-to-guides/advanced-user-guides/enable-api-audit-log",
"how-to-guides/advanced-user-guides/enable-api-audit-log-in-downstream-clusters",
Expand Down
1 change: 1 addition & 0 deletions versioned_sidebars/version-2.12-sidebars.json
Original file line number Diff line number Diff line change
Expand Up @@ -756,6 +756,7 @@
]
},
"how-to-guides/advanced-user-guides/open-ports-with-firewalld",
"how-to-guides/advanced-user-guides/configure-your-firewall",
"how-to-guides/advanced-user-guides/tune-etcd-for-large-installs",
"how-to-guides/advanced-user-guides/enable-api-audit-log",
"how-to-guides/advanced-user-guides/enable-api-audit-log-in-downstream-clusters",
Expand Down
1 change: 1 addition & 0 deletions versioned_sidebars/version-2.9-sidebars.json
Original file line number Diff line number Diff line change
Expand Up @@ -755,6 +755,7 @@
]
},
"how-to-guides/advanced-user-guides/open-ports-with-firewalld",
"how-to-guides/advanced-user-guides/configure-your-firewall",
"how-to-guides/advanced-user-guides/tune-etcd-for-large-installs",
"how-to-guides/advanced-user-guides/enable-api-audit-log",
"how-to-guides/advanced-user-guides/enable-api-audit-log-in-downstream-clusters",
Expand Down