Skip to content

Commit 8a228ba

Browse files
committed
docs: add egress documentation
This PR adds a list of the domains I had to allow for a Talos cluster to pull all assets needed to install and bootstrap. I've added these docs back to 1.6 of Talos, as I'm not certain they would apply to anything earlier. Signed-off-by: Spencer Smith <[email protected]>
1 parent 182325c commit 8a228ba

File tree

4 files changed

+176
-0
lines changed

4 files changed

+176
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
---
2+
title: "Egress Domains"
3+
description: "Allowing outbound access for installing Talos"
4+
aliases:
5+
- ../guides/egress-domains
6+
---
7+
8+
For some more constrained environments, it is important to whitelist only specific domains for outbound internet access.
9+
These rules will need to be updated to allow for certain domains if the user wishes to still install and bootstrap Talos from public sources.
10+
That said, users should also note that all of the following components can be mirrored locally with an internal registry, as well as a self-hosted [discovery service](https://github.com/siderolabs/discovery-service) and [image factory](https://github.com/siderolabs/image-factory).
11+
12+
The following list of egress domains was tested using a Fortinet FortiGate Next-Generation Firewall to confirm that Talos was installed, bootstrapped, and Kubernetes was fully up and running.
13+
The FortiGate allows for passing in wildcard domains and will handle resolution of those domains to defined IPs automatically.
14+
All traffic is HTTPS over port 443.
15+
16+
Discovery Service:
17+
18+
- discovery.talos.dev
19+
20+
Image Factory:
21+
22+
- factory.talos.dev
23+
- *.azurefd.net (Azure Front Door for serving cached assets)
24+
25+
Google Container Registry / Google Artifact Registry (GCR/GAR):
26+
27+
- gcr.io
28+
- storage.googleapis.com (backing blob storage for images)
29+
- *.pkg.dev (backing blob storage for images)
30+
31+
Github Container Registry (GHCR)
32+
33+
- ghcr.io
34+
- *.githubusercontent.com (backing blob storage for images)
35+
36+
Kubernetes Registry (k8s.io)
37+
38+
- registry.k8s.io
39+
- *.s3.dualstack.us-east-1.amazonaws.com (backing blob storage for images)
40+
41+
> Note: In this testing, DNS and NTP servers were updated to use those services that are built-in to the FortiGate.
42+
These may also need to be allowed if the user cannot make use of internal services.
43+
Additionally,these rules only cover that which is required for Talos to be fully installed and running.
44+
There may be other domains like docker.io that must be allowed for non-default CNIs or workload container images.
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
---
2+
title: "Egress Domains"
3+
description: "Allowing outbound access for installing Talos"
4+
aliases:
5+
- ../guides/egress-domains
6+
---
7+
8+
For some more constrained environments, it is important to whitelist only specific domains for outbound internet access.
9+
These rules will need to be updated to allow for certain domains if the user wishes to still install and bootstrap Talos from public sources.
10+
That said, users should also note that all of the following components can be mirrored locally with an internal registry, as well as a self-hosted [discovery service](https://github.com/siderolabs/discovery-service) and [image factory](https://github.com/siderolabs/image-factory).
11+
12+
The following list of egress domains was tested using a Fortinet FortiGate Next-Generation Firewall to confirm that Talos was installed, bootstrapped, and Kubernetes was fully up and running.
13+
The FortiGate allows for passing in wildcard domains and will handle resolution of those domains to defined IPs automatically.
14+
All traffic is HTTPS over port 443.
15+
16+
Discovery Service:
17+
18+
- discovery.talos.dev
19+
20+
Image Factory:
21+
22+
- factory.talos.dev
23+
- *.azurefd.net (Azure Front Door for serving cached assets)
24+
25+
Google Container Registry / Google Artifact Registry (GCR/GAR):
26+
27+
- gcr.io
28+
- storage.googleapis.com (backing blob storage for images)
29+
- *.pkg.dev (backing blob storage for images)
30+
31+
Github Container Registry (GHCR)
32+
33+
- ghcr.io
34+
- *.githubusercontent.com (backing blob storage for images)
35+
36+
Kubernetes Registry (k8s.io)
37+
38+
- registry.k8s.io
39+
- *.s3.dualstack.us-east-1.amazonaws.com (backing blob storage for images)
40+
41+
> Note: In this testing, DNS and NTP servers were updated to use those services that are built-in to the FortiGate.
42+
These may also need to be allowed if the user cannot make use of internal services.
43+
Additionally,these rules only cover that which is required for Talos to be fully installed and running.
44+
There may be other domains like docker.io that must be allowed for non-default CNIs or workload container images.
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
---
2+
title: "Egress Domains"
3+
description: "Allowing outbound access for installing Talos"
4+
aliases:
5+
- ../guides/egress-domains
6+
---
7+
8+
For some more constrained environments, it is important to whitelist only specific domains for outbound internet access.
9+
These rules will need to be updated to allow for certain domains if the user wishes to still install and bootstrap Talos from public sources.
10+
That said, users should also note that all of the following components can be mirrored locally with an internal registry, as well as a self-hosted [discovery service](https://github.com/siderolabs/discovery-service) and [image factory](https://github.com/siderolabs/image-factory).
11+
12+
The following list of egress domains was tested using a Fortinet FortiGate Next-Generation Firewall to confirm that Talos was installed, bootstrapped, and Kubernetes was fully up and running.
13+
The FortiGate allows for passing in wildcard domains and will handle resolution of those domains to defined IPs automatically.
14+
All traffic is HTTPS over port 443.
15+
16+
Discovery Service:
17+
18+
- discovery.talos.dev
19+
20+
Image Factory:
21+
22+
- factory.talos.dev
23+
- *.azurefd.net (Azure Front Door for serving cached assets)
24+
25+
Google Container Registry / Google Artifact Registry (GCR/GAR):
26+
27+
- gcr.io
28+
- storage.googleapis.com (backing blob storage for images)
29+
- *.pkg.dev (backing blob storage for images)
30+
31+
Github Container Registry (GHCR)
32+
33+
- ghcr.io
34+
- *.githubusercontent.com (backing blob storage for images)
35+
36+
Kubernetes Registry (k8s.io)
37+
38+
- registry.k8s.io
39+
- *.s3.dualstack.us-east-1.amazonaws.com (backing blob storage for images)
40+
41+
> Note: In this testing, DNS and NTP servers were updated to use those services that are built-in to the FortiGate.
42+
These may also need to be allowed if the user cannot make use of internal services.
43+
Additionally,these rules only cover that which is required for Talos to be fully installed and running.
44+
There may be other domains like docker.io that must be allowed for non-default CNIs or workload container images.
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
---
2+
title: "Egress Domains"
3+
description: "Allowing outbound access for installing Talos"
4+
aliases:
5+
- ../guides/egress-domains
6+
---
7+
8+
For some more constrained environments, it is important to whitelist only specific domains for outbound internet access.
9+
These rules will need to be updated to allow for certain domains if the user wishes to still install and bootstrap Talos from public sources.
10+
That said, users should also note that all of the following components can be mirrored locally with an internal registry, as well as a self-hosted [discovery service](https://github.com/siderolabs/discovery-service) and [image factory](https://github.com/siderolabs/image-factory).
11+
12+
The following list of egress domains was tested using a Fortinet FortiGate Next-Generation Firewall to confirm that Talos was installed, bootstrapped, and Kubernetes was fully up and running.
13+
The FortiGate allows for passing in wildcard domains and will handle resolution of those domains to defined IPs automatically.
14+
All traffic is HTTPS over port 443.
15+
16+
Discovery Service:
17+
18+
- discovery.talos.dev
19+
20+
Image Factory:
21+
22+
- factory.talos.dev
23+
- *.azurefd.net (Azure Front Door for serving cached assets)
24+
25+
Google Container Registry / Google Artifact Registry (GCR/GAR):
26+
27+
- gcr.io
28+
- storage.googleapis.com (backing blob storage for images)
29+
- *.pkg.dev (backing blob storage for images)
30+
31+
Github Container Registry (GHCR)
32+
33+
- ghcr.io
34+
- *.githubusercontent.com (backing blob storage for images)
35+
36+
Kubernetes Registry (k8s.io)
37+
38+
- registry.k8s.io
39+
- *.s3.dualstack.us-east-1.amazonaws.com (backing blob storage for images)
40+
41+
> Note: In this testing, DNS and NTP servers were updated to use those services that are built-in to the FortiGate.
42+
These may also need to be allowed if the user cannot make use of internal services.
43+
Additionally,these rules only cover that which is required for Talos to be fully installed and running.
44+
There may be other domains like docker.io that must be allowed for non-default CNIs or workload container images.

0 commit comments

Comments
 (0)