Skip to content

Commit

Permalink
docs: add egress documentation
Browse files Browse the repository at this point in the history
This PR adds a list of the domains I had to allow for a Talos cluster to pull all assets needed to install and bootstrap. I've added these docs back to 1.6 of Talos, as I'm not certain they would apply to anything earlier.

Signed-off-by: Spencer Smith <[email protected]>
  • Loading branch information
rsmitty committed Oct 9, 2024
1 parent 182325c commit 8a228ba
Show file tree
Hide file tree
Showing 4 changed files with 176 additions and 0 deletions.
44 changes: 44 additions & 0 deletions website/content/v1.6/advanced/egress-domains.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
---
title: "Egress Domains"
description: "Allowing outbound access for installing Talos"
aliases:
- ../guides/egress-domains
---

For some more constrained environments, it is important to whitelist only specific domains for outbound internet access.
These rules will need to be updated to allow for certain domains if the user wishes to still install and bootstrap Talos from public sources.
That said, users should also note that all of the following components can be mirrored locally with an internal registry, as well as a self-hosted [discovery service](https://github.com/siderolabs/discovery-service) and [image factory](https://github.com/siderolabs/image-factory).

The following list of egress domains was tested using a Fortinet FortiGate Next-Generation Firewall to confirm that Talos was installed, bootstrapped, and Kubernetes was fully up and running.
The FortiGate allows for passing in wildcard domains and will handle resolution of those domains to defined IPs automatically.
All traffic is HTTPS over port 443.

Discovery Service:

- discovery.talos.dev

Image Factory:

- factory.talos.dev
- *.azurefd.net (Azure Front Door for serving cached assets)

Google Container Registry / Google Artifact Registry (GCR/GAR):

- gcr.io
- storage.googleapis.com (backing blob storage for images)
- *.pkg.dev (backing blob storage for images)

Github Container Registry (GHCR)

- ghcr.io
- *.githubusercontent.com (backing blob storage for images)

Kubernetes Registry (k8s.io)

- registry.k8s.io
- *.s3.dualstack.us-east-1.amazonaws.com (backing blob storage for images)

> Note: In this testing, DNS and NTP servers were updated to use those services that are built-in to the FortiGate.
These may also need to be allowed if the user cannot make use of internal services.
Additionally,these rules only cover that which is required for Talos to be fully installed and running.
There may be other domains like docker.io that must be allowed for non-default CNIs or workload container images.
44 changes: 44 additions & 0 deletions website/content/v1.7/advanced/egress-domains.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
---
title: "Egress Domains"
description: "Allowing outbound access for installing Talos"
aliases:
- ../guides/egress-domains
---

For some more constrained environments, it is important to whitelist only specific domains for outbound internet access.
These rules will need to be updated to allow for certain domains if the user wishes to still install and bootstrap Talos from public sources.
That said, users should also note that all of the following components can be mirrored locally with an internal registry, as well as a self-hosted [discovery service](https://github.com/siderolabs/discovery-service) and [image factory](https://github.com/siderolabs/image-factory).

The following list of egress domains was tested using a Fortinet FortiGate Next-Generation Firewall to confirm that Talos was installed, bootstrapped, and Kubernetes was fully up and running.
The FortiGate allows for passing in wildcard domains and will handle resolution of those domains to defined IPs automatically.
All traffic is HTTPS over port 443.

Discovery Service:

- discovery.talos.dev

Image Factory:

- factory.talos.dev
- *.azurefd.net (Azure Front Door for serving cached assets)

Google Container Registry / Google Artifact Registry (GCR/GAR):

- gcr.io
- storage.googleapis.com (backing blob storage for images)
- *.pkg.dev (backing blob storage for images)

Github Container Registry (GHCR)

- ghcr.io
- *.githubusercontent.com (backing blob storage for images)

Kubernetes Registry (k8s.io)

- registry.k8s.io
- *.s3.dualstack.us-east-1.amazonaws.com (backing blob storage for images)

> Note: In this testing, DNS and NTP servers were updated to use those services that are built-in to the FortiGate.
These may also need to be allowed if the user cannot make use of internal services.
Additionally,these rules only cover that which is required for Talos to be fully installed and running.
There may be other domains like docker.io that must be allowed for non-default CNIs or workload container images.
44 changes: 44 additions & 0 deletions website/content/v1.8/advanced/egress-domains.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
---
title: "Egress Domains"
description: "Allowing outbound access for installing Talos"
aliases:
- ../guides/egress-domains
---

For some more constrained environments, it is important to whitelist only specific domains for outbound internet access.
These rules will need to be updated to allow for certain domains if the user wishes to still install and bootstrap Talos from public sources.
That said, users should also note that all of the following components can be mirrored locally with an internal registry, as well as a self-hosted [discovery service](https://github.com/siderolabs/discovery-service) and [image factory](https://github.com/siderolabs/image-factory).

The following list of egress domains was tested using a Fortinet FortiGate Next-Generation Firewall to confirm that Talos was installed, bootstrapped, and Kubernetes was fully up and running.
The FortiGate allows for passing in wildcard domains and will handle resolution of those domains to defined IPs automatically.
All traffic is HTTPS over port 443.

Discovery Service:

- discovery.talos.dev

Image Factory:

- factory.talos.dev
- *.azurefd.net (Azure Front Door for serving cached assets)

Google Container Registry / Google Artifact Registry (GCR/GAR):

- gcr.io
- storage.googleapis.com (backing blob storage for images)
- *.pkg.dev (backing blob storage for images)

Github Container Registry (GHCR)

- ghcr.io
- *.githubusercontent.com (backing blob storage for images)

Kubernetes Registry (k8s.io)

- registry.k8s.io
- *.s3.dualstack.us-east-1.amazonaws.com (backing blob storage for images)

> Note: In this testing, DNS and NTP servers were updated to use those services that are built-in to the FortiGate.
These may also need to be allowed if the user cannot make use of internal services.
Additionally,these rules only cover that which is required for Talos to be fully installed and running.
There may be other domains like docker.io that must be allowed for non-default CNIs or workload container images.
44 changes: 44 additions & 0 deletions website/content/v1.9/advanced/egress-domains.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
---
title: "Egress Domains"
description: "Allowing outbound access for installing Talos"
aliases:
- ../guides/egress-domains
---

For some more constrained environments, it is important to whitelist only specific domains for outbound internet access.
These rules will need to be updated to allow for certain domains if the user wishes to still install and bootstrap Talos from public sources.
That said, users should also note that all of the following components can be mirrored locally with an internal registry, as well as a self-hosted [discovery service](https://github.com/siderolabs/discovery-service) and [image factory](https://github.com/siderolabs/image-factory).

The following list of egress domains was tested using a Fortinet FortiGate Next-Generation Firewall to confirm that Talos was installed, bootstrapped, and Kubernetes was fully up and running.
The FortiGate allows for passing in wildcard domains and will handle resolution of those domains to defined IPs automatically.
All traffic is HTTPS over port 443.

Discovery Service:

- discovery.talos.dev

Image Factory:

- factory.talos.dev
- *.azurefd.net (Azure Front Door for serving cached assets)

Google Container Registry / Google Artifact Registry (GCR/GAR):

- gcr.io
- storage.googleapis.com (backing blob storage for images)
- *.pkg.dev (backing blob storage for images)

Github Container Registry (GHCR)

- ghcr.io
- *.githubusercontent.com (backing blob storage for images)

Kubernetes Registry (k8s.io)

- registry.k8s.io
- *.s3.dualstack.us-east-1.amazonaws.com (backing blob storage for images)

> Note: In this testing, DNS and NTP servers were updated to use those services that are built-in to the FortiGate.
These may also need to be allowed if the user cannot make use of internal services.
Additionally,these rules only cover that which is required for Talos to be fully installed and running.
There may be other domains like docker.io that must be allowed for non-default CNIs or workload container images.

0 comments on commit 8a228ba

Please sign in to comment.