Firewall Changes Required for Container Image Pull Operations

Firewall Changes Required for Container Image Pull Operations

04 Apr 2023

Giray Baha Kezer – Sekom – SD-X & Cloud Technology Engineer & Alperay Burak Keleş – Sekom – SD-X & Cloud Technology Engineer

Sekom | Firewall Changes Required for Container Image Pull Operations

Are You Ready for the Upcoming Changes in Red Hat Container Image Pull Process?

With an announcement made by Red Hat on March 8th, it was disclosed that the Red Hat Container Image Registry addresses will change. Therefore, Red Hat customers are advised to make changes to their firewall/proxy rules in their enterprise infrastructure by May 1, 2023, to avoid interruptions in container image registry access.

Points to Be Updated

Currently, all image manifests and filesystem blocks are served directly from registry.redhat.io and registry.access.redhat.com addresses. Due to the upcoming changes, filesystem blocks will now be served from Quay.io. To prevent issues in container image pull operations, it will be necessary to allow TCP connections on ports 80 and 443 for the following domains:

  • cdn.quay.io
  • cdn01.quay.io
  • cdn02.quay.io
  • cdn03.quay.io

These changes should be made to the firewall configurations where the necessary permissions were previously granted for the addresses registry.redhat.io and registry.access.redhat.com. With these adjustments, container image pull operations can continue from the above-mentioned addresses. It is not necessary to log in to Quay.io or interact directly with the Quay.io registry for continuing Red Hat container image pull operations.

If the instructions during the OpenShift setup were followed correctly or if the Quay.io registry was used, the firewall configurations are likely already properly adjusted. Products like Red Hat Ansible Automation Platform or Red Hat Satellite may require firewall or proxy changes.

It is recommended to use hostnames instead of IP addresses when configuring firewall rules. For more information, refer to Applying IP Address Filtering to Red Hat Container Registries.

Why Is This Change Being Made?

Since June 2022, Red Hat OpenShift operator index images have been provided via registry.redhat.io using a Quay.io backend. OpenShift installation instructions required access to Quay.io and CDN servers, but no additional steps were needed for the product itself. Now, this approach is being extended to all Red Hat container images, allowing users to benefit from the high availability and simplicity features of Quay.io registry.

Test

To ensure that image pull operations are working correctly before the changes are applied, you can pull the image “registry.redhat.io/redhat/redhat-operator-index:v4.12” from Quay.io. This operation can be performed using the relevant commands with Customer Portal credentials.

If the image is pulled successfully, the command echo $? will return “0”.

Additional Information

Apart from the changes, many things will remain the same:

  • Container features will remain unchanged, so images can still be pulled using “registry.redhat.io” and “registry.access.redhat.com”.
  • Red Hat container images will continue to be signed in the same way and with the same keys.
  • Container image manifests will be served directly from “registry.redhat.io” and “registry.access.redhat.com”. Redirections will only be made to the Quay.io CDN for configuration and filesystem blocks.
  • To pull an image using sha256, schema 2 must be used. (For more detailed information, click here.)
  • Image tags, schema 2, image identities, and signatures will remain unchanged.
  • Images pulled before the changes will still be valid and do not need to be pulled again.
  • No changes are required regarding ImageContentSourcePolicy for OpenShift or Kubernetes clusters.
  • No need for node restarts, cache changes, or any upgrades for OpenShift or Kubernetes clusters.

Allowing outbound connections with the above hostnames can solve the following issues, depending on different firewall configurations:

  • “Connection refused” error when pulling images.
  • I/O timeout errors when pulling images.
  • ImagePullBackOff status when pulling images in OpenShift or Kubernetes clusters.

The following examples show the errors that can be encountered using the “podman pull” command with different firewall configurations:

Sekom | Firewall Changes Required for Container Image Pull Operations

If you need support on this topic, our team of skilled and experienced experts is here to assist you. All you need to do is visit our expertise page and fill out the contact form!

Other Posts

Sekom | Firewall Changes Required for Container Image Pull Operations
AI Datacenter Network Architecture | Why the Fastest GPUs Are Not Enough: The Defining Role of Network Infrastructure in AI Workloads

Build high-performance, low-latency, and scalable infrastructures with AI Data Center Network Architecture. Explore modern solutions for GPU-centric network designs, data flow optimization, and AI workloads.

Read More
Sekom | Firewall Changes Required for Container Image Pull Operations
Meet Sekom at MWC2026 Barcelona: Network Intelligence for Real-World Operations

Meet Sekom at MWC26 Barcelona and explore Wireskop intelligent service orchestration and network automation for scalable, future-ready connectivity.

Read More
Sekom | Firewall Changes Required for Container Image Pull Operations
Cisco Collaboration Solutions – Redefining Connectivity in the Modern Business World

Enhance hybrid work and secure communication with Cisco Collaboration Solutions. Modernize with Sekom’s Cisco Gold Partner expertise.

Read More
Sekom | Firewall Changes Required for Container Image Pull Operations
Observe, Measure, Manage – Sekom’s End-to-End Monitoring Engineering

Boost reliability with open-source monitoring, full-stack observability, and workflows. Discover Sekom’s monitoring approach today.

Read More
Sekom | Firewall Changes Required for Container Image Pull Operations
Discover the Power of Automation – Boost Efficiency by Advancing from AWX to Ansible Automation Platform

Modernize automation with Ansible Automation Platform. Achieve secure, scalable, efficient operations by migrating from AWX with confidence.

Read More
Sekom | Firewall Changes Required for Container Image Pull Operations
Turning Customer Data into Strategic Advantage with Splunk MLTK

Turn customer data into strategic advantage with Splunk MLTK. Machine learning anomaly detection, security, and Splunk Enterprise Security.

Read More

“Building Digital Future”

We are a well-established, reliable, and expert digital transformation integrator, committed to the satisfaction of both our customers and our employees.

Explore
Wireskop Carrier-grade service orchestration and intelligence platform UC Toolbox End-to-end visibility for Unified Communications Clarity Integrated Network and Infrastructure Observability platform
Sekans Centralized DHCP and IP address management solution Kognosphere Centralized DPI management and orchestration platform Autosphere Enterprise-scale IT automation and orchestration platform
For more information, feel free to contact us.
Wireskop Operatör seviyesinde servis orkestrasyonu ve zeka platformu UC Toolbox Birleşik İletişim altyapıları için uçtan uca görünürlük Clarity Bütünleşik Ağ ve Altyapı Gözlemlenebilirlik Platformu
Sekans Merkezi DHCP ve IP adres yönetimi çözümü Kognosphere Merkezi DPI yönetimi ve orkestrasyon platformu Autosphere Kurumsal ölçekte BT otomasyon ve orkestrasyon platformu
Daha fazla bilgi için lütfen bizimle iletişime geçin.