Skip to content

Latest commit

 

History

History
41 lines (27 loc) · 3.49 KB

allowips.md

File metadata and controls

41 lines (27 loc) · 3.49 KB
copyright lastupdated keywords subcollection
years
2017, 2025
2025-01-20
schematics locations, schematics regions, schematics zones, schematics endpoints, schematics service endpoints
schematics

{{site.data.keyword.attribute-definition-list}}

Firewall access - allowed IP addresses

{: #allowed-ipaddresses}

Access to {{site.data.keyword.bpshort}} using IAM allowed IP addresses has been replaced with context based restrictions. {: note}

Performing post-configuration of deployed resources using workspace and action jobs requires IP network access to the resources private cloud network zones. Typically these private networks are protected using a firewall or VPC access control policies. To allow the {{site.data.keyword.bpshort}} hosted instances of Terraform and Ansible to access these zones, firewall or VPC access policies must be configured to permit access to the {{site.data.keyword.bpshort}} originating IP addresses.

Typically post-configuration is performed through SSH as illustrated with {{site.data.keyword.bpshort}} actions performing configuration operations over SSH using Ansible. With Ansible a bastion host must be configured to enable secure SSH access. Refer to the {{site.data.keyword.bpshort}} actions documentation for details of the required VPC network configuration and bastion host setup.

{{site.data.keyword.bpshort}} IP addresses

{: #ipaddresses}

The following tables document the public IP addresses used by {{site.data.keyword.bpshort}} that must be allowed access to private network resources to perform post-configuration.

At run time {{site.data.keyword.bpshort}} dynamically selects a worker node and region to execute the job. The job may run on any of the defined IP addresses within a geography. For instance in the US using any of the us-south and us-east IP addresses, or for Europe using any of the eu-gb or eu-de addresses. {: note}

Region Zone Public IP addresses Private IP addresses
EU Central fra02, fra04,fra05 149.81.123.64/27,149.81.135.64/28,
158.177.210.176/28,158.177.216.144/28,
161.156.138.80/28,159.122.111.224/27,
161.156.37.160/27
10.123.76.192/26,10.194.127.64/26,10.75.204.128/26
UK South lon04,lon05,lon06 158.175.106.64/27,158.175.138.176/28,
141.125.79.160/28,141.125.142.96/27,
158.176.111.64/27,158.176.134.80/28
10.45.215.128/26,
10.196.59.0/26,10.72.173.0/26
US wdc04,wdc06,wdc07 and dal10,dal12,dal13 169.45.235.176/28,169.55.82.128/27,
169.60.115.32/27,169.63.150.144/28,169.62.1.224/28,169.62.53.64/27 and 150.238.230.128/27,169.63.254.64/28,
169.47.104.160/28,169.61.191.64/27,
169.60.172.144/28,169.62.204.32/27
10.148.98.0/26,10.189.2.128/26,
10.190.16.128/26,10.191.181.64/26,
10.95.173.64/26,10.185.16.64/26,
10.220.38.64/26
{: caption="Region and supported public and private IPs" caption-side="bottom"}

You can collapse down the ranges into security group rules. For example, us-south and us-east as two security group rules like [169.45.235.176/28, 150.238.230.128/27]. For more information about creating security group rules, see IBM security group rules. {: note}