copyright | lastupdated | keywords | subcollection | ||
---|---|---|---|---|---|
|
2025-01-20 |
schematics locations, schematics regions, schematics zones, schematics endpoints, schematics service endpoints |
schematics |
{{site.data.keyword.attribute-definition-list}}
{: #allowed-ipaddresses}
Access to {{site.data.keyword.bpshort}} using IAM allowed IP addresses has been replaced with context based restrictions. {: note}
Performing post-configuration of deployed resources using workspace and action jobs requires IP network access to the resources private cloud network zones. Typically these private networks are protected using a firewall or VPC access control policies. To allow the {{site.data.keyword.bpshort}} hosted instances of Terraform and Ansible to access these zones, firewall or VPC access policies must be configured to permit access to the {{site.data.keyword.bpshort}} originating IP addresses.
Typically post-configuration is performed through SSH as illustrated with {{site.data.keyword.bpshort}} actions performing configuration operations over SSH using Ansible. With Ansible a bastion host must be configured to enable secure SSH access. Refer to the {{site.data.keyword.bpshort}} actions documentation for details of the required VPC network configuration and bastion host setup.
{: #ipaddresses}
The following tables document the public IP addresses used by {{site.data.keyword.bpshort}} that must be allowed access to private network resources to perform post-configuration.
At run time {{site.data.keyword.bpshort}} dynamically selects a worker node and region to execute the job. The job may run on any of the defined IP addresses within a geography. For instance in the US using any of the us-south and us-east IP addresses, or for Europe using any of the eu-gb
or eu-de
addresses.
{: note}
Region | Zone | Public IP addresses | Private IP addresses |
---|---|---|---|
EU Central |
fra02 , fra04 ,fra05 |
149.81.123.64/27 ,149.81.135.64/28 ,158.177.210.176/28 ,158.177.216.144/28 ,161.156.138.80/28 ,159.122.111.224/27 ,161.156.37.160/27 |
10.123.76.192/26 ,10.194.127.64/26 ,10.75.204.128/26 |
UK South |
lon04 ,lon05 ,lon06 |
158.175.106.64/27 ,158.175.138.176/28 ,141.125.79.160/28 ,141.125.142.96/27 ,158.176.111.64/27 ,158.176.134.80/28 |
10.45.215.128/26 ,10.196.59.0/26 ,10.72.173.0/26 |
US |
wdc04 ,wdc06 ,wdc07 and dal10 ,dal12 ,dal13 |
169.45.235.176/28 ,169.55.82.128/27 ,169.60.115.32/27 ,169.63.150.144/28 ,169.62.1.224/28 ,169.62.53.64/27 and 150.238.230.128/27 ,169.63.254.64/28 ,169.47.104.160/28 ,169.61.191.64/27 ,169.60.172.144/28 ,169.62.204.32/27 |
10.148.98.0/26 ,10.189.2.128/26 ,10.190.16.128/26 ,10.191.181.64/26 ,10.95.173.64/26 ,10.185.16.64/26 ,10.220.38.64/26 |
{: caption="Region and supported public and private IPs" caption-side="bottom"} |
You can collapse down the ranges into security group rules. For example, us-south
and us-east
as two security group rules like [169.45.235.176/28, 150.238.230.128/27]
. For more information about creating security group rules, see IBM security group rules.
{: note}