Merge pull request #454 from sajayantony/main
Move pages to main branch
This commit is contained in:
Коммит
c4cf981231
|
@ -3,7 +3,7 @@ name: GH-Page Publish
|
|||
on:
|
||||
push:
|
||||
branches:
|
||||
- master
|
||||
- main
|
||||
- test-pages
|
||||
|
||||
jobs:
|
||||
|
|
|
@ -28,7 +28,7 @@ module.exports = {
|
|||
{
|
||||
title: 'Tasks',
|
||||
collapsible: true,
|
||||
children: ['/tasks/container-registry-tasks-overview', '/tasks/run-as-deployment/', '/tasks/agentpool']
|
||||
children: ['/tasks/container-registry-tasks-overview', '/tasks/run-as-deployment/', '/tasks/agentpool/']
|
||||
},
|
||||
{
|
||||
title: 'Authentication',
|
||||
|
@ -40,13 +40,8 @@ module.exports = {
|
|||
title: 'Integration',
|
||||
collapsable: true,
|
||||
sidebarDepth : 1,
|
||||
children : ['/integration/change-analysis/', ]
|
||||
},
|
||||
{
|
||||
title: 'Encryption',
|
||||
collapsable: true,
|
||||
children: ['/CMK/'],
|
||||
},
|
||||
children : ['/integration/change-analysis/']
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
|
|
|
@ -1,134 +0,0 @@
|
|||
# Azure Container Registry: Dedicated Data Endpoints – Mitigating Data Exfiltration
|
||||
|
||||
Azure Container Registry announces dedicated data-endpoints, enabling tightly scoped client firewall rules to specific registries, minimizing data exfiltration concerns.
|
||||
|
||||
Pulling content from a registry involves two endpoints:
|
||||
|
||||
- **Registry endpoint**, often refereed as the *login url*, used for authentication and content discovery.
|
||||
A command like `docker pull contoso.azurecr.io/hello-world` makes a REST request which authenticates and negotiates the layers which represent the requested artifact.
|
||||
- **Data-endpoints** serve blobs representing content layers.
|
||||
|
||||
<img src="./dedicated-data-endpoints/registry-dual-endpoints.png" width=500x>
|
||||
|
||||
## Registry Managed Storage Accounts
|
||||
|
||||
Azure Container Registry is a multi-tenant service, where the data-endpoint storage accounts are managed by the registry service. There are many benefits for managed storage, such as load balancing, contentious content splitting, multiple copies for higher concurrent content delivery, and multi-region support with [geo-replication](https://aka.ms/acr/geo-replicatin).
|
||||
|
||||
## Azure Private Link VNet Support
|
||||
|
||||
Azure Container Registry recently announced [Private Link support](https://aka.ms/acr/privatelink), enabling private endpoints from Azure VNets to be placed on the managed registry service. In this case, both the registry and data-endpoints are accessible from within the VNet, using private IPs.
|
||||
|
||||
The public endpoint can then be removed, securing the managed registry and storage accounts to access from within the VNet.
|
||||
|
||||
<img src="./dedicated-data-endpoints/registry-private-link.png" width=500x>
|
||||
|
||||
Unfortunately, VNet connectivity isn’t always an option.
|
||||
|
||||
## Client Firewall Rules & Data Exfiltration Risks
|
||||
|
||||
When connecting to a registry from on-prem hosts, IoT devices, custom build agents, or when Private Link may not be an option, client firewall rules may be applied, limiting access to specific resources.
|
||||
|
||||
<img src="./dedicated-data-endpoints/registry-client-rules-all-storage.png" width=500x>
|
||||
|
||||
As customers locked down their client firewall configurations, they realized they must create a rule with a wildcard for all storage accounts, raising concerns for data-exfiltration. A bad actor could deploy code that would be capable of writing to their storage account.
|
||||
|
||||
To mitigate data-exfiltration concerns, Azure Container Registry is making dedicated data-endpoints available.
|
||||
|
||||
<img src="./dedicated-data-endpoints/registry-data-exfiltration.png" width=500x>
|
||||
|
||||
## Dedicated Data-endpoints
|
||||
|
||||
When dedicated data-endpoints are enabled, layers are retrieved from the Azure Container Registry service, with fully qualified domain names representing the registry domain. As any registry may become geo-replicated, a regional pattern is used:
|
||||
|
||||
**[registry]**`.`**[region]**`.data.azurecr.io`.
|
||||
|
||||
For the Contoso example, multiple regional data-endpoints are added supporting the local region with a nearby replica.
|
||||
|
||||
With dedicated data-endpoints, the bad actor is blocked from writing to other storage accounts.
|
||||
|
||||
<img src="./dedicated-data-endpoints/registry-dedicated-data-endpoint.png" width=500x>
|
||||
|
||||
## Enabling Dedicated Data-endpoints
|
||||
|
||||
**Note:** Switching to dedicated data-endpoints will impact clients that have configured firewall access to the existing `*.blob.core.windows.net` endpoints, causing pull failures. To assure clients have consistent access, add the new data-endpoints to the client firewall rules. Once completed, existing registries can enable dedicated data-endpoints through the `az cli`, or the Azure portal.
|
||||
|
||||
### Private Preview Configuration
|
||||
|
||||
Until the Portal and az cli are enabled, customers can use the `az rest` api to enable dedicated data-endpoints.
|
||||
|
||||
- Set the registry default
|
||||
|
||||
```sh
|
||||
az configure --defaults acr=demo42
|
||||
```
|
||||
|
||||
- Export the resource id of the registry
|
||||
|
||||
```sh
|
||||
export RESOURCE_ID=$(az acr show --query id -o tsv)
|
||||
```
|
||||
|
||||
- Execute the REST api with the `az rest` command
|
||||
|
||||
```sh
|
||||
az rest --method patch --uri "$RESOURCE_ID?api-version=2019-12-01-preview" --body "{ \"properties\":{\"dataEndpointEnabled\":true}}" -o json
|
||||
```
|
||||
|
||||
Look for:
|
||||
|
||||
```json
|
||||
"dataEndpointEnabled": true,
|
||||
"dataEndpointHostNames": [
|
||||
"demo42.eastus.data.azurecr.io",
|
||||
"demo42.westus.data.azurecr.io"
|
||||
```
|
||||
|
||||
### az CLI
|
||||
|
||||
Using [az cli](https://docs.microsoft.com/en-us/cli/azure/install-azure-cli?view=azure-cli-latest) version 2.4.0 or greater, run the [az acr update](https://docs.microsoft.com/en-us/cli/azure/acr?view=azure-cli-latest#az-acr-update) command:
|
||||
|
||||
```sh
|
||||
az acr update --name contoso --data-endpoint-enabled
|
||||
```
|
||||
|
||||
To view the data-endpoints, including regional endpoints for geo-replicated registries, use the az acr show-endpoints cli:
|
||||
|
||||
```sh
|
||||
az acr show-endpoints --name contoso
|
||||
```
|
||||
|
||||
outputs:
|
||||
|
||||
```json
|
||||
{
|
||||
"loginServer": "contoso.azurecr.io",
|
||||
"dataEndpoints": [
|
||||
{
|
||||
"region": "eastus",
|
||||
"endpoint": "contoso.eastus.data.azurecr.io",
|
||||
},
|
||||
{
|
||||
"region": "westus",
|
||||
"endpoint": "contoso.westus.data.azurecr.io",
|
||||
}
|
||||
]
|
||||
}
|
||||
```
|
||||
|
||||
### Azure Portal
|
||||
|
||||
> **NOTE**: The acr portal update `--data-endpoint-enabled` has not yet been released. Please use [Private Preview Configuration](#private-preview-configuration). This content will be updated when the portal is updated.
|
||||
|
||||
Within the Azure Portal, select the Networking topic. Then, select the Data-endpoints tab to enable **dedicated data-endpoints**.
|
||||
|
||||
<img src="./dedicated-data-endpoints/portal-dedicated-data-endpoints.png" width=700x>
|
||||
|
||||
## Summary
|
||||
|
||||
[Private Link](https://aka.ms/acr/privatelink) is the most secure way to control network access between clients and the registry as network traffic is limited to the Azure network, using private IPs. When Private Link isn’t an option, dedicated data-endpoints can provide secure knowledge in what resources are accessible from each client.
|
||||
|
||||
## Pricing
|
||||
|
||||
Dedicated data-endpoints are a feature of premium registries.
|
||||
|
||||
For more [information on dedicated data-endpoints](https://aka.ms/acr/dedicated-data-endpoints).
|
|
@ -1,134 +0,0 @@
|
|||
# Azure Container Registry: Dedicated Data Endpoints – Mitigating Data Exfiltration
|
||||
|
||||
Azure Container Registry announces dedicated data-endpoints, enabling tightly scoped client firewall rules to specific registries, minimizing data exfiltration concerns.
|
||||
|
||||
Pulling content from a registry involves two endpionts:
|
||||
|
||||
- **Registry endpoint**, often refereed as the *login url*, used for authentication and content discovery.
|
||||
A command like `docker pull contoso.azurecr.io/hello-world` makes a REST request which authenticates and negotiates the layers which represent the requested artifact.
|
||||
- **Data-endpoints** serve blobs representing content layers.
|
||||
|
||||
<img src="./media/registry-dual-endpoints.png" width=500x>
|
||||
|
||||
## Registry Managed Storage Accounts
|
||||
|
||||
Azure Container Registry is a multi-tenant service, where the data-endpoint storage accounts are managed by the registry service. There are many benefits for managed storage, such as load balancing, contentious content splitting, multiple copies for higher concurrent content delivery, and multi-region support with [geo-replication](https://aka.ms/acr/geo-replicatin).
|
||||
|
||||
## Azure Private Link VNet Support
|
||||
|
||||
Azure Container Registry recently announced [Private Link support](https://aka.ms/acr/privatelink), enabling private endpoints from Azure VNets to be placed on the managed registry service. In this case, both the registry and data-endpoints are accessible from within the VNet, using private IPs.
|
||||
|
||||
The public endpoint can then be removed, securing the managed registry and storage accounts to access from within the VNet.
|
||||
|
||||
<img src="./media/registry-private-link.png" width=500x>
|
||||
|
||||
Unfortunately, VNet connectivity isn’t always an option.
|
||||
|
||||
## Client Firewall Rules & Data Exfiltration Risks
|
||||
|
||||
When connecting to a registry from on-prem hosts, IoT devices, custom build agents, or when Private Link may not be an option, client firewall rules may be applied, limiting access to specific resources.
|
||||
|
||||
<img src="./media/registry-client-rules-all-storage.png" width=500x>
|
||||
|
||||
As customers locked down their client firewall configurations, they realized they must create a rule with a wildcard for all storage accounts, raising concerns for data-exfiltration. A bad actor could deploy code that would be capable of writing to their storage account.
|
||||
|
||||
To mitigate data-exfiltration concerns, Azure Container Registry is making dedicated data-endpoints available.
|
||||
|
||||
<img src="./media/registry-data-exfiltration.png" width=500x>
|
||||
|
||||
## Dedicated Data-endpoints
|
||||
|
||||
When dedicated data-endpoints are enabled, layers are retrieved from the Azure Container Registry service, with fully qualified domain names representing the registry domain. As any registry may become geo-replicated, a regional pattern is used:
|
||||
|
||||
**[registry]**`.`**[region]**`.data.azurecr.io`.
|
||||
|
||||
For the Contoso example, multiple regional data-endpoints are added supporting the local region with a nearby replica.
|
||||
|
||||
With dedicated data-endpoints, the bad actor is blocked from writing to other storage accounts.
|
||||
|
||||
<img src="./media/registry-dedicated-data-endpoint.png" width=500x>
|
||||
|
||||
## Enabling Dedicated Data-endpoints
|
||||
|
||||
**Note:** Switching to dedicated data-endpoints will impact clients that have configured firewall access to the existing `*.blob.core.windows.net` endpoints, causing pull failures. To assure clients have consistent access, add the new data-endpoints to the client firewall rules. Once completed, existing registries can enable dedicated data-endpoints through the `az cli`, or the Azure portal.
|
||||
|
||||
### Private Preview Configuration
|
||||
|
||||
Until the Portal and az cli are enabled, customers can use the `az rest` api to enable dedicated data-endpoints.
|
||||
|
||||
- Set the registry default
|
||||
|
||||
```sh
|
||||
az configure --defaults acr=demo42
|
||||
```
|
||||
|
||||
- Export the resource id of the registry
|
||||
|
||||
```sh
|
||||
export RESOURCE_ID=$(az acr show --query id -o tsv)
|
||||
```
|
||||
|
||||
- Execute the REST api with the `az rest` command
|
||||
|
||||
```sh
|
||||
az rest --method patch --uri "$RESOURCE_ID?api-version=2019-12-01-preview" --body "{ \"properties\":{\"dataEndpointEnabled\":true}}" -o json
|
||||
```
|
||||
|
||||
Look for:
|
||||
|
||||
```json
|
||||
"dataEndpointEnabled": true,
|
||||
"dataEndpointHostNames": [
|
||||
"demo42.eastus.data.azurecr.io",
|
||||
"demo42.westus.data.azurecr.io"
|
||||
```
|
||||
|
||||
### az CLI
|
||||
|
||||
Using [az cli](https://docs.microsoft.com/en-us/cli/azure/install-azure-cli?view=azure-cli-latest) version 2.4.0 or greater, run the [az acr update](https://docs.microsoft.com/en-us/cli/azure/acr?view=azure-cli-latest#az-acr-update) command:
|
||||
|
||||
```sh
|
||||
az acr update --name contoso --data-endpoint-enabled
|
||||
```
|
||||
|
||||
To view the data-endpoints, including regional endpoints for geo-replicated registries, use the az acr show-endpoints cli:
|
||||
|
||||
```sh
|
||||
az acr show-endpoints --name contoso
|
||||
```
|
||||
|
||||
outputs:
|
||||
|
||||
```json
|
||||
{
|
||||
"loginServer": "contoso.azurecr.io",
|
||||
"dataEndpoints": [
|
||||
{
|
||||
"region": "eastus",
|
||||
"endpoint": "contoso.eastus.data.azurecr.io",
|
||||
},
|
||||
{
|
||||
"region": "westus",
|
||||
"endpoint": "contoso.westus.data.azurecr.io",
|
||||
}
|
||||
]
|
||||
}
|
||||
```
|
||||
|
||||
### Azure Portal
|
||||
|
||||
> **NOTE**: The acr portal update `--data-endpoint-enabled` has not yet been released. Please use [Private Preview Configuration](#private-preview-configuration). This content will be updated when the portal is updated.
|
||||
>
|
||||
Within the Azure Portal, select the Networking topic. Then, select the Data-endpoints tab to enable **dedicated data-endpoints**.
|
||||
|
||||
<img src="./media/portal-dedicated-data-endpoints.png" width=700x>
|
||||
|
||||
## Summary
|
||||
|
||||
[Private Link](https://aka.ms/acr/privatelink) is the most secure way to control network access between clients and the registry as network traffic is limited to the Azure network, using private IPs. When Private Link isn’t an option, dedicated data-endpoints can provide secure knowledge in what resources are accessible from each client.
|
||||
|
||||
## Pricing
|
||||
|
||||
Dedicated data-endpoints are a feature of premium registries.
|
||||
|
||||
For more [information on dedicated data-endpoints](https://aka.ms/acr/dedicated-data-endpoints).
|
Двоичный файл не отображается.
До Ширина: | Высота: | Размер: 79 KiB |
Двоичный файл не отображается.
До Ширина: | Высота: | Размер: 65 KiB |
Двоичный файл не отображается.
До Ширина: | Высота: | Размер: 94 KiB |
Двоичный файл не отображается.
До Ширина: | Высота: | Размер: 87 KiB |
Двоичные данные
docs/dedicated-data-endpoints/media/registry-dual-endpoints.png
Двоичные данные
docs/dedicated-data-endpoints/media/registry-dual-endpoints.png
Двоичный файл не отображается.
До Ширина: | Высота: | Размер: 45 KiB |
Двоичные данные
docs/dedicated-data-endpoints/media/registry-private-link.png
Двоичные данные
docs/dedicated-data-endpoints/media/registry-private-link.png
Двоичный файл не отображается.
До Ширина: | Высота: | Размер: 44 KiB |
|
@ -1,3 +1,7 @@
|
|||
---
|
||||
title: Agent Pools
|
||||
---
|
||||
|
||||
# Running ACR Tasks on Dedicated Agent Pools
|
||||
|
||||
## Introduction
|
||||
|
|
|
@ -6,9 +6,9 @@ title: Deploy with ARM templates
|
|||
|
||||
The following set of samples show how to use an ARM template to execute various Task workflows.
|
||||
|
||||
1. [Deploy a docker build on an existing registry](https://github.com/Azure/acr/tree/master/docs/tasks/run-as-deployment/quickdockerbuild-on-existing-registry)
|
||||
1. [Deploy a docker build on an existing registry using identity and keyvault](https://github.com/Azure/acr/tree/master/docs/tasks/run-as-deployment/quickdockerbuildusingidentitykeyvault)
|
||||
1. [Create a Registry and perform a docker build from a GitHub repository](https://github.com/Azure/acr/tree/master/docs/tasks/run-as-deployment/quickdockerbuild)
|
||||
1. [Create a Registry and perform a docker build from a GitHub repository with a Managed Identity](https://github.com/Azure/acr/tree/master/docs/tasks/run-as-deployment/quickdockerbuild)
|
||||
1. [Create a registry and schedule a quick task with task definition as an argument](https://github.com/Azure/acr/tree/master/docs/tasks/run-as-deployment/quickrun)
|
||||
1. [Create a registry and schedule a predefined task](https://github.com/Azure/acr/tree/master/docs/tasks/run-as-deployment/taskrun)
|
||||
1. [Deploy a docker build on an existing registry](https://github.com/Azure/acr/tree/main/docs/tasks/run-as-deployment/quickdockerbuild-on-existing-registry)
|
||||
1. [Deploy a docker build on an existing registry using identity and keyvault](https://github.com/Azure/acr/tree/main/docs/tasks/run-as-deployment/quickdockerbuildusingidentitykeyvault)
|
||||
1. [Create a Registry and perform a docker build from a GitHub repository](https://github.com/Azure/acr/tree/main/docs/tasks/run-as-deployment/quickdockerbuild)
|
||||
1. [Create a Registry and perform a docker build from a GitHub repository with a Managed Identity](https://github.com/Azure/acr/tree/main/docs/tasks/run-as-deployment/quickdockerbuild)
|
||||
1. [Create a registry and schedule a quick task with task definition as an argument](https://github.com/Azure/acr/tree/main/docs/tasks/run-as-deployment/quickrun)
|
||||
1. [Create a registry and schedule a predefined task](https://github.com/Azure/acr/tree/main/docs/tasks/run-as-deployment/taskrun)
|
Загрузка…
Ссылка в новой задаче