IBM Cloud Docs
Firewall access - allowed IP addresses

Firewall access - allowed IP addresses

Access to Schematics using IAM allowed IP addresses has been replaced with context based restrictions.

Performing post-configuration of deployed resources using workspace and action jobs requires IP network access to the resources private cloud network zones. Typically these private networks are protected using a firewall or VPC access control policies. To allow the Schematics hosted instances of Terraform and Ansible to access these zones, firewall or VPC access policies must be configured to permit access to the Schematics originating IP addresses.

Typically post-configuration is performed through SSH as illustrated with Schematics actions performing configuration operations over SSH using Ansible. With Ansible a bastion host must be configured to enable secure SSH access. Refer to the Schematics actions documentation for details of the required VPC network configuration and bastion host setup.

Schematics IP addresses

The following tables document the public IP addresses used by Schematics that must be allowed access to private network resources to perform post-configuration.

At run time Schematics dynamically selects a worker node and region to execute the job. The job may run on any of the defined IP addresses within a geography. For instance in the US using any of the us-south and us-east IP addresses, or for Europe using any of the eu-gb or eu-de addresses.

Region and supported public and private IPs
Region Zone Public IP addresses Private IP addresses
EU Central fra02, fra04,fra05 149.81.123.64/27,149.81.135.64/28,
158.177.210.176/28,158.177.216.144/28,
161.156.138.80/28,159.122.111.224/27,
161.156.37.160/27
10.123.76.192/26,10.194.127.64/26,10.75.204.128/26
UK South lon04,lon05,lon06 158.175.106.64/27,158.175.138.176/28,
141.125.79.160/28,141.125.142.96/27,
158.176.111.64/27,158.176.134.80/28
10.45.215.128/26,
10.196.59.0/26,10.72.173.0/26
US wdc04,wdc06,wdc07 and dal10,dal12,dal13 169.45.235.176/28,169.55.82.128/27,
169.60.115.32/27,169.63.150.144/28,169.62.1.224/28,169.62.53.64/27 and 150.238.230.128/27,169.63.254.64/28,
169.47.104.160/28,169.61.191.64/27,
169.60.172.144/28,169.62.204.32/27
10.148.98.0/26,10.189.2.128/26,
10.190.16.128/26,10.191.181.64/26,
10.95.173.64/26,10.185.16.64/26,
10.220.38.64/26

You can collapse down the ranges into security group rules. For example, us-south and us-east as two security group rules like [169.45.235.176/28, 150.238.230.128/27]. For more information about creating security group rules, see IBM security group rules.