Outbound requests from the Phacility cluster should originate from a stable address range and users should have access to this from the console so they can write IP-based access control rules as part of their access control policies.
For example:
- if you use Harbormaster to drive an external build system like Jenkins, you should be able to whitelist Phacility origin addresses as part of your access control strategy.
- if you use Drydock to interface with external hosts, you should be able to use firewall rules to restrict access to Phacility origins.