apiVersion: config.openshift.io/v1
kind: Proxy
metadata:
name: cluster
spec:
trustedCA:
name: ""
status:
Production environments can deny direct access to the internet and instead have an HTTP or HTTPS proxy available. You can configure OKD to use a proxy by modifying the Proxy object for existing clusters or by configuring the proxy settings in the install-config.yaml
file for new clusters.
Review the sites that your cluster requires access to and determine whether any of them must bypass the proxy. By default, all cluster system egress traffic is proxied, including calls to the cloud provider API for the cloud that hosts your cluster. System-wide proxy affects system components only, not user workloads. Add sites to the Proxy object’s spec.noProxy
field to bypass the proxy if necessary.
The Proxy object For installations on Amazon Web Services (AWS), Google Cloud Platform (GCP), Microsoft Azure, and OpenStack, the |
The Proxy
object is used to manage the cluster-wide egress proxy. When a cluster is installed or upgraded without the proxy configured, a Proxy
object is still generated but it will have a nil spec
. For example:
apiVersion: config.openshift.io/v1
kind: Proxy
metadata:
name: cluster
spec:
trustedCA:
name: ""
status:
A cluster administrator can configure the proxy for OKD by modifying this cluster
Proxy
object.
Only the |
Cluster administrator permissions
OKD oc
CLI tool installed
Create a config map that contains any additional CA certificates required for proxying HTTPS connections.
You can skip this step if the proxy’s identity certificate is signed by an authority from the RHCOS trust bundle. |
Create a file called user-ca-bundle.yaml
with the following contents, and provide the values of your PEM-encoded certificates:
apiVersion: v1
data:
ca-bundle.crt: | (1)
<MY_PEM_ENCODED_CERTS> (2)
kind: configmap
metadata:
name: user-ca-bundle (3)
namespace: openshift-config (4)
1 | This data key must be named ca-bundle.crt . |
2 | One or more PEM-encoded X.509 certificates used to sign the proxy’s identity certificate. |
3 | The config map name that will be referenced from the Proxy object. |
4 | The config map must be in the openshift-config namespace. |
Create the config map from this file:
$ oc create -f user-ca-bundle.yaml
Use the oc edit
command to modify the Proxy
object:
$ oc edit proxy/cluster
Configure the necessary fields for the proxy:
apiVersion: config.openshift.io/v1
kind: Proxy
metadata:
name: cluster
spec:
httpProxy: http://<username>:<pswd>@<ip>:<port> (1)
httpsProxy: https://<username>:<pswd>@<ip>:<port> (2)
noProxy: example.com (3)
readinessEndpoints:
- http://www.google.com (4)
- https://www.google.com
trustedCA:
name: user-ca-bundle (5)
1 | A proxy URL to use for creating HTTP connections outside the cluster. The URL scheme must be http . |
2 | A proxy URL to use for creating HTTPS connections outside the cluster. The URL scheme must be either http or https . Specify a URL for the proxy that supports the URL scheme. For example, most proxies will report an error if they are configured to use https but they only support http . This failure message may not propagate to the logs and can appear to be a network connection failure instead. If using a proxy that listens for https connections from the cluster, you may need to configure the cluster to accept the CAs and certificates that the proxy uses. |
3 | A comma-separated list of destination domain names, domains, IP addresses or other network CIDRs to exclude proxying.
Preface a domain with This field is ignored if neither the |
4 | One or more URLs external to the cluster to use to perform a readiness check before writing the httpProxy and httpsProxy values to status. |
5 | A reference to the config map in the openshift-config namespace that contains additional CA certificates required for proxying HTTPS connections. Note that the config map must already exist before referencing it here. This field is required unless the proxy’s identity certificate is signed by an authority from the RHCOS trust bundle. |
Save the file to apply the changes.
The cluster
Proxy object cannot be deleted. To remove the proxy from a cluster,
remove all spec
fields from the Proxy object.
Cluster administrator permissions
OKD oc
CLI tool installed
Use the oc edit
command to modify the proxy:
$ oc edit proxy/cluster
Remove all spec
fields from the Proxy object. For example:
apiVersion: config.openshift.io/v1
kind: Proxy
metadata:
name: cluster
spec: {}
Save the file to apply the changes.