Skip to content

Commit 7a77bc8

Browse files
committed
OCPBUGS-38353: Added a missing example to the Configuring the cluster-wide proxy doc
1 parent 6013c48 commit 7a77bc8

File tree

1 file changed

+46
-7
lines changed

1 file changed

+46
-7
lines changed

networking/enable-cluster-wide-proxy.adoc

Lines changed: 46 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,32 +8,71 @@ toc::[]
88

99
Production environments can deny direct access to the internet and instead have an HTTP or HTTPS proxy available. You can configure {product-title} to use a proxy by xref:../networking/enable-cluster-wide-proxy.adoc#nw-proxy-configure-object_config-cluster-wide-proxy[modifying the Proxy object for existing clusters] or by configuring the proxy settings in the `install-config.yaml` file for new clusters.
1010

11-
== Prerequisites
11+
After you enable a cluster-wide egress proxy for your cluster on a supported platform, {op-system-first} populates the `status.noProxy` parameter with the values of the `networking.machineNetwork[].cidr`, `networking.clusterNetwork[].cidr`, and `networking.serviceNetwork[]` fields from your `install-config.yaml` file that exists on the supported platform.
1212

13-
* Review the xref:../installing/install_config/configuring-firewall.adoc#configuring-firewall[sites that your cluster requires access to] and determine whether any of them must bypass the proxy. By default, all cluster system egress traffic is proxied, including calls to the cloud provider API for the cloud that hosts your cluster. System-wide proxy affects system components only, not user workloads. Add sites to the Proxy object's `spec.noProxy` field to bypass the proxy if necessary.
14-
+
1513
[NOTE]
1614
====
17-
The Proxy object `status.noProxy` field is populated with the values of the `networking.machineNetwork[].cidr`, `networking.clusterNetwork[].cidr`, and `networking.serviceNetwork[]` fields from your installation configuration with most installation types.
18-
19-
For installations on Amazon Web Services (AWS), Google Cloud Platform (GCP), Microsoft Azure, and {rh-openstack-first}, the `Proxy` object `status.noProxy` field is also populated with the instance metadata endpoint (`169.254.169.254`).
15+
As a postinstallation task, you can change the `networking.clusterNetwork[].cidr` value, but not the `networking.machineNetwork[].cidr` and the `networking.serviceNetwork[]` values. For more information, see "Configuring the cluster network range".
2016
====
21-
+
17+
18+
For installations on {aws-first}, {gcp-first}, {azure-first}, and {rh-openstack-first}, the `status.noProxy` parameter is also populated with the instance metadata endpoint, `169.254.169.254`.
19+
20+
.Example of values added to the `status:` segment of a `Proxy` object by {op-system}
21+
[source,yaml]
22+
----
23+
apiVersion: config.openshift.io/v1
24+
kind: Proxy
25+
metadata:
26+
name: cluster
27+
# ...
28+
networking:
29+
clusterNetwork: <1>
30+
- cidr: <ip_address_from_cidr>
31+
hostPrefix: 23
32+
network type: OVNKubernetes
33+
machineNetwork: <2>
34+
- cidr: <ip_address_from_cidr>
35+
serviceNetwork: <3>
36+
- 172.30.0.0/16
37+
# ...
38+
status:
39+
noProxy:
40+
- localhost
41+
- .cluster.local
42+
- .svc
43+
- 127.0.0.1
44+
- <api_server_internal_url> <4>
45+
# ...
46+
----
47+
<1> Specify IP address blocks from which pod IP addresses are allocated. The default value is `10.128.0.0/14` with a host prefix of `/23`.
48+
<2> Specify the IP address blocks for machines. The default value is `10.0.0.0/16`.
49+
<3> Specify IP address block for services. The default value is `172.30.0.0/16`.
50+
<4> You can find the URL of the internal API server by running the `oc get infrastructures.config.openshift.io cluster -o jsonpath='{.status.etcdDiscoveryDomain}'` command.
51+
2252
[IMPORTANT]
2353
====
2454
If your installation type does not include setting the `networking.machineNetwork[].cidr` field, you must include the machine IP addresses manually in the `.status.noProxy` field to make sure that the traffic between nodes can bypass the proxy.
2555
====
2656

57+
[id="prerequisites_cluster-wide-proxy"]
58+
== Prerequisites
59+
60+
Review the xref:../installing/install_config/configuring-firewall.adoc#configuring-firewall[sites that your cluster requires access to] and determine whether any of them must bypass the proxy. By default, all cluster system egress traffic is proxied, including calls to the cloud provider API for the cloud that hosts your cluster. The system-wide proxy affects system components only, not user workloads. If necessary, add sites to the `spec.noProxy` parameter of the `Proxy` object to bypass the proxy.
61+
62+
// Enabling the cluster-wide proxy
2763
include::modules/nw-proxy-configure-object.adoc[leveloffset=+1]
2864

65+
// Removing the cluster-wide proxy
2966
include::modules/nw-proxy-remove.adoc[leveloffset=+1]
3067

68+
// Verifying the cluster-wide proxy configuration
3169
include::modules/nw-verify-proxy-configuration.adoc[leveloffset=+1]
3270

3371
[discrete]
3472
[role="_additional-resources"]
3573
== Additional resources
3674

75+
* xref:../networking/configuring-cluster-network-range.adoc#configuring-cluster-network-range[Configuring the cluster network range]
3776
* xref:../security/certificates/updating-ca-bundle.adoc#ca-bundle-understanding_updating-ca-bundle[Understanding the CA Bundle certificate]
3877
* xref:../security/certificate_types_descriptions/proxy-certificates.adoc#customization[Proxy certificates]
3978
* link:https://access.redhat.com/solutions/7065528[How is the cluster-wide proxy setting applied to {product-title} nodes?]

0 commit comments

Comments
 (0)