You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: networking/enable-cluster-wide-proxy.adoc
+46-7Lines changed: 46 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -8,32 +8,71 @@ toc::[]
8
8
9
9
Production environments can deny direct access to the internet and instead have an HTTP or HTTPS proxy available. You can configure {product-title} to use a proxy by xref:../networking/enable-cluster-wide-proxy.adoc#nw-proxy-configure-object_config-cluster-wide-proxy[modifying the Proxy object for existing clusters] or by configuring the proxy settings in the `install-config.yaml` file for new clusters.
10
10
11
-
== Prerequisites
11
+
After you enable a cluster-wide egress proxy for your cluster on a supported platform, {op-system-first} populates the `status.noProxy` parameter with the values of the `networking.machineNetwork[].cidr`, `networking.clusterNetwork[].cidr`, and `networking.serviceNetwork[]` fields from your `install-config.yaml` file that exists on the supported platform.
12
12
13
-
* Review the xref:../installing/install_config/configuring-firewall.adoc#configuring-firewall[sites that your cluster requires access to] and determine whether any of them must bypass the proxy. By default, all cluster system egress traffic is proxied, including calls to the cloud provider API for the cloud that hosts your cluster. System-wide proxy affects system components only, not user workloads. Add sites to the Proxy object's `spec.noProxy` field to bypass the proxy if necessary.
14
-
+
15
13
[NOTE]
16
14
====
17
-
The Proxy object `status.noProxy` field is populated with the values of the `networking.machineNetwork[].cidr`, `networking.clusterNetwork[].cidr`, and `networking.serviceNetwork[]` fields from your installation configuration with most installation types.
18
-
19
-
For installations on Amazon Web Services (AWS), Google Cloud Platform (GCP), Microsoft Azure, and {rh-openstack-first}, the `Proxy` object `status.noProxy` field is also populated with the instance metadata endpoint (`169.254.169.254`).
15
+
As a postinstallation task, you can change the `networking.clusterNetwork[].cidr` value, but not the `networking.machineNetwork[].cidr` and the `networking.serviceNetwork[]` values. For more information, see "Configuring the cluster network range".
20
16
====
21
-
+
17
+
18
+
For installations on {aws-first}, {gcp-first}, {azure-first}, and {rh-openstack-first}, the `status.noProxy` parameter is also populated with the instance metadata endpoint, `169.254.169.254`.
19
+
20
+
.Example of values added to the `status:` segment of a `Proxy` object by {op-system}
21
+
[source,yaml]
22
+
----
23
+
apiVersion: config.openshift.io/v1
24
+
kind: Proxy
25
+
metadata:
26
+
name: cluster
27
+
# ...
28
+
networking:
29
+
clusterNetwork: <1>
30
+
- cidr: <ip_address_from_cidr>
31
+
hostPrefix: 23
32
+
network type: OVNKubernetes
33
+
machineNetwork: <2>
34
+
- cidr: <ip_address_from_cidr>
35
+
serviceNetwork: <3>
36
+
- 172.30.0.0/16
37
+
# ...
38
+
status:
39
+
noProxy:
40
+
- localhost
41
+
- .cluster.local
42
+
- .svc
43
+
- 127.0.0.1
44
+
- <api_server_internal_url> <4>
45
+
# ...
46
+
----
47
+
<1> Specify IP address blocks from which pod IP addresses are allocated. The default value is `10.128.0.0/14` with a host prefix of `/23`.
48
+
<2> Specify the IP address blocks for machines. The default value is `10.0.0.0/16`.
49
+
<3> Specify IP address block for services. The default value is `172.30.0.0/16`.
50
+
<4> You can find the URL of the internal API server by running the `oc get infrastructures.config.openshift.io cluster -o jsonpath='{.status.etcdDiscoveryDomain}'` command.
51
+
22
52
[IMPORTANT]
23
53
====
24
54
If your installation type does not include setting the `networking.machineNetwork[].cidr` field, you must include the machine IP addresses manually in the `.status.noProxy` field to make sure that the traffic between nodes can bypass the proxy.
25
55
====
26
56
57
+
[id="prerequisites_cluster-wide-proxy"]
58
+
== Prerequisites
59
+
60
+
Review the xref:../installing/install_config/configuring-firewall.adoc#configuring-firewall[sites that your cluster requires access to] and determine whether any of them must bypass the proxy. By default, all cluster system egress traffic is proxied, including calls to the cloud provider API for the cloud that hosts your cluster. The system-wide proxy affects system components only, not user workloads. If necessary, add sites to the `spec.noProxy` parameter of the `Proxy` object to bypass the proxy.
0 commit comments