Configure proxy settings for K8s¶
Canonical Kubernetes packages a number of utilities (eg curl, helm) which need to fetch resources they expect to find on the internet. In a constrained network environment, such access is usually controlled through proxies.
To set up a proxy using squid follow the How to install a Squid server tutorial.
Adding proxy configuration for the k8s snap¶
If necessary, create the snap.k8s.containerd.service.d
directory:
sudo mkdir -p /etc/systemd/system/snap.k8s.containerd.service.d
Note
It is important to add whatever address ranges are used by the
cluster itself to the NO_PROXY
and no_proxy
variables.
For example, assume we have a proxy running at http://squid.internal:3128
and
we are using the networks 10.0.0.0/8
,192.168.0.0/16
and 172.16.0.0/12
.
We would add the configuration to the
(/etc/systemd/system/snap.k8s.containerd.service.d/http-proxy.conf
) file:
# /etc/systemd/system/snap.k8s.containerd.service.d/http-proxy.conf
[Service]
Environment="HTTPS_PROXY=http://squid.internal:3128"
Environment="HTTP_PROXY=http://squid.internal:3128"
Environment="NO_PROXY=10.0.0.0/8,10.152.183.1,192.168.0.0/16,127.0.0.1,172.16.0.0/12"
Environment="https_proxy=http://squid.internal:3128"
Environment="http_proxy=http://squid.internal:3128"
Environment="no_proxy=10.0.0.0/8,10.152.183.1,192.168.0.0/16,127.0.0.1,172.16.0.0/12"
Note that you may need to restart for these settings to take effect.
Note
Include the CIDR 10.152.183.0/24 in both the
no_proxy
and NO_PROXY
environment variables, as it’s the default Kubernetes
service CIDR. If you are using a different service CIDR, update this setting
accordingly. This ensures pods can access the cluster’s Kubernetes API Server.
Also, include the default pod range (10.1.0.0/16) and any local networks
needed.
Adding proxy configuration for the k8s charms¶
Proxy configuration is handled by Juju when deploying the k8s
charms. Please
see the documentation for adding proxy configuration via Juju.