Configuring the cluster-wide proxy
Review the and determine whether any of them must bypass the proxy. By default, all cluster system egress traffic is proxied, including calls to the cloud provider API for the cloud that hosts your cluster. System-wide proxy affects system components only, not user workloads. Add sites to the Proxy object’s
spec.noProxy
field to bypass the proxy if necessary.
The Proxy
object is used to manage the cluster-wide egress proxy. When a cluster is installed or upgraded without the proxy configured, a Proxy
object is still generated but it will have a nil spec
. For example:
A cluster administrator can configure the proxy for OKD by modifying this cluster
Proxy
object.
Prerequisites
Cluster administrator permissions
OKD
oc
CLI tool installed
Create a config map that contains any additional CA certificates required for proxying HTTPS connections.
Create a file called
user-ca-bundle.yaml
with the following contents, and provide the values of your PEM-encoded certificates:data:
ca-bundle.crt: | (1)
<MY_PEM_ENCODED_CERTS> (2)
kind: ConfigMap
metadata:
name: user-ca-bundle (3)
namespace: openshift-config (4)
Create the config map from this file:
Use the
oc edit
command to modify theProxy
object:Configure the necessary fields for the proxy:
Save the file to apply the changes.
Prerequisites
Cluster administrator permissions
OKD
oc
CLI tool installed
Procedure
Use the
oc edit
command to modify the proxy:$ oc edit proxy/cluster
Remove all fields from the Proxy object. For example:
Save the file to apply the changes.