Skip to content

Commit dfe7429

Browse files
authored
Merge pull request #60226 from EricPonvelle/OSDOCS-3864_No-Proxy
OSDOCS-3864 - Added the "no-proxy" parameter to cluster-wide proxy
2 parents f04f407 + 393ab7f commit dfe7429

File tree

2 files changed

+23
-3
lines changed

2 files changed

+23
-3
lines changed

modules/configuring-a-proxy-after-installation-cli.adoc

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,17 +30,27 @@ $ rosa edit cluster \
3030
--cluster $CLUSTER_NAME \
3131
--additional-trust-bundle-file <path_to_ca_bundle_file> \ <1> <2> <3>
3232
--http-proxy http://<username>:<password>@<ip>:<port> \ <1> <4>
33-
--https-proxy http(s)://<username>:<password>@<ip>:<port> <1> <4>
33+
--https-proxy https://<username>:<password>@<ip>:<port> \ <1> <4>
34+
--no-proxy example.com <5>
3435
----
36+
+
37+
--
3538
<1> The `additional-trust-bundle-file`, `http-proxy`, and `https-proxy` arguments are all optional.
3639
<2> If you use the `additional-trust-bundle-file` argument without an `http-proxy` or `https-proxy` argument, the trust bundle is added to the trust store and used to verify cluster system egress traffic. In that scenario, the bundle is not configured to be used with a proxy.
3740
<3> The `additional-trust-bundle-file` argument is a file path pointing to a bundle of PEM-encoded X.509 certificates, which are all concatenated together. The `additionalTrustBundle` parameter is required unless the identity certificate of the proxy is signed by an authority from the {op-system} trust bundle. If you use an MITM transparent proxy network that does not require additional proxy configuration but requires additional CAs, you must provide the MITM CA certificate.
38-
<4> The `http-proxy` and `https-proxy` arguments must point to a valid URL.
3941
+
4042
[NOTE]
4143
====
4244
You should not attempt to change the proxy or additional trust bundle configuration on the cluster directly. These changes must be applied by using the ROSA CLI (`rosa`) or {cluster-manager-first}. Any changes that are made directly to the cluster will be reverted automatically.
4345
====
46+
<4> The `http-proxy` and `https-proxy` arguments must point to a valid URL.
47+
<5> A comma-separated list of destination domain names, IP addresses, or network CIDRs to exclude proxying.
48+
+
49+
Preface a domain with `.` to match subdomains only. For example, `.y.com` matches `x.y.com`, but not `y.com`. Use `*` to bypass proxy for all destinations.
50+
If you scale up workers that are not included in the network defined by the `networking.machineNetwork[].cidr` field from the installation configuration, you must add them to this list to prevent connection issues.
51+
+
52+
This field is ignored if neither the `httpProxy` or `httpsProxy` fields are set.
53+
--
4454
4555
.Verification
4656

modules/configuring-a-proxy-during-installation-cli.adoc

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,9 +24,19 @@ $ rosa create cluster \
2424
<other_arguments_here> \
2525
--additional-trust-bundle-file <path_to_ca_bundle_file> \ <1> <2> <3>
2626
--http-proxy http://<username>:<password>@<ip>:<port> \ <1> <4>
27-
--https-proxy http(s)://<username>:<password>@<ip>:<port> <1> <4>
27+
--https-proxy https://<username>:<password>@<ip>:<port> \ <1> <4>
28+
--no-proxy example.com <5>
2829
----
30+
+
31+
--
2932
<1> The `additional-trust-bundle-file`, `http-proxy`, and `https-proxy` arguments are all optional.
3033
<2> If you use the `additional-trust-bundle-file` argument without an `http-proxy` or `https-proxy` argument, the trust bundle is added to the trust store and used to verify cluster system egress traffic. In that scenario, the bundle is not configured to be used with a proxy.
3134
<3> The `additional-trust-bundle-file` argument is a file path pointing to a bundle of PEM-encoded X.509 certificates, which are all concatenated together. The `additionalTrustBundle` parameter is required unless the identity certificate of the proxy is signed by an authority from the {op-system} trust bundle. If you use an MITM transparent proxy network that does not require additional proxy configuration but requires additional CAs, you must provide the MITM CA certificate.
3235
<4> The `http-proxy` and `https-proxy` arguments must point to a valid URL.
36+
<5> A comma-separated list of destination domain names, IP addresses, or network CIDRs to exclude proxying.
37+
+
38+
Preface a domain with `.` to match subdomains only. For example, `.y.com` matches `x.y.com`, but not `y.com`. Use `*` to bypass proxy for all destinations.
39+
If you scale up workers that are not included in the network defined by the `networking.machineNetwork[].cidr` field from the installation configuration, you must add them to this list to prevent connection issues.
40+
+
41+
This field is ignored if neither the `httpProxy` or `httpsProxy` fields are set.
42+
--

0 commit comments

Comments
 (0)