You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
= Prerequisites for configuring a cluster-wide proxy
8
8
9
-
To configure a cluster-wide proxy, you must meet the following requirements. These requirements are valid for both fresh installation and post installation proxy configuration.
9
+
To configure a cluster-wide proxy, you must meet the following requirements. These requirements are valid when you configure a proxy during installation or post-installation.
* You have added the `ec2.<region>.amazonaws.com`, `elasticloadbalancing.<region>.amazonaws.com`, and `s3.<region>.amazonaws.com` endpoints to your virtual private cloud (VPC) endpoint. These endpoints are required to complete requests from the nodes to the AWS EC2 API. Because the proxy works on the container level, not the node level, you must route these requests to the AWS EC2 API through the AWS private network. Adding the public IP address of the EC2 API to your allowlist in your proxy server is not sufficient.
17
17
ifdef::openshift-rosa[]
18
-
* You have the `rosa` CLI installed and configured.
19
-
endif::[]
18
+
* You have an existing Virtual Private Cloud (VPC) for your cluster.
19
+
endif::openshift-rosa[]
20
20
ifdef::openshift-dedicated[]
21
-
* You must have a Customer Cloud Subscription (CCS) cluster with a VPC that the proxy can access.
22
-
* You have the `ocm` CLI installed and configured.
23
-
endif::[]
21
+
* You have an existing Virtual Private Cloud (VPC) for your cluster.
22
+
* You are using the Customer Cloud Subscription (CCS) model for your cluster.
23
+
endif::openshift-dedicated[]
24
+
* The proxy can access the VPC for the cluster and the private subnets of the VPC. The proxy is also accessible from the VPC for the cluster and from the private subnets of the VPC.
25
+
* You have added the `ec2.<region>.amazonaws.com`, `elasticloadbalancing.<region>.amazonaws.com`, and `s3.<region>.amazonaws.com` endpoints to your VPC endpoint. These endpoints are required to complete requests from the nodes to the AWS EC2 API. Because the proxy works at the container level and not at the node level, you must route these requests to the AWS EC2 API through the AWS private network. Adding the public IP address of the EC2 API to your allowlist in your proxy server is not enough.
* If your proxy re-encyrpts egress traffic, you must create exclusions to the domain and port combinations. The following table offers guidance into these exceptions.
29
-
** Allowlist the following OpenShift URLs for re-encryption.
32
+
+
33
+
--
34
+
** Add the following OpenShift URLs to your allowlist for re-encryption.
30
35
+
31
36
[cols="6,1,6",options="header"]
32
37
|===
@@ -40,7 +45,7 @@ endif::[]
40
45
|The https://cloud.redhat.com/openshift site uses authentication from sso.redhat.com to download the cluster pull secret and use Red Hat SaaS solutions to facilitate monitoring of your subscriptions, cluster inventory, and chargeback reporting.
41
46
|===
42
47
+
43
-
** Allowlist the following site reliability engineering (SRE) and management URLs for re-encryption.
48
+
** Add the following site reliability engineering (SRE) and management URLs to your allowlist for re-encryption.
44
49
+
45
50
[cols="6,1,6",options="header"]
46
51
|===
@@ -70,3 +75,11 @@ endif::[]
70
75
|https/443
71
76
|Used by the splunk-forwarder-operator as a log forwarding endpoint to be used by Red Hat SRE for log-based alerting.
72
77
|===
78
+
--
79
+
+
80
+
[IMPORTANT]
81
+
====
82
+
The use of a proxy server to perform TLS re-encryption is currently not supported if the server is acting as a transparent forward proxy where it is not configured on-cluster via the `--http-proxy` or `--https-proxy` arguments.
83
+
84
+
A transparent forward proxy intercepts the cluster traffic, but it is not actually configured on the cluster itself.
= Configuring a proxy after installation using the CLI
8
+
9
+
You can use the {product-title} (ROSA) CLI (`rosa`) to add a cluster-wide proxy configuration to an existing ROSA cluster in a Virtual Private Cloud (VPC).
10
+
11
+
You can also use `rosa` to update an existing cluster-wide proxy configuration. For example, you might need to update the network address for the proxy or replace the additional trust bundle if any of the certificate authorities for the proxy expire.
12
+
13
+
[IMPORTANT]
14
+
====
15
+
The cluster applies the proxy configuration to the control plane and compute nodes. While applying the configuration, each cluster node is temporarily placed in an unschedulable state and drained of its workloads. Each node is restarted as part of the process.
16
+
====
17
+
18
+
.Prerequisites
19
+
20
+
* You have installed and configured the latest ROSA (`rosa`) and OpenShift (`oc`) CLIs on your installation host.
21
+
* You have a ROSA cluster that is deployed in a VPC.
22
+
23
+
.Procedure
24
+
25
+
* Edit the cluster configuration to add or update the cluster-wide proxy details:
<1> The `additional-trust-bundle-file`, `http-proxy`, and `https-proxy` arguments are all optional.
36
+
<2> If you use the `additional-trust-bundle-file` argument without an `http-proxy` or `https-proxy` argument, the trust bundle is added to the trust store and used to verify cluster system egress traffic. In that scenario, the bundle is not configured to be used with a proxy.
37
+
<3> The `additional-trust-bundle-file` argument is a file path pointing to a bundle of PEM-encoded X.509 certificates, which are all concatenated together. The `additionalTrustBundle` parameter is required unless the identity certificate of the proxy is signed by an authority from the {op-system} trust bundle. If you use an MITM transparent proxy network that does not require additional proxy configuration but requires additional CAs, you must provide the MITM CA certificate.
38
+
<4> The `http-proxy` and `https-proxy` arguments must point to a valid URL.
39
+
+
40
+
[NOTE]
41
+
====
42
+
You should not attempt to change the proxy or additional trust bundle configuration on the cluster directly. These changes must be applied by using the ROSA CLI (`rosa`) or {cluster-manager-first}. Any changes that are made directly to the cluster will be reverted automatically.
43
+
====
44
+
45
+
.Verification
46
+
47
+
. List the status of the machine config pools and verify that they are updated:
48
+
+
49
+
[source,terminal]
50
+
----
51
+
$ oc get machineconfigpools
52
+
----
53
+
+
54
+
.Example output
55
+
[source,terminal]
56
+
----
57
+
NAME CONFIG UPDATED UPDATING DEGRADED MACHINECOUNT READYMACHINECOUNT UPDATEDMACHINECOUNT DEGRADEDMACHINECOUNT AGE
0 commit comments