Kommander supports environments where access to the Internet is restricted, and must be made through an HTTP/HTTPS proxy.
In these environments, you must configure Kommander to use the HTTP/HTTPS proxy. In turn, Kommander configures all platform services to use the HTTP/HTTPS proxy.
HTTP_PROXY
: the HTTP proxy server addressHTTPS_PROXY
: the HTTPS proxy server addressNO_PROXY
: a list of IPs and domain names that are not subject to proxy settings
Prerequisites
In the examples below:
- The
curl
command-line tool is available on the host. - The proxy server address is
http://proxy.company.com:3128
. - The proxy server address uses the
http
scheme. - The proxy server can reach
www.google.com
using HTTP or HTTPS.
Verify the cluster nodes can access the Internet through the proxy server
On each cluster node, run:
curl --proxy http://proxy.company.com:3128 --head http://www.google.com
curl --proxy http://proxy.company.com:3128 --head https://www.google.com
If the proxy is working for HTTP and HTTPS, respectively, the curl
command returns a 200 OK
HTTP response.
Enable Gatekeeper
Gatekeeper acts as a Kubernetes mutating webhook. You can use this to mutate the Pod resources with HTTP_PROXY
, HTTPS_PROXY
and NO_PROXY
environment variables.
Kommander installs with the DKP CLI.
-
Create (if necessary) and update the Kommander installation configuration file. If one does not already exist, then create it using the following commands:
./dkp install kommander --init > install.yaml
-
Append the
apps
section ininstall.yaml
with the following values to enable Gatekeeper and configure it to add HTTP proxy settings to the pods.apps: gatekeeper: values: | disableMutation: false mutations: enablePodProxy: true podProxySettings: noProxy: "127.0.0.1,192.168.0.0/16,10.0.0.0/16,10.96.0.0/12,169.254.169.254,169.254.0.0/24,localhost,kubernetes,kubernetes.default,kubernetes.default.svc,kubernetes.default.svc.cluster,kubernetes.default.svc.cluster.local,.svc,.svc.cluster,.svc.cluster.local,.svc.cluster.local.,kubecost-prometheus-server.kommander,logging-operator-logging-fluentd.kommander.svc,elb.amazonaws.com" httpProxy: "http://proxy.company.com:3128" httpsProxy: "http://proxy.company.com:3128" excludeNamespacesFromProxy: [] namespaceSelectorForProxy: "gatekeeper.d2iq.com/mutate": "pod-proxy"
-
You can create the
kommander
andkommander-flux
namespaces, or the namespace where Kommander will be installed, and then label them so the Gatekeeper mutation is active on the namespaces.kubectl create namespace kommander kubectl label namespace kommander gatekeeper.d2iq.com/mutate=pod-proxy kubectl create namespace kommander-flux kubectl label namespace kommander-flux gatekeeper.d2iq.com/mutate=pod-proxy
-
Install Kommander using the above configuration file:
./dkp install kommander --installer-config ./install.yaml
Configure Workspace (or Project) in which you want to use proxy
To have Gatekeeper mutate the manifests, create the Workspace
(or Project
) with the following label:
labels:
gatekeeper.d2iq.com/mutate: "pod-proxy"
This can be done when creating the Workspace (or Project) from the UI OR by running the following command from the CLI once the namespace is created:
kubectl label namespace <NAMESPACE> "gatekeeper.d2iq.com/mutate=pod-proxy"
Configure attached clusters with proxy configuration
In order to ensure that Gatekeeper is deployed before everything else in the attached clusters, you must manually create the exact namespace of the workspace in which the cluster is going to be attached, before attaching the cluster:
Execute the following command in the attached cluster before attaching it to the host cluster:
kubectl create namespace <NAMESPACE>
Then, to configure the pods in this namespace to use proxy configuration, create the gatekeeper-overrides
configmap described in the next section before attaching the cluster to the host cluster. You must label the workspace with gatekeeper.d2iq.com/mutate=pod-proxy
when creating it so that Gatekeeper deploys a validatingwebhook
to mutate the pods with proxy configuration.
Create Gatekeeper configmap in Workspace namespace
To configure Gatekeeper such that these environment variables are mutated in the pods, create the following configmap in the target Workspace:
export NAMESPACE=<workspace-namespace>
cat << EOF | kubectl apply -f -
apiVersion: v1
kind: ConfigMap
metadata:
name: gatekeeper-overrides
namespace: ${NAMESPACE}
data:
values.yaml: |
---
# enable mutations
disableMutation: false
mutations:
enablePodProxy: true
podProxySettings:
noProxy: "127.0.0.1,192.168.0.0/16,10.0.0.0/16,10.96.0.0/12,169.254.169.254,169.254.0.0/24,localhost,kubernetes,kubernetes.default,kubernetes.default.svc,kubernetes.default.svc.cluster,kubernetes.default.svc.cluster.local,.svc,.svc.cluster,.svc.cluster.local,.svc.cluster.local.,kubecost-prometheus-server.kommander,logging-operator-logging-fluentd.kommander.svc,elb.amazonaws.com"
httpProxy: "http://proxy.company.com:3128"
httpsProxy: "http://proxy.company.com:3128"
excludeNamespacesFromProxy: []
namespaceSelectorForProxy:
"gatekeeper.d2iq.com/mutate": "pod-proxy"
EOF
Set the httpProxy
and httpsProxy
environment variables to the address of the HTTP and HTTPS proxy server, respectively. Set the noProxy
environment variable to the addresses that should be accessed directly, not through the proxy.
- Loopback addresses (
127.0.0.1
andlocalhost
) - Kubernetes API Server addresses
- Kubernetes Pod IPs (for example,
192.168.0.0/16
). This comes from two places:- Calico pod CIDR - Defaults to
192.168.0.0/16
- The
podSubnet
is configured in CAPI objects and needs to match above Calico's - Defaults to192.168.0.0/16
(same as above)
- Calico pod CIDR - Defaults to
- Kubernetes Service addresses (for example,
10.96.0.0/12
,kubernetes
,kubernetes.default
,kubernetes.default.svc
,kubernetes.default.svc.cluster
,kubernetes.default.svc.cluster.local
,.svc
,.svc.cluster
,.svc.cluster.local
,.svc.cluster.local.
) - Auto-IP addresses
169.254.169.254,169.254.0.0/24
- The default VPC CIDR range of
10.0.0.0/16
kube-apiserver
internal/external ELB address
Configure your applications
In a default installation with gatekeeper
enabled, you can have proxy environment variables applied to all your pods automatically by adding the following label to your namespace:
"gatekeeper.d2iq.com/mutate": "pod-proxy"
No further manual changes are required.
Manually configure your application
Some applications follow the convention of HTTP_PROXY
, HTTPS_PROXY
, and NO_PROXY
environment variables.
In this example, the environment variables are set for a container in a Pod:
apiVersion: v1
kind: Pod
spec:
containers:
- name: example-container
env:
- name: HTTP_PROXY
value: "http://proxy.company.com:3128"
- name: HTTPS_PROXY
value: "http://proxy.company.com:3128"
- name: NO_PROXY
value: "10.0.0.0/18,localhost,127.0.0.1,169.254.169.254,169.254.0.0/24,kubernetes.default,kubernetes.default.svc,kubernetes.default.svc.cluster,kubernetes.default.svc.cluster.local,.svc,.svc.cluster,.svc.cluster.local,.svc.cluster.local."
See Define Environment Variables for a Container for more details.