Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Pass PROXY environment variables to nodes #275

Merged
merged 1 commit into from
Feb 9, 2019

Conversation

pablochacin
Copy link
Contributor

@pablochacin pablochacin commented Feb 6, 2019

Fixes #270

Pass the environment variables HTTP_PROXY/HTTPS_PROXY from the host environment to the nodes, so that the docker running on the node could download images when running behind a proxy (see issue #136)

Signed-off-by: Pablo Chacin [email protected]

@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label Feb 6, 2019
@k8s-ci-robot k8s-ci-robot added size/S Denotes a PR that changes 10-29 lines, ignoring generated files. needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. labels Feb 6, 2019
@k8s-ci-robot
Copy link
Contributor

Hi @pablochacin. Thanks for your PR.

I'm waiting for a kubernetes-sigs or kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Copy link
Contributor

@alejandrox1 alejandrox1 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Feb 6, 2019
Copy link
Member

@neolit123 neolit123 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

thanks for the PR @pablochacin

please change Implements issue #270 to Fixes #270
/priority important-longterm
/kind feature

pkg/cluster/nodes/create.go Show resolved Hide resolved
@k8s-ci-robot k8s-ci-robot added priority/important-longterm Important over the long term, but may not be staffed and/or may need multiple releases to complete. kind/feature Categorizes issue or PR as related to a new feature. labels Feb 6, 2019
@BenTheElder
Copy link
Member

/ok-to-test

@k8s-ci-robot k8s-ci-robot added ok-to-test Indicates a non-member PR verified by an org member that is safe to test. and removed needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. lgtm "Looks good to me", indicates that a PR is ready to be merged. labels Feb 7, 2019
Copy link
Member

@neolit123 neolit123 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

thanks for the update @pablochacin
please squash the commits. this looks good, unless @BenTheElder has comments?

@pablochacin
Copy link
Contributor Author

thanks for the update @pablochacin
please squash the commits. this looks good, unless @BenTheElder has comments?

Done

Copy link
Member

@tao12345666333 tao12345666333 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm

@BenTheElder
Copy link
Member

[I think netlify fails because it doesn't merge the branch into master before building, so this PR branch doesn't contain the netlify configs...]

Copy link
Member

@BenTheElder BenTheElder left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm
/approve
thank you!

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Feb 9, 2019
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: BenTheElder, pablochacin

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Feb 9, 2019
@BenTheElder BenTheElder merged commit a57ad6e into kubernetes-sigs:master Feb 9, 2019
@BenTheElder
Copy link
Member

[manual merge due to bogus netlify failures]

@unautre
Copy link

unautre commented Feb 11, 2019

Hello,
I am in a similar situation, with a corporate HTTP proxy for outside traffic. After re-installing kind to the latest version (after that merge), it works better.
There is still a problem though, in that kubernetes tries to access cluster-local URLs (172.17.0.2 in my case) through the proxy. Adding those URLs to the NO_PROXY helps kind create the cluster to completion.
Would it be feasible to automatically add local URLs to the NO_PROXY variable ?

Same problem a bit later, the cluster is started, but looking at the logs (kind export logs) it says repeatedly that it's trying to pull a docker image, and failing ; I guess the docker service (inside the container) is not configured to use the proxy.

Edit: after applying the proxy setting to the docker in the kind-control-plane container, the cluster is ready !
Looking at the patch to pass the proxy variables, I guess one could just mount a file in /etc/systemd/system/docker.service.d/http-proxy.conf containing the proxy configuration.

@BenTheElder
Copy link
Member

Would it be feasible to automatically add local URLs to the NO_PROXY variable ?

Yeah we could add the clusters IPs to this, it would take a bit of work to compute these.

It also looks like instead users can set https://docs.docker.com/network/proxy/#configure-the-docker-client on the host side before kind creates any clusters.

stg-0 added a commit to stg-0/kind that referenced this pull request Sep 8, 2023
…etes-sigs#275)

* Added rollout status to wait for keoscluster controller ready

* clean code

* added firstInstallation for secret keoscluster-registries

* clean code

* added firstInstalation validation

* Update pkg/cluster/internal/create/actions/createworker/createworker.go

Co-authored-by: stg <[email protected]>

---------

Co-authored-by: Francisco Augusto <[email protected]>
Co-authored-by: stg <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. kind/feature Categorizes issue or PR as related to a new feature. lgtm "Looks good to me", indicates that a PR is ready to be merged. ok-to-test Indicates a non-member PR verified by an org member that is safe to test. priority/important-longterm Important over the long term, but may not be staffed and/or may need multiple releases to complete. size/S Denotes a PR that changes 10-29 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

7 participants