Configure a forward proxy
For security reasons, it is possible that an Edge site has to connect cloud services via a forward HTTP proxy. Complete steps 1-3 to update proxy.properties before installing the Edge site.
If you use a forward proxy that decrypts TLS traffic, a so-called man-in-the-middle (MITM) proxy, complete all 4 steps to configure the forward proxy and enable the MITM proxy.
Warning MITM proxy is only supported for S3 integration.
Steps
- Download the Edge site installer:
- Open an Edge site.
-
On the main menu, click
, and then click
Settings.
The Settings page opens. -
Click Edge.
The Edge sites overview appears. - Click the name of an Edge site in the Edge site overview.
The Edge site page appears.
-
On the main menu, click
- In the Installer and properties files section, click Download.
- Depending on your operating system and browser, follow the regular steps for downloading files.
The installer file is a TGZ archive that contains the files proxy.properties, properties.yaml and registries.yaml.Note If you download an installer, all previously downloaded installers become invalid.
- Open an Edge site.
- Open the proxy.properties file.
- Uncomment and update the outbound-proxy properties by removing "#" at the beginning of the following lines:
- Proxy configuration K3S
- Proxy configuration EKS
#noProxy=<host IP addresses>,<host DNS names>,<k8s-svc-ip-addresses>,<k8s-pod-ip-addresses,<others> #proxyHost=<proxy domain name or IP address>
#proxyPort=<proxy-port> #proxyUsername=<proxy username> #proxyPassword=<proxy password>Setting
Value
noProxy A comma-separated list of IP or DNS addresses that can bypass the proxy server.
This list must include at least the Kubernetes cluster's internal IP addresses and the Kubernetes nodes' IP and DNS addresses.
The list may not contain spaces.
Tip To get the values for this setting, you can use the edge-get-noproxy.sh script, which you can find in the extracted installer directory under /resources/tools. However, make sure that your network administrator reviews these values.
where:
- <host-ip-addresses>: for example
172.20.0.0/16. - <host-dns-names>: for example
*.compute.internal. - <k8s-svc-ip-addresses>: is by default
10.43.0.0/16, but this can differ for other k8s flavors or configurations. - <k8s-pod-ip-addresses>: is by default
10.42.0.0/16, but this can differ for other k8s flavors or configurations. - <others>: other IP addresses that don't need to be proxied. Add at least
169.254.169.254.for AWS.
Example
noProxy=172.20.0.0/16,*.compute.internal,10.43.0.0/16,10.42.0.0/16,169.254.169.254proxyHost The IP or DNS address of the proxy server.
Example
proxyHost=site4-proxy.shared.edge.collibra.devproxyPort The TCP port of the proxy server. This value must be a quoted string and not an integer value.
Example
proxyPort=3128proxyUsername The username to authenticate at the proxy server.
Example
proxyUsername=edgeNote Usernames with single quotations ', double quotations ", and backslashes \ need to be escaped using an additional backslash. For example, if the username is ge'smith\, it would need to be entered into proxy.properties as username: ge\'smith\\.
proxyPassword The password to authenticate at the proxy server.
Example
proxyPassword=la;fs90jpo4j3rR%Note Passwords with single quotations ', double quotations ", and backslashes \ need to be escaped using an additional backslash. For example, if the password is te"st\1234', it would need to be entered into proxy.properties as password: te\"st\\1234\'.
#noProxy=<host IP addresses>,<host DNS names>,<k8s-svc-ip-addresses>,<k8s-pod-ip-addresses,<others> #proxyHost=<proxy domain name or IP address>
#proxyPort=<proxy-port> #proxyUsername=<proxy username> #proxyPassword=<proxy password>Setting
Value
noProxy A comma-separated list of IP or DNS addresses that can bypass the proxy server.
This list must include at least the Kubernetes cluster's internal IP addresses and the Kubernetes nodes' IP and DNS addresses.
The list may not contain spaces.
Tip To get the values for this setting, you can use the edge-get-noproxy.sh script. However, make sure that your network administrator reviews these values.
where:
- <host-ip-addresses>: for example
172.20.0.0/16. - <host-dns-names>: for example
*.compute.internal. - <k8s-svc-ip-addresses>: depends on your EKS installation. Typically this is
10.100.0.0/16or172.20.0.0/16. - <k8s-pod-ip-addresses>: depends on your EKS installation. Typically they are the same subnets as in the VPC, for example
172.20.0.0/16. - <others>: other IP addresses that don't need to be proxied, for EKS, always add
169.254.169.254..
Example
noProxy=172.20.0.0/16,*.compute.internal,10.100.0.0/16,169.254.169.254proxyHost The IP or DNS address of the proxy server.
Example
proxyHost=site4-proxy.shared.edge.collibra.devproxyPort The TCP port of the proxy server. This value must be a quoted string and not an integer value.
Example
proxyPort=3128proxyUsername The username to authenticate at the proxy server.
Example
proxyUsername=edgeNote Usernames with single quotations ', double quotations ", and backslashes \ need to be escaped using an additional backslash. For example, if my username is ge'smith\, it would need to be entered into proxy.properties as username:ge\'smith\\.
proxyPassword The password to authenticate at the proxy server.
Example
proxyPassword=la;fs90jpo4j3rR%Note Passwords with single quotations ', double quotations ", and backslashes \ need to be escaped using an additional backslash. For example, if my password is te"st\1234', it would need to be entered into proxy.properties as password: te\"st\\1234\'.
Important When you add a new node to a cluster, review and update, if necessary, the noProxy and implicitly forward proxy settings, unless the subnet used for nodes and their DNS suffix are added to noProxy.
- To enable Edge via a MITM proxy (a forward proxy that decrypts TLS traffic), follow the steps below:
Note On-the-fly TLS certificates that are generated by the MITM proxy must use the subjectAltName (SAN) extension.
- Export your proxy server's CA certificate in PEM format.
- When using your own ca.pem file be sure to only include the certificate or certificate chain of the MITM proxy. A custom ca.pem file cannot exceed 100kb.
- Save this certificate as ca.pem in the same directory as the Edge site installer.
Note If you save the certificate in another directory, use the
--caargument in the Edge site installation command.
- Export your proxy server's CA certificate in PEM format.
What's next?
Install the Edge site.
If you want to update the forward proxy afterwards, you can use the update script.