Configure an external proxy (Helm)
For CARTO Self-hosted using Kubernetes and Helm
Last updated
Was this helpful?
For CARTO Self-hosted using Kubernetes and Helm
Last updated
Was this helpful?
This documentation only applies to advanced Orchestrated container deployments using Kubernetes and Helm
CARTO Self-hosted supports operating behind an HTTP or HTTPS proxy. The proxy acts as a gateway, enabling CARTO Self-hosted components to establish connections with essential external services like CARTO licensing system, or auth.carto.com
. You can find detailed information about these components and services in the network requirements section.
CARTO Self-hosted does not provide or install any proxy component; It's built to connect to an existing proxy software deployed on your side.
A comprehensive list of domains that must be whitelisted by the proxy for the proper operation of CARTO Self-hosted can be found here. Such list includes domains for the core services of CARTO Self-hosted, as well as some optional domains that should be enabled to access specific features.
In order to configure an external HTTP proxy on your CARTO Self-hosted installation, you'll have to:
Add the following lines in your customizations.yaml file:
The externalProxy.excludedDomains
property contains a comma-separated list of domains to exclude from proxying. The .svc.cluster.local
domain must be in the list to allow internal communication between components within your cluster.
Please, take into account that if you're configuring an external proxy in a CARTO Self-Hosted installation running in GKE with Workload Identity configured, you'll have to add the following excluded domains:
169.254.169.254,metadata,metadata.google.internal
These domains are required when authenticating the requests performed from an installation using Workload Identity.
To configure an HTTPS proxy on CARTO Self-hosted, you'll have to change the following configuration:
Add the following lines in your customizations.yaml file:
externalProxy.excludedDomains
: obtains a comma-separated list of domains to exclude from proxying. The .svc.cluster.local
domain must be in the list to allow internal communication between components.
externalProxy.sslRejectUnauthorized
(optional): Specify if CARTO Self-hosted should check if the proxy certificate is valid or not. For instance, self-signed certificates validation must be skipped.
externalProxy.sslCA
(optional): Path to the proxy CA certificate. If the proxy certificate is signed by a custom CA, such CA must be included here, but if it's signed by a well known CA, there is no need to add it here. Well known CAs are usually part of the ca-certificates package.
Please, take into account that if you're configuring an external proxy in a CARTO Self-Hosted installation running in GKE with Workload Identity configured, you'll have to add the following excluded domains:
169.254.169.254,metadata,metadata.google.internal
These domains are required when authenticating the requests performed from an installation using Workload Identity.
While certain data warehouses can be configured to work with a proxy, there are some providers that will inherently bypass it. This means that the connection to these data warehouses won't be created through the proxy, so CARTO Self-hosted services will try to directly perform requests to the providers.
BigQuery: It supports both HTTP and HTTPs proxy.
PostgreSQL and Redshift: They use a TCP connection instead of HTTP(S), so the proxy is bypassed.
Databricks: Proxy is not supported, so the HTTPS connection will be bypassed.
Snowflake: It supports HTTP proxy, but HTTPS is not supported and will have to be bypassed. In order to bypass it, you'll have to add snowflakecomputing.com
to the list of excluded domains.
When the proxy is bypassed, and you have a restrictive network policy in place, you will need to explicitly allow this egress of non-proxied traffic.
The following configuration just applies for orchestrated container deployments of CARTO Self-Hosted, so if you're using the Single VM deployment this section must be skipped.
When no network policy is enforced, all outgoing traffic that does not pass through a proxy will be permitted.
In restrictive environments, it is indispensable to maintain strict control over connections made by CARTO Self-hosted components. To achieve this, you should configure your proxy to allow only approved external services (whitelisting), while blocking any other outgoing traffic that does not go through the proxy.
To accomplish this, you can apply a custom network policy, such as the one provided in this example:
Password authentication is not supported for the proxy connection.
Importing data using an HTTPS Proxy configured with a certificate signed by a Custom CA is not supported.