Charm Workshop: Writing Charms for Restrictive Networks

Tags: Juju

In an ideal world your systems can reach any internet resource for whatever they need for deployment. However the real world is different, and many production networks have proxies or other restricted network policies that make writing charms challenging.

In this charm school Matt Bruzek highlights some of the methods you can use to make your charm usable in places where you might not have access to the general internet.

Ubuntu cloud

Ubuntu offers all the training, software infrastructure, tools, services and support you need for your public and private clouds.

Newsletter signup

Select topics you’re
interested in

In submitting this form, I confirm that I have read and agree to Canonical’s Privacy Notice and Privacy Policy.

Related posts

Infrastructure-as-Code mistakes and how to avoid them

Two industry trends point to a gap in DevOps tooling chosen by many. Operations teams need more than an Infrastructure-as-Code approach, but a complete...

Data Ops at petabyte scale

Should you deploy Apache Spark to Kubernetes? Learn how model-driven operations have enabled one data engineering team to evaluate several options and come to...

Juju 2.7: Enhanced k8s experience, improved networking and more

Canonical is proud to announce the availability of Juju 2.7. This new release introduces a range of exciting features and several improvements which enhance...