Charm Workshop: Writing Charms for Restrictive Networks

Tags: Juju

This article was last updated 7 years ago.


In an ideal world your systems can reach any internet resource for whatever they need for deployment. However the real world is different, and many production networks have proxies or other restricted network policies that make writing charms challenging.

In this charm school Matt Bruzek highlights some of the methods you can use to make your charm usable in places where you might not have access to the general internet.

Talk to us today

Interested in running Ubuntu in your organisation?

Newsletter signup

Get the latest Ubuntu news and updates in your inbox.

By submitting this form, I confirm that I have read and agree to Canonical's Privacy Policy.

Related posts

Cut data center energy costs with bare metal automation

Data centers don’t have to be power-hungry monsters. With smart automation using tools like MAAS, you can reduce energy waste and operational costs, and make...

The hitchhiker’s guide to infrastructure modernization

One of my favourite authors, Douglas Adams, once said that “we are stuck with technology when what we really want is just stuff that works.” Whilst Adams is...

Effortless observability for Django applications

Observability is critical for web operations to ensure that the application is working as expected and to identify any potential issues. However, setting up...