Charm Workshop: Writing Charms for Restrictive Networks

Tags: Juju

This article was last updated 7 year s ago.


In an ideal world your systems can reach any internet resource for whatever they need for deployment. However the real world is different, and many production networks have proxies or other restricted network policies that make writing charms challenging.

In this charm school Matt Bruzek highlights some of the methods you can use to make your charm usable in places where you might not have access to the general internet.

Talk to us today

Interested in running Ubuntu in your organisation?

Newsletter signup

Get the latest Ubuntu news and updates in your inbox.

By submitting this form, I confirm that I have read and agree to Canonical's Privacy Policy.

Related posts

Effortless observability for Django applications

Observability is critical for web operations to ensure that the application is working as expected and to identify any potential issues. However, setting up...

How we used Flask and 12-factor charms to simplify Canonical.com development

Learn how Canonical is using Python Flask and the 12-factor charm framework to simplify the development of Canonical.com and Ubuntu.com

Canonical and OpenAirInterface to collaborate on open source telecom network infrastructure

Canonical is excited to announce that we are collaborating with OpenAirInterface (OAI) to drive the development and promotion of open source software for open...