Charm Workshop: Writing Charms for Restrictive Networks

Tags: Juju

This article was last updated 7 year s ago.


In an ideal world your systems can reach any internet resource for whatever they need for deployment. However the real world is different, and many production networks have proxies or other restricted network policies that make writing charms challenging.

In this charm school Matt Bruzek highlights some of the methods you can use to make your charm usable in places where you might not have access to the general internet.

Talk to us today

Interested in running Ubuntu in your organisation?

Newsletter signup

Get the latest Ubuntu news and updates in your inbox.

By submitting this form, I confirm that I have read and agree to Canonical's Privacy Policy.

Related posts

The hitchhiker’s guide to infrastructure modernization

One of my favourite authors, Douglas Adams, once said that “we are stuck with technology when what we really want is just stuff that works.” Whilst Adams is...

Effortless observability for Django applications

Observability is critical for web operations to ensure that the application is working as expected and to identify any potential issues. However, setting up...

How we used Flask and 12-factor charms to simplify Canonical.com development

Learn how Canonical is using Python Flask and the 12-factor charm framework to simplify the development of Canonical.com and Ubuntu.com