Charm Workshop: Writing Charms for Restrictive Networks

Tags: Juju

This article was last updated 7 years ago.


In an ideal world your systems can reach any internet resource for whatever they need for deployment. However the real world is different, and many production networks have proxies or other restricted network policies that make writing charms challenging.

In this charm school Matt Bruzek highlights some of the methods you can use to make your charm usable in places where you might not have access to the general internet.

Talk to us today

Interested in running Ubuntu in your organisation?

Newsletter signup

Get the latest Ubuntu news and updates in your inbox.

By submitting this form, I confirm that I have read and agree to Canonical's Privacy Policy.

Related posts

Deploy your Spring Boot application to production

In this article we walk through the steps required to deploy a Spring Boot application to production using Juju and Kubernetes. The goal is to showcase the...

Cut data center energy costs with bare metal automation

Data centers don’t have to be power-hungry monsters. With smart automation using tools like MAAS, you can reduce energy waste and operational costs, and make...

The hitchhiker’s guide to infrastructure modernization

One of my favourite authors, Douglas Adams, once said that “we are stuck with technology when what we really want is just stuff that works.” Whilst Adams is...