These docs are for Cribl Edge 4.1 and are no longer actively maintained.
See the latest version (4.13).
System Proxy Configuration on Linux
You can direct all outbound HTTP/S requests to go through proxy servers. You do so by setting a few environment variables before starting Cribl Edge, as follows:
Configure the HTTP_PROXY
and HTTPS_PROXY
environment variables, either with your proxy’s IP address, or with a DNS name that resolves to that IP address. Optionally, follow either convention with a colon and the port number to which you want to send queries.
HTTP_PROXY
examples:
$ export HTTP_PROXY=http://10.15.20.25:1234
$ export HTTP_PROXY=http://proxy.example.com:1234
HTTPS_PROXY
examples:
$ export HTTPS_PROXY=http://10.15.20.25:5678
$ export HTTPS_PROXY=http://proxy.example.com:5678
In the above examples, note that when you set an HTTPS_PROXY
environment variable, the referenced URL should generally be in http
format.
Restarts and Case Conflicts
Initial configuration of, and changes to, these variables require restarting Cribl Edge on the affected Nodes, if the application is already running when you apply the changes.
The environment variables’ names can be either uppercase or lowercase. However, if you set duplicate versions of the same name, the lowercase version takes precedence. For example, if you’ve set both
HTTPS_PROXY
andhttps_proxy
, the IP address specified inhttps_proxy
will take effect.
HTTP and/or HTTPS?
Several Cribl Edge endpoints rely on the HTTPS protocol – the Cribl telemetry endpoint, which must be accessed with some license types, as well as the CDN used to propagate application updates and certain documentation features (API Reference and docs PDFs).
You might configure certain other Cribl Edge features (such as REST API Collectors) that require access to HTTP endpoints. For maximum flexibility, consider setting environment variables to handle both the HTTPS and HTTP protocols.
Proxy Configuration with systemd
If you are proxying outbound traffic and starting Cribl Edge using systemd, add your proxy environment variables to the systemd override file (see Persisting Overrides). Add statements of this form:
[Service]
Environment=http_proxy=<yourproxy>
Environment=https_proxy=<yourproxy>
Environment=no_proxy=<no_proxy_list>
This will prevent Cribl Edge from throwing “failed to send anonymized telemetry metadata” errors.
Authenticating on Proxies
You can use HTTP Basic authentication on HTTP or HTTPS proxies. Specify the user name and password in the proxy URL. For example:
$ export HTTP_PROXY=http://username:password@proxy.example.com:1234
$ export HTTPS_PROXY=http://username:password@proxy.example.com:5678
Bypassing Proxies with NO_PROXY
If you’ve set the above environment variables, you can negate them for specified (or all) hosts. Set the NO_PROXY
environment variable to identify URLs that should bypass the proxy server, to instead be sent as direct requests. Use the following format:
$ export NO_PROXY="<list of hosts/domains>"
Cribl recommends including the Leader Node’s host name in the NO_PROXY
list.
NO_PROXY
Usage
Within the NO_PROXY
list, separate the host/domain names with commas or spaces.
Optionally, you can follow each host/domain entry with a port. If not specified, the protocol’s default port is assumed.
To match subdomains, you must either list them all in full (for example, NO_PROXY=foo.example.com,bar.example.com
),
or apply a wildcard by prefixing the domain name with a period or *.
: No_Proxy=".example.com
or No_Proxy="*.example.com
.
To match the whole domain including its subdomains, add it both with and without wildcard to the list:
No_Proxy="example.com,.example.com
.
To disable all proxies, use the *
wildcard: NO_PROXY="*"
.
NO_PROXY
with an empty list disables no proxies.
Cloud NO_PROXY
Usage
You must include any cloud metadata endpoints (such as the AWS Instance Metadata Service) in the NO_PROXY
list:
AWS EC2 and Azure VM instances must include
169.254.169.254
in the list. If using IPv6 on AWS EC2, addfd00:ec2::254
to the list.AWS ECS Fargate tasks must include
169.254.170.2
.GCP (Google Cloud Platform) VM instances must include
metadata.google.internal
and169.254.169.254
.
Where Proxies Apply
Proxy configuration is relevant to the following Cribl Edge components that make outbound HTTP/S requests:
Destinations
- S3 Compatible Stores
- AWS Kinesis Streams
- AWS CloudWatch Logs
- AWS SQS
- Azure Blob Storage
- Azure Monitor Logs
- Cribl HTTP
- CrowdStrike Falcon LogScale
- Elasticsearch
- Grafana Cloud
- Honeycomb
- Loki
- Prometheus
- Splunk HEC
- Webhook
Notification Targets
Testing Proxies
To initially test your proxy configuration, consider setting up a simple, free proxy server like mitmproxy (https://mitmproxy.org), and then monitoring traffic through that server. Verify that you can trace proxied requests from your Cribl Edge instance, and can validate that outgoing requests (to Destinations) are working properly.
Proxying Multiple Edge Instances in One Browser
Cribl Edge stores authentication tokens based on each http header’s URI scheme, host, and port information. Within a given browser, Cribl Edge enforces a same-origin policy to isolate instances.
This means that if you want to run multiple proxied Cribl Edge instances in one browser session, you must assign them different URI schemes, hosts, and/or ports. Otherwise, logging into an extra Cribl Edge instance will expire the prior instance’s session and log it out.
For example, assume that you’ve set up this pair of Apache proxy forward rules:
- https://web/cribla forwards to
cribl_hosta:8001/cribla
. - https://web/criblb forwards to
cribl_hostb:8001/criblb
.
These two proxied addresses cannot be run simultaneously in the same browser session. However, this pair – which lead with separate URI schemes – could:
- https://web/cribla forwards to
cribl_hosta:8001/cribla
. - https://web2/criblb forwards to
cribl_hostb:8001/criblb
.
Where separate instances must share URI formats, a workaround is to open the second instance in an incognito/private browsing window, or in a completely different browser.