<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Minikube%3A_Proxy_dan_VPN</id>
	<title>Minikube: Proxy dan VPN - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Minikube%3A_Proxy_dan_VPN"/>
	<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=Minikube:_Proxy_dan_VPN&amp;action=history"/>
	<updated>2026-04-07T15:30:43Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.4</generator>
	<entry>
		<id>https://onnocenter.or.id/wiki/index.php?title=Minikube:_Proxy_dan_VPN&amp;diff=68665&amp;oldid=prev</id>
		<title>Onnowpurbo: Created page with &quot;Sumber: https://minikube.sigs.k8s.io/docs/handbook/vpn_and_proxy/   Proxies and VPNs How to use minikube with a VPN or HTTP/HTTPS Proxy minikube requires access to the interne...&quot;</title>
		<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=Minikube:_Proxy_dan_VPN&amp;diff=68665&amp;oldid=prev"/>
		<updated>2023-05-06T01:25:56Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;Sumber: https://minikube.sigs.k8s.io/docs/handbook/vpn_and_proxy/   Proxies and VPNs How to use minikube with a VPN or HTTP/HTTPS Proxy minikube requires access to the interne...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Sumber: https://minikube.sigs.k8s.io/docs/handbook/vpn_and_proxy/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Proxies and VPNs&lt;br /&gt;
How to use minikube with a VPN or HTTP/HTTPS Proxy&lt;br /&gt;
minikube requires access to the internet via HTTP, HTTPS, and DNS protocols.&lt;br /&gt;
&lt;br /&gt;
Proxy&lt;br /&gt;
If a HTTP proxy is required to access the internet, you may need to pass the proxy connection information to both minikube and Docker using environment variables:&lt;br /&gt;
&lt;br /&gt;
HTTP_PROXY - The URL to your HTTP proxy&lt;br /&gt;
HTTPS_PROXY - The URL to your HTTPS proxy&lt;br /&gt;
NO_PROXY - A comma-separated list of hosts which should not go through the proxy.&lt;br /&gt;
The NO_PROXY variable here is important: Without setting it, minikube may not be able to access resources within the VM. minikube uses four default IP ranges, which should not go through the proxy:&lt;br /&gt;
&lt;br /&gt;
192.168.59.0/24: Used by the minikube VM. Configurable for some hypervisors via --host-only-cidr&lt;br /&gt;
192.168.39.0/24: Used by the minikube kvm2 driver.&lt;br /&gt;
192.168.49.0/24: Used by the minikube docker driver’s first cluster.&lt;br /&gt;
10.96.0.0/12: Used by service cluster IP’s. Configurable via --service-cluster-ip-range&lt;br /&gt;
One important note: If NO_PROXY is required by non-Kubernetes applications, such as Firefox or Chrome, you may want to specifically add the minikube IP to the comma-separated list, as they may not understand IP ranges (#3827).&lt;br /&gt;
&lt;br /&gt;
Example Usage&lt;br /&gt;
macOS and Linux&lt;br /&gt;
export HTTP_PROXY=http://&amp;lt;proxy hostname:port&amp;gt;&lt;br /&gt;
export HTTPS_PROXY=https://&amp;lt;proxy hostname:port&amp;gt;&lt;br /&gt;
export NO_PROXY=localhost,127.0.0.1,10.96.0.0/12,192.168.59.0/24,192.168.49.0/24,192.168.39.0/24&lt;br /&gt;
&lt;br /&gt;
minikube start&lt;br /&gt;
To make the exported variables permanent, consider adding the declarations to ~/.bashrc or wherever your user-set environment variables are stored.&lt;br /&gt;
&lt;br /&gt;
Windows&lt;br /&gt;
set HTTP_PROXY=http://&amp;lt;proxy hostname:port&amp;gt;&lt;br /&gt;
set HTTPS_PROXY=https://&amp;lt;proxy hostname:port&amp;gt;&lt;br /&gt;
set NO_PROXY=localhost,127.0.0.1,10.96.0.0/12,192.168.59.0/24,192.168.49.0/24,192.168.39.0/24&lt;br /&gt;
&lt;br /&gt;
minikube start&lt;br /&gt;
To set these environment variables permanently, consider adding these to your system settings or using setx&lt;br /&gt;
&lt;br /&gt;
Troubleshooting&lt;br /&gt;
unable to cache ISO… connection refused&lt;br /&gt;
Unable to start VM: unable to cache ISO: https://storage.googleapis.com/minikube/iso/minikube.iso:&lt;br /&gt;
failed to download: failed to download to temp file: download failed: 5 error(s) occurred:&lt;br /&gt;
&lt;br /&gt;
* Temporary download error: Get https://storage.googleapis.com/minikube/iso/minikube.iso:&lt;br /&gt;
proxyconnect tcp: dial tcp &amp;lt;host&amp;gt;:&amp;lt;port&amp;gt;: connect: connection refused&lt;br /&gt;
This error indicates that the host:port combination defined by HTTPS_PROXY or HTTP_PROXY is incorrect, or that the proxy is unavailable.&lt;br /&gt;
&lt;br /&gt;
Unable to pull images..Client.Timeout exceeded while awaiting headers&lt;br /&gt;
Unable to pull images, which may be OK:&lt;br /&gt;
&lt;br /&gt;
failed to pull image &amp;quot;registry.k8s.io/kube-apiserver:v1.13.3&amp;quot;: output: Error response from daemon:&lt;br /&gt;
Get https://registry.k8s.io/v2/: net/http: request canceled while waiting for connection&lt;br /&gt;
(Client.Timeout exceeded while awaiting headers)&lt;br /&gt;
This error indicates that the container runtime running within the VM does not have access to the internet. Verify that you are passing the appropriate value to --docker-env HTTPS_PROXY.&lt;br /&gt;
&lt;br /&gt;
x509: certificate signed by unknown authority&lt;br /&gt;
[ERROR ImagePull]: failed to pull image registry.k8s.io/kube-apiserver:v1.13.3:&lt;br /&gt;
output: Error response from daemon:&lt;br /&gt;
Get https://registry.k8s.io/v2/: x509: certificate signed by unknown authority&lt;br /&gt;
This is because minikube VM is stuck behind a proxy that rewrites HTTPS responses to contain its own TLS certificate. The solution is to install the proxy certificate into a location that is copied to the VM at startup, so that it can be validated.&lt;br /&gt;
&lt;br /&gt;
Ask your IT department for the appropriate PEM file, and add it to:&lt;br /&gt;
&lt;br /&gt;
~/.minikube/files/etc/ssl/certs&lt;br /&gt;
&lt;br /&gt;
or&lt;br /&gt;
&lt;br /&gt;
~/.minikube/certs&lt;br /&gt;
&lt;br /&gt;
Then run minikube delete and minikube start.&lt;br /&gt;
&lt;br /&gt;
downloading binaries: proxyconnect tcp: tls: oversized record received with length 20527&lt;br /&gt;
The supplied value of HTTPS_PROXY is probably incorrect. Verify that this value is not pointing to an HTTP proxy rather than an HTTPS proxy.&lt;br /&gt;
&lt;br /&gt;
VPN&lt;br /&gt;
minikube requires access from the host to the following IP ranges:&lt;br /&gt;
&lt;br /&gt;
192.168.59.0/24: Used by the minikube VM. Configurable for some hypervisors via --host-only-cidr&lt;br /&gt;
192.168.39.0/24: Used by the minikube kvm2 driver.&lt;br /&gt;
10.96.0.0/12: Used by service cluster IP’s. Configurable via --service-cluster-ip-range&lt;br /&gt;
Unfortunately, many VPN configurations route packets to these destinations through an encrypted tunnel, rather than allowing the packets to go to the minikube VM.&lt;br /&gt;
&lt;br /&gt;
Possible workarounds&lt;br /&gt;
If you have access, whitelist the above IP ranges in your VPN software&lt;br /&gt;
In your VPN software, select an option similar to “Allow local (LAN) access when using VPN” (Cisco VPN example)&lt;br /&gt;
You may have luck selecting alternate values to the --host-only-cidr and --service-cluster-ip-range flags.&lt;br /&gt;
Turn off the VPN&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Referensi==&lt;br /&gt;
&lt;br /&gt;
* https://minikube.sigs.k8s.io/docs/handbook/vpn_and_proxy/&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
&lt;br /&gt;
* [[minikube]]&lt;/div&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
</feed>