Configure Transparent Proxy on Kubernetes

The default configuration works well for most scenarios, but there are cases where adjustments are needed.

In Kubernetes mode, Kuma offers three methods to adjust the configuration. Each can be used on its own or combined with others if needed.

It’s best to stick to one method whenever possible. Using more than one can make things more complicated and harder to troubleshoot, as it may not be clear where each setting comes from. If you need to combine methods, check the Order of precedence section to see what the final configuration will look like based on the priority of each setting.

Control plane runtime configuration

The control plane runtime configuration is a section of Kuma’s configuration that contains important settings for how the control plane operates, including options for the transparent proxy and other key components.

Some transparent proxy settings can be adjusted here, and for certain settings, this is the only place they can be modified.

Currently, it’s best to use the control plane runtime configuration as the main place to store transparent proxy settings that apply to all workloads.

For more details, see the control plane configuration reference under runtime.kubernetes. You can also find transparent proxy-specific settings in the control plane runtime configuration section of the configuration reference.

Settings restricted to control plane runtime configuration

Some transparent proxy settings can only be changed through the control plane’s runtime configuration because they are shared with other Kuma components. These settings manage critical tasks like creating Dataplane resources for workloads and setting up the kuma-dp sidecar container. For example, the DNS port used to redirect traffic is shared between the transparent proxy and the kuma-dp run command in the sidecar container. Keeping these settings consistent across workloads ensures proper functionality. These settings are:

  • runtime.kubernetes.injector.sidecarContainer.redirectPortInbound
  • runtime.kubernetes.injector.sidecarContainer.redirectPortOutbound
  • runtime.kubernetes.injector.sidecarContainer.uid
  • runtime.kubernetes.injector.builtinDNS.enabled
  • runtime.kubernetes.injector.builtinDNS.port

⚠️ IMPORTANT

When the Configuration in ConfigMap feature is enabled, any changes to these settings, whether through annotations or ConfigMap, will be ignored, and a warning will be logged in the control plane.

However, if this feature is disabled, and you update builtinDNS.enabled or builtinDNS.port using deprecated annotations, the changes may still apply, potentially causing DNS redirection issues. This could prevent kuma-dp from starting the DNS server or listening on the correct port, leading to environment disruptions.

Modifying control plane runtime configuration

For instructions on modifying the control plane configuration, see the Modifying the configuration section in the control plane configuration documentation.

Configuration in ConfigMap (experimental)

This feature affects multiple underlying components and is considered experimental. Use it with caution. If you encounter any unexpected behavior or issues, please contact us and submit an issue on GitHub. Your feedback helps improve this feature.

Starting in Kuma 2.9, transparent proxy settings can be managed using dedicated ConfigMaps, providing a more flexible and scalable way to configure proxies. This method offers several advantages:

  • More control over settings - All relevant transparent proxy settings can be configured in one place, reducing inconsistencies.
  • Scoped configuration - ConfigMaps can be applied at the namespace or workload level, making it easier to customize settings for different groups of workloads.
  • Simplified management - Instead of setting annotations on individual workloads or applying global control plane configurations, ConfigMaps provide a structured approach that improves maintainability.

This new approach makes managing transparent proxy settings more efficient while reducing complexity.

To enable this feature, set transparentProxy.configMap.enabled during installation:

kumactl install control-plane \
  --set "transparentProxy.configMap.enabled=true" \
  | kubectl apply -f -

If you set transparentProxy.configMap.config to an empty value, it will override transparentProxy.configMap.enabled and disable the feature, even if transparentProxy.configMap.enabled is set to true.

ConfigMap auto-creation and configuration

During installation, Kuma will automatically create a ConfigMap in the kuma-system namespace. The ConfigMap will be named based on the transparentProxy.configMap.name setting, and its content will come from the YAML configuration defined in transparentProxy.configMap.config, which holds the transparent proxy settings.

Here is an example of how to modify parts of this configuration during installation:

kumactl install control-plane \
  --set "transparentProxy.configMap.config.enabled=true" \
  --set "transparentProxy.configMap.config.redirect.outbound.excludePortsForIPs=10\.1\.0\.254\,172\.10\.1.254" \
  --set "transparentProxy.configMap.config.redirect.verbose=false" \
  | kubectl apply -f -

Kuma uses a single configuration structure for transparent proxy settings across all components. For the full configuration schema, see the Helm values.yaml reference, particularly under the transparentProxy.configMap.config path. More details on each setting are available in the configuration reference.

Custom ConfigMap for specific workloads

The name of the ConfigMap is defined by the transparentProxy.configMap.name setting. By default, this name is set to kuma-transparent-proxy-config. To use a different ConfigMap for specific workloads, apply the traffic.kuma.io/transparent-proxy-configmap-name annotation to those workloads. For example:

apiVersion: v1
kind: Pod
metadata:
  name: demo-app
  annotations:
    traffic.kuma.io/transparent-proxy-configmap-name: custom-name
...

ConfigMap lookup order

Kuma searches for the ConfigMap in the following order:

Default behavior:

  1. Look for a ConfigMap with the default name in the workload’s namespace.

  2. If not found: Check the kuma-system namespace for the default ConfigMap.

  3. If still not found: Use the default transparent proxy configuration.

When the traffic.kuma.io/transparent-proxy-configmap-name annotation is set on the workload:

  1. Look for the ConfigMap specified in the annotation within the workload’s namespace.

  2. If not found: Check the kuma-system namespace for the same ConfigMap.

  3. If still not found: Fall back to the default ConfigMap in the workload’s namespace.

  4. If previous steps failed: Search for the default ConfigMap in the kuma-system namespace.

The ConfigMap in the kuma-system namespace is required for proper operation. It must be present even if custom ConfigMaps are used in individual workload namespaces.

Annotations

Kubernetes annotations can be applied to individual workloads to modify the transparent proxy configuration. These annotations allow fine-tuning of specific behaviors for a single workload without affecting others.

For the full list of annotations which affect the transparent proxy configuration refer to Annotations section in the transparent proxy configuration reference.

Automatically applied annotations

Certain annotations are automatically added to workloads with injected sidecar containers, regardless of whether they are explicitly defined. These annotations reflect the final values used to configure the transparent proxy. For settings that can be manually specified, these annotations will still be applied, even if not explicitly provided, using values from the control plane runtime configuration.

The automatically applied annotations include:

  • kuma.io/transparent-proxying
  • kuma.io/sidecar-uid
  • kuma.io/transparent-proxying-inbound-port
  • kuma.io/transparent-proxying-outbound-port
  • kuma.io/builtin-dns
  • kuma.io/builtin-dns-port
  • kuma.io/application-probe-proxy-port
  • kuma.io/transparent-proxying-ebpf
  • kuma.io/transparent-proxying-ebpf-bpf-fs-path
  • kuma.io/transparent-proxying-ebpf-cgroup-path
  • kuma.io/transparent-proxying-ebpf-tc-attach-iface
  • kuma.io/transparent-proxying-ebpf-instance-ip-env-var-name
  • kuma.io/transparent-proxying-ebpf-programs-source-path
  • kuma.io/transparent-proxying-ip-family-mode
  • traffic.kuma.io/transparent-proxy-config (only in environments using Kuma CNI)

These annotations ensure that the proper configuration is automatically applied to each workload, aligning with the global and per-workload settings.

Order of precedence

When using multiple configuration methods, it’s important to understand the order in which they are applied to avoid conflicts and ensure the correct settings are used.

  1. Default values

  2. Control plane runtime configuration

  3. Configuration in ConfigMap

  4. Annotations