Lab 6.5 - connect to nginx container with final policy in place?

Hi Chris, all,
I would like to ask about the final state of the lab 6.5, where we have the NetworkPolicy in place.
First, some context
[Decided to omit the NetworkPolicy itself, as the relevant part of the config is practically the whole object - I'm referring to its final state as per Lab 6.5, point #10]
As I understand it, the NetworkPolicy applies to all pods in the default
namespace, so our nginx container (part of the secondapp
pod) can receive connections from any other pod on port 80.
We also previously set up a NodePort Service, that should expose nginx's port 80 to an external (node) port 32000;
- ...
- kind: Service
- spec:
- clusterIP: 10.100.51.7
- ports:
- - name: "80"
- nodePort: 32000
- port: 80
- protocol: TCP
- targetPort: 80
- type: NodePort
- ...
The pod itself has, in my case, its IP set to 10.0.1.8
- NAME READY STATUS RESTARTS AGE IP NODE
- secondapp 2/2 Running 1 (43m ago) 60m 10.0.1.8 worker-01
With this setup, I would like to access the nginx default page from any point that isn't within a pod.
me@controlplane:$ curl http://10.0.1.8:80 ##Pod IP
- doesn't work - why?- IIRC, pod IP should be visible within the K8s cluster (so from CP towards pod on Worker node), and I should be hitting the correct ingress port
me@controlplane:$ curl http://10.100.51.7:80 ##Service ClusterIP
- doesn't work - why?- My understanding is, the service should be accessing the pod in the correct local port
80
, which should be allowed as the correct ingress port for the pod
- My understanding is, the service should be accessing the pod in the correct local port
me@laptop:$ curl http://<worker-01-IP>:32000
- doesn't work, most likely for the same reason as attempt #2
Given that the goal is for some generic user to access the website (as in attempt #3), why doesn't the existing policy work, despite explicitly allowing Ingress via Port 80?
What change would have to happen in the NetworkPolicy (or other objects), so that attempt #3 would work?
Thank you,
Martin
Comments
-
Reading some more on the subject - https://kubernetes.io/docs/concepts/services-networking/network-policies/#networkpolicy-resource
It dawned on me, that an empty (but present)
ingress:
list actually denies all inbound connections.
I am now assuming that the presence of only apodSelector
option under ingress implies - the only allowed inbound connections are from other pods in the same (default) namespace.
This means, in order to allow external connections, I would have to add- ingress:
- - from:
- - ipBlock: ### these two
- cidr: <IP-range> ### lines
to the NetworkPolicy.
However, this doesn't work when I configured it, nor does it allow my ControlPlane node to access the service or pod, when I set the range to include its IP address.
Still, perhaps this is a step in the right direction..?
Best regards,
Martin0 -
Hi @strelko2,
Network policies are an interesting territory in Kubernetes. While their definition is rather uncomplicated, the tricky part is how they are interpreted and implemented/enforced by the cluster's CNI plugin. Meaning that having the same Network policy manifest, under different CNI plugins, its rules may be interpreted differently, or may be simply omitted by the plugin. In order to find out the "whats" and "hows" of the CNI plugin, one would have to read not only the Kubernetes Network policy documentation, but also the CNI plugin's own documentation. And, to make things even more interesting, the CNI plugins come with their own custom Network policy objects, designed to extend beyond the Kubernetes Network policy capabilities.
The Network policy manifest in the lab guide explicitly declares
.ingress.from.podSelector
to allow only ingress from other Pods (matching the port and protocol of the rule). While your observation is correct, due to the lab environment setup the user has access to the Pod network, Service network, and Node network (not recommended for prod settings), this is possible due to routes defined to allow traffic to travel across the three distinct network layers - nodes, services, pods. Acurl
to a Pod IP, Service ClusterIP, and Node IP is not treated as access from another Pod. Thecurl
request is captured and processed differently, as coming from a source not defined in the policy - and eventually dropped. This is why the validation step includes atest
Pod, running analpine
container to access the target application protected by the Network policy - that should lead to a successfulcurl
attempt.For your use case, what may help is to have an Ingress proxy installed, to capture user traffic and route it internally to Service Endpoints, while making the policy more descriptive in terms of the targeted/protected Pods in the
.spec.podSelector
field and the permitted sources in the.from.podSelector
or the.from.namespaceSelector
.Regards,
-Chris1
Categories
- All Categories
- 243 LFX Mentorship
- 243 LFX Mentorship: Linux Kernel
- 815 Linux Foundation IT Professional Programs
- 366 Cloud Engineer IT Professional Program
- 165 Advanced Cloud Engineer IT Professional Program
- 83 DevOps Engineer IT Professional Program
- 131 Cloud Native Developer IT Professional Program
- 142 Express Training Courses & Microlearning
- 119 Express Courses - Discussion Forum
- Microlearning - Discussion Forum
- 6.6K Training Courses
- 40 LFC110 Class Forum - Discontinued
- 72 LFC131 Class Forum
- 49 LFD102 Class Forum
- 234 LFD103 Class Forum
- 21 LFD110 Class Forum
- 31 LFD121 Class Forum
- LFD123 Class Forum
- LFD125 Class Forum
- 16 LFD133 Class Forum
- 6 LFD134 Class Forum
- 17 LFD137 Class Forum
- 70 LFD201 Class Forum
- 3 LFD210 Class Forum
- 2 LFD210-CN Class Forum
- 2 LFD213 Class Forum - Discontinued
- 128 LFD232 Class Forum - Discontinued
- 2 LFD233 Class Forum
- 2 LFD237 Class Forum
- 24 LFD254 Class Forum
- 719 LFD259 Class Forum
- 109 LFD272 Class Forum
- 4 LFD272-JP クラス フォーラム
- 10 LFD273 Class Forum
- 234 LFS101 Class Forum
- 2 LFS111 Class Forum
- 2 LFS112 Class Forum
- 1 LFS116 Class Forum
- 3 LFS118 Class Forum
- LFS120 Class Forum
- 2 LFS142 Class Forum
- 2 LFS144 Class Forum
- 3 LFS145 Class Forum
- 1 LFS146 Class Forum
- 16 LFS148 Class Forum
- 15 LFS151 Class Forum
- 1 LFS157 Class Forum
- 64 LFS158 Class Forum
- LFS158-JP クラス フォーラム
- 4 LFS162 Class Forum
- 1 LFS166 Class Forum
- 6 LFS167 Class Forum
- 1 LFS170 Class Forum
- 2 LFS171 Class Forum
- 2 LFS178 Class Forum
- 2 LFS180 Class Forum
- 1 LFS182 Class Forum
- 5 LFS183 Class Forum
- 30 LFS200 Class Forum
- 737 LFS201 Class Forum - Discontinued
- 2 LFS201-JP クラス フォーラム
- 17 LFS203 Class Forum
- 135 LFS207 Class Forum
- 1 LFS207-DE-Klassenforum
- LFS207-JP クラス フォーラム
- 302 LFS211 Class Forum
- 55 LFS216 Class Forum
- 53 LFS241 Class Forum
- 50 LFS242 Class Forum
- 37 LFS243 Class Forum
- 13 LFS244 Class Forum
- 1 LFS245 Class Forum
- LFS246 Class Forum
- LFS248 Class Forum
- 82 LFS250 Class Forum
- 2 LFS250-JP クラス フォーラム
- LFS251 Class Forum
- 143 LFS253 Class Forum
- LFS254 Class Forum
- LFS255 Class Forum
- 6 LFS256 Class Forum
- LFS257 Class Forum
- 1.2K LFS258 Class Forum
- 9 LFS258-JP クラス フォーラム
- 135 LFS260 Class Forum
- 151 LFS261 Class Forum
- 41 LFS262 Class Forum
- 82 LFS263 Class Forum - Discontinued
- 15 LFS264 Class Forum - Discontinued
- 11 LFS266 Class Forum - Discontinued
- 22 LFS267 Class Forum
- 25 LFS268 Class Forum
- 29 LFS269 Class Forum
- 7 LFS270 Class Forum
- 199 LFS272 Class Forum
- 1 LFS272-JP クラス フォーラム
- 2 LFS147 Class Forum
- LFS274 Class Forum
- 3 LFS281 Class Forum
- 2 LFW111 Class Forum
- 257 LFW211 Class Forum
- 176 LFW212 Class Forum
- 12 SKF100 Class Forum
- SKF200 Class Forum
- 2 SKF201 Class Forum
- 789 Hardware
- 199 Drivers
- 68 I/O Devices
- 37 Monitors
- 98 Multimedia
- 174 Networking
- 91 Printers & Scanners
- 83 Storage
- 753 Linux Distributions
- 82 Debian
- 67 Fedora
- 17 Linux Mint
- 13 Mageia
- 23 openSUSE
- 147 Red Hat Enterprise
- 31 Slackware
- 13 SUSE Enterprise
- 350 Ubuntu
- 464 Linux System Administration
- 39 Cloud Computing
- 70 Command Line/Scripting
- Github systems admin projects
- 91 Linux Security
- 78 Network Management
- 101 System Management
- 47 Web Management
- 69 Mobile Computing
- 17 Android
- 28 Development
- 1.2K New to Linux
- 1K Getting Started with Linux
- 379 Off Topic
- 113 Introductions
- 177 Small Talk
- 26 Study Material
- 521 Programming and Development
- 291 Kernel Development
- 212 Software Development
- 1.1K Software
- 263 Applications
- 180 Command Line
- 3 Compiling/Installing
- 988 Games
- 311 Installation
- 79 All In Program
- 79 All In Forum
Upcoming Training
-
August 20, 2018
Kubernetes Administration (LFS458)
-
August 20, 2018
Linux System Administration (LFS301)
-
August 27, 2018
Open Source Virtualization (LFS462)
-
August 27, 2018
Linux Kernel Debugging and Security (LFD440)