Lab 6.5 - connect to nginx container with final policy in place?

Hi Chris, all,
I would like to ask about the final state of the lab 6.5, where we have the NetworkPolicy in place.
First, some context
[Decided to omit the NetworkPolicy itself, as the relevant part of the config is practically the whole object - I'm referring to its final state as per Lab 6.5, point #10]
As I understand it, the NetworkPolicy applies to all pods in the default
namespace, so our nginx container (part of the secondapp
pod) can receive connections from any other pod on port 80.
We also previously set up a NodePort Service, that should expose nginx's port 80 to an external (node) port 32000;
... kind: Service spec: clusterIP: 10.100.51.7 ports: - name: "80" nodePort: 32000 port: 80 protocol: TCP targetPort: 80 type: NodePort ...
The pod itself has, in my case, its IP set to 10.0.1.8
NAME READY STATUS RESTARTS AGE IP NODE secondapp 2/2 Running 1 (43m ago) 60m 10.0.1.8 worker-01
With this setup, I would like to access the nginx default page from any point that isn't within a pod.
me@controlplane:$ curl http://10.0.1.8:80 ##Pod IP
- doesn't work - why?- IIRC, pod IP should be visible within the K8s cluster (so from CP towards pod on Worker node), and I should be hitting the correct ingress port
me@controlplane:$ curl http://10.100.51.7:80 ##Service ClusterIP
- doesn't work - why?- My understanding is, the service should be accessing the pod in the correct local port
80
, which should be allowed as the correct ingress port for the pod
- My understanding is, the service should be accessing the pod in the correct local port
me@laptop:$ curl http://<worker-01-IP>:32000
- doesn't work, most likely for the same reason as attempt #2
Given that the goal is for some generic user to access the website (as in attempt #3), why doesn't the existing policy work, despite explicitly allowing Ingress via Port 80?
What change would have to happen in the NetworkPolicy (or other objects), so that attempt #3 would work?
Thank you,
Martin
Comments
-
Reading some more on the subject - https://kubernetes.io/docs/concepts/services-networking/network-policies/#networkpolicy-resource
It dawned on me, that an empty (but present)
ingress:
list actually denies all inbound connections.
I am now assuming that the presence of only apodSelector
option under ingress implies - the only allowed inbound connections are from other pods in the same (default) namespace.
This means, in order to allow external connections, I would have to addingress: - from: - ipBlock: ### these two cidr: <IP-range> ### lines
to the NetworkPolicy.
However, this doesn't work when I configured it, nor does it allow my ControlPlane node to access the service or pod, when I set the range to include its IP address.
Still, perhaps this is a step in the right direction..?
Best regards,
Martin0 -
Hi @strelko2,
Network policies are an interesting territory in Kubernetes. While their definition is rather uncomplicated, the tricky part is how they are interpreted and implemented/enforced by the cluster's CNI plugin. Meaning that having the same Network policy manifest, under different CNI plugins, its rules may be interpreted differently, or may be simply omitted by the plugin. In order to find out the "whats" and "hows" of the CNI plugin, one would have to read not only the Kubernetes Network policy documentation, but also the CNI plugin's own documentation. And, to make things even more interesting, the CNI plugins come with their own custom Network policy objects, designed to extend beyond the Kubernetes Network policy capabilities.
The Network policy manifest in the lab guide explicitly declares
.ingress.from.podSelector
to allow only ingress from other Pods (matching the port and protocol of the rule). While your observation is correct, due to the lab environment setup the user has access to the Pod network, Service network, and Node network (not recommended for prod settings), this is possible due to routes defined to allow traffic to travel across the three distinct network layers - nodes, services, pods. Acurl
to a Pod IP, Service ClusterIP, and Node IP is not treated as access from another Pod. Thecurl
request is captured and processed differently, as coming from a source not defined in the policy - and eventually dropped. This is why the validation step includes atest
Pod, running analpine
container to access the target application protected by the Network policy - that should lead to a successfulcurl
attempt.For your use case, what may help is to have an Ingress proxy installed, to capture user traffic and route it internally to Service Endpoints, while making the policy more descriptive in terms of the targeted/protected Pods in the
.spec.podSelector
field and the permitted sources in the.from.podSelector
or the.from.namespaceSelector
.Regards,
-Chris1
Categories
- All Categories
- 232 LFX Mentorship
- 232 LFX Mentorship: Linux Kernel
- 812 Linux Foundation IT Professional Programs
- 365 Cloud Engineer IT Professional Program
- 183 Advanced Cloud Engineer IT Professional Program
- 82 DevOps Engineer IT Professional Program
- 151 Cloud Native Developer IT Professional Program
- 140 Express Training Courses & Microlearning
- 140 Express Courses - Discussion Forum
- Microlearning - Discussion Forum
- 6.4K Training Courses
- 48 LFC110 Class Forum - Discontinued
- 71 LFC131 Class Forum
- 46 LFD102 Class Forum
- 229 LFD103 Class Forum
- 20 LFD110 Class Forum
- 44 LFD121 Class Forum
- LFD125 Class Forum
- 18 LFD133 Class Forum
- 8 LFD134 Class Forum
- 18 LFD137 Class Forum
- 71 LFD201 Class Forum
- 5 LFD210 Class Forum
- 5 LFD210-CN Class Forum
- 2 LFD213 Class Forum - Discontinued
- 128 LFD232 Class Forum - Discontinued
- 2 LFD233 Class Forum
- 4 LFD237 Class Forum
- 24 LFD254 Class Forum
- 711 LFD259 Class Forum
- 111 LFD272 Class Forum - Discontinued
- 4 LFD272-JP クラス フォーラム
- 13 LFD273 Class Forum
- 200 LFS101 Class Forum
- 1 LFS111 Class Forum
- 3 LFS112 Class Forum
- 3 LFS116 Class Forum
- 7 LFS118 Class Forum
- LFS120 Class Forum
- 9 LFS142 Class Forum
- 8 LFS144 Class Forum
- 4 LFS145 Class Forum
- 3 LFS146 Class Forum
- 15 LFS148 Class Forum
- 15 LFS151 Class Forum
- 5 LFS157 Class Forum
- 49 LFS158 Class Forum
- LFS158-JP クラス フォーラム
- 10 LFS162 Class Forum
- 2 LFS166 Class Forum
- 4 LFS167 Class Forum
- 3 LFS170 Class Forum
- 2 LFS171 Class Forum
- 3 LFS178 Class Forum
- 3 LFS180 Class Forum
- 2 LFS182 Class Forum
- 5 LFS183 Class Forum
- 33 LFS200 Class Forum
- 737 LFS201 Class Forum - Discontinued
- 3 LFS201-JP クラス フォーラム - Discontinued
- 19 LFS203 Class Forum
- 135 LFS207 Class Forum
- 2 LFS207-DE-Klassenforum
- 2 LFS207-JP クラス フォーラム
- 302 LFS211 Class Forum
- 56 LFS216 Class Forum
- 52 LFS241 Class Forum
- 50 LFS242 Class Forum
- 38 LFS243 Class Forum
- 16 LFS244 Class Forum
- 5 LFS245 Class Forum
- LFS246 Class Forum
- LFS248 Class Forum
- 54 LFS250 Class Forum
- 2 LFS250-JP クラス フォーラム
- 1 LFS251 Class Forum
- 156 LFS253 Class Forum
- 1 LFS254 Class Forum
- 1 LFS255 Class Forum
- 10 LFS256 Class Forum
- 1 LFS257 Class Forum
- 1.3K LFS258 Class Forum
- 11 LFS258-JP クラス フォーラム
- 134 LFS260 Class Forum
- 160 LFS261 Class Forum
- 43 LFS262 Class Forum
- 82 LFS263 Class Forum - Discontinued
- 15 LFS264 Class Forum - Discontinued
- 11 LFS266 Class Forum - Discontinued
- 24 LFS267 Class Forum
- 25 LFS268 Class Forum
- 32 LFS269 Class Forum
- 6 LFS270 Class Forum
- 202 LFS272 Class Forum - Discontinued
- 2 LFS272-JP クラス フォーラム
- 4 LFS147 Class Forum
- 1 LFS274 Class Forum
- 4 LFS281 Class Forum
- 15 LFW111 Class Forum
- 262 LFW211 Class Forum
- 184 LFW212 Class Forum
- 15 SKF100 Class Forum
- 1 SKF200 Class Forum
- 2 SKF201 Class Forum
- 797 Hardware
- 199 Drivers
- 68 I/O Devices
- 37 Monitors
- 104 Multimedia
- 174 Networking
- 91 Printers & Scanners
- 85 Storage
- 759 Linux Distributions
- 82 Debian
- 67 Fedora
- 17 Linux Mint
- 13 Mageia
- 23 openSUSE
- 148 Red Hat Enterprise
- 31 Slackware
- 13 SUSE Enterprise
- 354 Ubuntu
- 470 Linux System Administration
- 39 Cloud Computing
- 71 Command Line/Scripting
- Github systems admin projects
- 95 Linux Security
- 78 Network Management
- 102 System Management
- 47 Web Management
- 69 Mobile Computing
- 18 Android
- 38 Development
- 1.2K New to Linux
- 1K Getting Started with Linux
- 377 Off Topic
- 115 Introductions
- 175 Small Talk
- 26 Study Material
- 807 Programming and Development
- 304 Kernel Development
- 485 Software Development
- 1.8K Software
- 263 Applications
- 183 Command Line
- 3 Compiling/Installing
- 988 Games
- 317 Installation
- 103 All In Program
- 103 All In Forum
Upcoming Training
-
August 20, 2018
Kubernetes Administration (LFS458)
-
August 20, 2018
Linux System Administration (LFS301)
-
August 27, 2018
Open Source Virtualization (LFS462)
-
August 27, 2018
Linux Kernel Debugging and Security (LFD440)