[go: up one dir, main page]

Skip to content

ncode/cni-outbound

Repository files navigation

CNI Outbound Plugin

Go Go Report Card codecov License

Overview

The CNI Outbound Plugin is a Container Network Interface (CNI) plugin built to manage outbound network traffic for containers. It handles the creation and management of iptables rules to control outbound connections. The plugin supports both a global rule set defined in its default configuration and container-specific rules provided through the job file.

Features

  • Creates a main iptables chain for outbound traffic control
  • Generates container-specific iptables chains
  • Applies outbound rules for each container based on configuration
  • Supports runtime rules for dynamic traffic control
  • Supports ADD, DEL, and CHECK operations as per CNI specification
  • Integrates with existing CNI plugins as a chained plugin

Development Setup

The project includes a development environment using Docker Compose. To use the development setup:

  1. Navigate to the configs/development directory:

    cd configs/development
    
  2. Build the project, create the Docker image, and start the development environment:

    make all
    

    This command will:

    • Build the plugin for Linux ARM64
    • Create a Docker image with Nomad and the CNI plugin
    • Start the Docker Compose environment
  3. To stop and remove the development environment:

    make down
    
  4. To rebuild and restart the environment after making changes:

    make build docker-build down up
    

The development environment includes a Nomad server with the CNI Outbound Plugin pre-installed. You can access the Nomad UI at http://localhost:4646.

Installation

To install the CNI Outbound Plugin, follow these steps:

  1. Ensure you have Go installed on your system (version 1.22 or later recommended).
  2. Clone the repository:
    git clone https://github.com/ncode/cni-outbound.git
    
  3. Navigate to the project directory:
    cd cni-outbound
    
  4. Build the plugin:
    go build -o outbound
    
  5. Move the built binary to your CNI bin directory (typically /opt/cni/bin/):
    sudo mv outbound /opt/cni/bin/
    

Configuration

The plugin is configured as part of a CNI configuration file. Here's an example configuration for Nomad:

{
  "cniVersion": "0.4.0",
  "name": "my-network",
  "plugins": [
    {
      "type": "loopback"
    },
    {
      "type": "bridge",
      "bridge": "docker0",
      "ipMasq": true,
      "isGateway": true,
      "forceAddress": true,
      "hairpinMode": false,
      "ipam": {
        "type": "host-local",
        "ranges": [
          [
            {
              "subnet": "172.18.0.0/16"
            }
          ]
        ],
        "routes": [
          { "dst": "0.0.0.0/0" }
        ]
      }
    },
    {
      "type": "firewall",
      "backend": "iptables",
      "iptablesAdminChainName": "CNI-NDB"
    },
    {
      "type": "portmap",
      "capabilities": { "portMappings": true }
    },
    {
      "type": "outbound",
      "chainName": "CNI-OUTBOUND",
      "defaultAction": "DROP",
      "logging": {
        "enable": true,
        "directory": "/var/log/cni"
      },
      "outboundRules": [
        {
          "host": "0.0.0.0/0",
          "proto": "udp",
          "port": "53",
          "action": "ACCEPT"
        },
        {
          "host": "192.168.1.0/24",
          "proto": "tcp",
          "port": "443",
          "action": "ACCEPT"
        }
      ]
    }
  ]
}

Plugin-Specific Configuration Parameters:

  • type: Specifies the plugin type. For this plugin, it should be set to "outbound".
  • chainName: Defines the name of the primary iptables chain. If not specified, it defaults to "CNI-OUTBOUND".
  • defaultAction: Determines the default action (e.g., "DROP", "ACCEPT") for the container-specific chains. The default value is "DROP".
  • outboundRules: An array of outbound rules that will be applied to each container.
  • logging:
    • enable: A boolean value to enable (true) or disable (false) logging.
    • directory: Specifies the directory where log files will be stored.

Usage with Nomad

To use the CNI Outbound Plugin with Nomad:

  1. Install the plugin in your CNI bin directory on all Nomad clients.

  2. Create a CNI configuration file (e.g., /opt/cni/config/my-network.conflist) with content similar to the example above.

  3. Configure Nomad to use this CNI configuration. In your Nomad client configuration, set:

    client {
      cni_path = "/opt/cni/bin"
      cni_config_dir = "/opt/cni/config"
    }
  4. In your Nomad job specification, use the network mode cni:

    network {
      mode = "cni/my-network"
    }

The plugin will create the necessary iptables rules when Nomad launches containers and clean them up when containers are destroyed.

Development

To contribute to the CNI Outbound Plugin:

  1. Fork the repository
  2. Create your feature branch (git checkout -b feature/AmazingFeature)
  3. Commit your changes (git commit -m 'Add some AmazingFeature')
  4. Push to the branch (git push origin feature/AmazingFeature)
  5. Open a Pull Request

Troubleshooting

If you encounter issues with the plugin in your Nomad environment, consider the following steps:

  1. Check Nomad's logs for any error messages related to CNI or networking.
  2. Verify that the plugin binary is correctly installed in the CNI bin directory specified in your Nomad configuration.
  3. Ensure that the CNI configuration file is correctly formatted and located in the directory specified by cni_config_dir in your Nomad client configuration.
  4. Use iptables -L and iptables-save to inspect the current iptables rules and verify that the plugin is creating the expected chains and rules.
  5. If using Consul Connect with Nomad, ensure that the outbound rules allow necessary communication between services.
  6. Check the Nomad allocation logs for any network-related errors or warnings.

Nomad Job Example

Here's a simple Nomad job example that uses the CNI Outbound Plugin:

job "example" {
  datacenters = ["dc1"]

  group "app" {
    network {
      mode = "cni/my-network"

       port "http" {
          to = 8080
       }

       cni {
          args = {
             "outbound.additional_rules" = jsonencode([
                {
                   "host": "172.17.0.0/16",
                   "proto": "tcp",
                   "port": "5432",
                   "action": "ACCEPT"
                },
                {
                   "host": "10.0.0.0/8",
                   "proto": "tcp",
                   "port": "6379",
                   "action": "ACCEPT"
                }
             ])
          }
       }
    }

    task "server" {
      driver = "docker"
      
      config {
        image = "nginx:latest"
      }
    }
  }
}

Ensure that the network mode matches the name of your CNI configuration file.

License

This project is licensed under Apache-2.0

Acknowledgments

For more information on CNI plugins and their use with Nomad, refer to the Nomad CNI documentation.

About

CNI to manage outbound connections from containers

Resources

License

Stars

Watchers

Forks

Packages

No packages published