Skip to content

Use Skupper cluster policy to restrict site linking and service exposure

License

Notifications You must be signed in to change notification settings

skupperproject/skupper-example-policy

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Skupper Hello World using cluster policy

main

Use policy to control site linking and service exposure

This example is part of a suite of examples showing the different ways you can use Skupper to connect services across cloud providers, data centers, and edge sites.

Contents

Overview

This example is a variant of Skupper Hello World that uses Skupper cluster policy to restrict site linking and service exposure.

It contains two services:

  • A backend service that exposes an /api/hello endpoint. It returns greetings of the form Hi, <your-name>. I am <my-name> (<pod-name>).

  • A frontend service that sends greetings to the backend and fetches new greetings in response.

The frontend and backend run in different sites, on different clusters. The example shows you how you can explicitly allow linking of the two sites and exposure of the backend service.

Prerequisites

Step 1: Install the Skupper command-line tool

This example uses the Skupper command-line tool to deploy Skupper. You need to install the skupper command only once for each development environment.

On Linux or Mac, you can use the install script (inspect it here) to download and extract the command:

curl https://skupper.io/install.sh | sh

The script installs the command under your home directory. It prompts you to add the command to your path if necessary.

For Windows and other installation options, see Installing Skupper.

Step 2: Set up your clusters

Skupper is designed for use with multiple Kubernetes clusters. The skupper and kubectl commands use your kubeconfig and current context to select the cluster and namespace where they operate.

Your kubeconfig is stored in a file in your home directory. The skupper and kubectl commands use the KUBECONFIG environment variable to locate it.

A single kubeconfig supports only one active context per user. Since you will be using multiple contexts at once in this exercise, you need to create distinct kubeconfigs.

For each namespace, open a new terminal window. In each terminal, set the KUBECONFIG environment variable to a different path and log in to your cluster. Then create the namespace you wish to use and set the namespace on your current context.

Note: The login procedure varies by provider. See the documentation for yours:

West:

export KUBECONFIG=~/.kube/config-west
# Enter your provider-specific login command
kubectl create namespace west
kubectl config set-context --current --namespace west

East:

export KUBECONFIG=~/.kube/config-east
# Enter your provider-specific login command
kubectl create namespace east
kubectl config set-context --current --namespace east

Step 3: Enable Skupper cluster policy

To enable Skupper cluster policy, you install a Custom Resource Definition (CRD) named SkupperClusterPolicy. Installing the CRD requires cluster admin privileges.

The presence of the CRD in a cluster tells Skupper to enforce cluster policy. The default policy (an "empty" policy with nothing explicitly allowed) denies all site linking and service exposure.

Warning: Once the CRD is installed, any existing Skupper sites on the cluster will stop working because Skupper cluster policy denies all operations not explicitly allowed in the policy configuration. Be careful to define working policy rules before you enable policy for existing sites.

Use kubectl apply to install the CRD in each cluster.

West:

kubectl apply -f https://raw.githubusercontent.com/skupperproject/skupper/main/api/types/crds/skupper_cluster_policy_crd.yaml

Sample output:

$ kubectl apply -f https://raw.githubusercontent.com/skupperproject/skupper/main/api/types/crds/skupper_cluster_policy_crd.yaml
customresourcedefinition.apiextensions.k8s.io/skupperclusterpolicies.skupper.io created
clusterrole.rbac.authorization.k8s.io/skupper-service-controller created

East:

kubectl apply -f https://raw.githubusercontent.com/skupperproject/skupper/main/api/types/crds/skupper_cluster_policy_crd.yaml

Sample output:

$ kubectl apply -f https://raw.githubusercontent.com/skupperproject/skupper/main/api/types/crds/skupper_cluster_policy_crd.yaml
customresourcedefinition.apiextensions.k8s.io/skupperclusterpolicies.skupper.io created
clusterrole.rbac.authorization.k8s.io/skupper-service-controller created

Step 4: Deploy the frontend and backend

This example runs the frontend and the backend in separate Kubernetes namespaces, on different clusters.

Use kubectl create deployment to deploy the frontend in namespace west and the backend in namespace east.

West:

kubectl create deployment frontend --image quay.io/skupper/hello-world-frontend

East:

kubectl create deployment backend --image quay.io/skupper/hello-world-backend --replicas 3

Step 5: Create your sites

A Skupper site is a location where components of your application are running. Sites are linked together to form a network for your application. In Kubernetes, a site is associated with a namespace.

For each namespace, use skupper init to create a site. This deploys the Skupper router and controller. Then use skupper status to see the outcome.

Note: If you are using Minikube, you need to start minikube tunnel before you run skupper init.

West:

skupper init
skupper status

Sample output:

$ skupper init
Waiting for LoadBalancer IP or hostname...
Waiting for status...
Skupper is now installed in namespace 'west'.  Use 'skupper status' to get more information.

$ skupper status
Skupper is enabled for namespace west" (with policies). It is not connected to any other sites. It has no exposed services.

East:

skupper init
skupper status

Sample output:

$ skupper init
Waiting for LoadBalancer IP or hostname...
Waiting for status...
Skupper is now installed in namespace 'east'.  Use 'skupper status' to get more information.

$ skupper status
Skupper is enabled for namespace "east" (with policies). It is not connected to any other sites. It has no exposed services.

Note that the status output shows the sites enabled "with policies".

Step 6: Attempt to link your sites and expose the backend

Let's first try to link our sites and expose the backend service without permission.

Use skupper token create in West to generate the token. This is the first step in attempting to link the two sites.

Use skupper expose to attempt to expose the backend service in East.

West:

skupper token create ~/secret.token

Sample output:

$ skupper token create ~/secret.token
Error: Failed to create token: Policy validation error: incoming links are not allowed

East:

skupper expose deployment/backend --port 8080

Sample output:

$ skupper expose deployment/backend --port 8080
Error: Policy validation error: deployment/backend cannot be exposed

Because Skupper cluster policy is enabled, these operations are denied.

Step 7: Grant permission to link your sites and expose the backend

With policy enabled, we need to explicitly allow the site link and service exposure required by the Hello World application.

To enable linking from East to West, use allowIncomingLinks: true in West and allowOutgoingLinksHostnames: ["*"] in East.

This example uses an asterisk in the list of allowed outgoing hostnames, which allows any hostname. You can also specify a narrow range of hostnames using regular expressions.

To enable exposure of the backend, use allowedServices: [backend] in West. Then, in East, use allowedServices: [backend] and allowedExposedResources: [deployment/backend].

See Skupper cluster policy for more information about policy configuration.

Policy in West

west/policy.yaml:

apiVersion: skupper.io/v1alpha1
kind: SkupperClusterPolicy
metadata:
  name: west
spec:
  namespaces: [west]
  allowIncomingLinks: true
  allowedServices: [backend]

Policy in East

east/policy.yaml:

apiVersion: skupper.io/v1alpha1
kind: SkupperClusterPolicy
metadata:
  name: east
spec:
  namespaces: [east]
  allowedOutgoingLinksHostnames: ["*"]
  allowedExposedResources: [deployment/backend]
  allowedServices: [backend]

Use the kubectl apply command with the policy resources for each site.

West:

kubectl apply -f west/policy.yaml

East:

kubectl apply -f east/policy.yaml

Step 8: Link your sites and expose the backend

Now that we have permission granted, let's try again.

Use skupper token create in West to generate the token. Then, use skupper link create in East to link the sites.

Use skupper expose to expose the backend service in East to the frontend in West.

West:

skupper token create ~/secret.token

Sample output:

$ skupper token create ~/secret.token
Token written to ~/secret.token

East:

skupper link create ~/secret.token
skupper expose deployment/backend --port 8080

Sample output:

$ skupper link create ~/secret.token
Site configured to link to <endpoint> (name=link1)
Check the status of the link using 'skupper link status'.

$ skupper expose deployment/backend --port 8080
deployment backend exposed as backend

Step 9: Access the frontend

In order to use and test the application, we need external access to the frontend.

Use kubectl expose with --type LoadBalancer to open network access to the frontend service.

Once the frontend is exposed, use kubectl get service/frontend to look up the external IP of the frontend service. If the external IP is <pending>, try again after a moment.

Once you have the external IP, use curl or a similar tool to request the /api/health endpoint at that address.

Note: The <external-ip> field in the following commands is a placeholder. The actual value is an IP address.

West:

kubectl expose deployment/frontend --port 8080 --type LoadBalancer
kubectl get service/frontend
curl http://<external-ip>:8080/api/health

Sample output:

$ kubectl expose deployment/frontend --port 8080 --type LoadBalancer
service/frontend exposed

$ kubectl get service/frontend
NAME       TYPE           CLUSTER-IP      EXTERNAL-IP     PORT(S)          AGE
frontend   LoadBalancer   10.103.232.28   <external-ip>   8080:30407/TCP   15s

$ curl http://<external-ip>:8080/api/health
OK

If everything is in order, you can now access the web interface by navigating to http://<external-ip>:8080/ in your browser.

Cleaning up

To remove Skupper and the other resources from this exercise, use the following commands:

West:

skupper delete
kubectl delete service/frontend
kubectl delete deployment/frontend
kubectl delete -f west/policy.yaml

East:

skupper delete
kubectl delete deployment/backend
kubectl delete -f east/policy.yaml

Next steps

Check out the other examples on the Skupper website.

About this example

This example was produced using Skewer, a library for documenting and testing Skupper examples.

Skewer provides utility functions for generating the README and running the example steps. Use the ./plano command in the project root to see what is available.

To quickly stand up the example using Minikube, try the ./plano demo command.

About

Use Skupper cluster policy to restrict site linking and service exposure

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages