SDP Kubernetes Injector provides egress access, from Kubernetes workloads to protected resources behind an SDP Gateway, using sidecar injector pattern.
The Injector automatically manages identities for the injected Clients and enables Policy assignment based on Kubernetes labels.
For ingress access, from external clients to SDP Gateway protected workloads in a Kubernetes cluster, use URL access instead.
The following tools are required to install the SDP Kubernetes Injector:
SDP Kubernetes Injector requires following configurations on the SDP Controller:
service
Identity Provider
Service User Management Preset
in the Admin UI.ALLOW TCP up to <INTERNAL DNS IP> - port 53
ALLOW UDP up to <INTERNAL DNS IP> - port 53
ALLOW TCP up to <CONTROLLER ADMIN INTERFACE> - port 8443
Currently, the only supported way of installing the Injector is to use the official Helm charts.
service
Identity ProviderService User Management Preset
privilegesCheck if a supported version of the cert-manager (1.9 or newer) is already installed.
$ kubectl get pods --namespace cert-manager -o jsonpath="{.items[*].spec.containers[*].image}"
If not, install cert-manager and its CRDs with Helm.
$ helm repo add jetstack https://charts.jetstack.io
$ helm repo update
$ helm install cert-manager jetstack/cert-manager \
--namespace cert-manager \
--create-namespace \
--set installCRDs=true
$ helm repo add appgate https://appgate.github.io/sdp-k8s-injector
$ helm repo update
$ helm install sdp-k8s-injector-crd appgate/sdp-k8s-injector-crd \
--namespace sdp-system \
--create-namespace
sdp-injector-api-secret
.
$ kubectl create secret generic sdp-injector-api-secret \
--namespace sdp-system \
--from-literal=sdp-injector-api-username="<USERNAME>" \
--from-literal=sdp-injector-api-password="<PASSWORD>" \
--from-literal=sdp-injector-api-provider="<PROVIDER>"
values.yaml
file. Below is an example of the minimum required configuration. For other parameters, see Parameters
# values.yaml
sdp:
host: https://controller.company.com:8443 # controller admin interface hostname
adminSecret: sdp-injector-api-secret # api credentials secret name from previous step
clusterID: k8s-prod # cluster id, will be visible in the Admin UI
$ helm install sdp-k8s-injector appgate/sdp-k8s-injector \
--namespace sdp-system \
--values values.yaml
Verify the installation.
There should be two pods running in sdp-system
namespace.
$ kubectl get pods --namespace sdp-system
NAME READY STATUS RESTARTS AGE
sdp-k8s-injector-identity-service-67b847bd6-x5jst 1/1 Running 0 3m40s
sdp-k8s-injector-injector-6f7748f888-v88dh 1/1 Running 0 3m40s
k8s
.
https://controller.company.com:8443/ui/identity/service-usersBrowse the available versions on Appgate GitHub Container Registry
This section explains how to test egress access, end to end. We'll create a dedicated namespace, create a Deployment (named pingtest) and give the Pod in that Deployment access to a protected resources.
Note that this will consume 1 Service User license.
We'll assume there is an ICMP Entitlement for a test server: 192.168.111.5
Create an Access Policy named "PingTest K8s Workload".
service
namespace === "sdp-demo"
name === "pingtest"
Create an example namespace sdp-demo
in the cluster and label it with sdp-injection="enabled"
.
$ kubectl create namespace sdp-demo
$ kubectl label namespace sdp-demo --overwrite sdp-injection="enabled"
With the sdp-injection
label, the Injector will monitor this namespace. The default strategy is to inject SDP Client to every Deployment, see Default Injection Strategy for details.
Create a busybox Deployment in the same namespace and verify the following checklist:
$ kubectl create deployment pingtest --namespace sdp-demo --image=busybox --replicas=1 -- sleep infinity
Note that the Injector works with Deployments only, creating Pods directly is not supported.
Verify the access.
From the pod, get a shell first then ping:
$ kubectl -n sdp-demo exec -it $(kubectl get pod -n sdp-demo -l app=pingtest -o name --no-headers) -- sh
$ # ip route | grep tun0
$ # ping 192.168.111.5
From the Admin UI: Go to Home > Active Sessions > k8s-prod_sdp-demo_pingtest and review the claims and entitlements.
If access is not working, see Troubleshooting.
Cleanup the test resources.
$ kubectl delete namespace sdp-demo
Note that the license will be cleanup after 30 days automatically.
The Injector allows SDP Controller to become aware of labels in Kubernetes. By default, the Deployment name and namespace are exposed to SDP as user.labels.name
and user.labels.namespace
respectively.
Assume that we have an Injector installed in the cluster with clusterID=demo
and we have also created a Deployment sleep-forever
like below in the sdp-demo
namespace.
apiVersion: apps/v1
kind: Deployment
metadata:
name: sleep-forever
namespace: sdp-demo
spec:
replicas: 1
selector:
matchLabels:
app: sleep-forever
template:
spec:
containers:
- name: ubuntu
image: ubuntu:latest
command: [ "/bin/bash", "-c", "--" ]
args: [ "while true; do sleep 30; done;" ]
To create a Policy for this deployment, set the following Assignments:
service
user.labels.name
=== sleep-forever
(labels - Expression: name === "sleep-forever"
)user.labels.namespace
=== sdp-demo
(labels - Expression: namespace === "sdp-demo"
)The array tags has item matching demo
(tags - Operator: match
Value: demo
)In addition to the name and namespace, the Injector is able to expose metadata.labels
as conditions for Assignment. For example, if we add metadata.labels.role="sleeper"
to the example above, that label will be available as users.labels.role
in the Policy. You can additionally set the following Assignment:
users.labels.role
=== sleeper
(labels - Expression: role === "sleeper"
)SDP injection is bound to namespaces. Adding the label sdp-injection="enabled"
to a namespace will instruct the Injector to inject a sidecar to all pods in that namespace.
$ kubectl label --overwrite namespace sdp-demo sdp-injection="enabled"
Check the label of the namespace to see if injection is enabled
$ kubectl get namespace sdp-demo -L sdp-injection
NAME STATUS AGE SDP-INJECTION
sdp-demo Active 1m enabled
The Injector (particularly, Identity Service) requires a connection to the Controller API, you may have the Controller API protected via SDP. In that case, you can use the meta-client feature which loads an SDP Client next to the Identity Service so the Injector can establish a connection to the Controller API.
To use the meta-client, you need the following:
sdp-injector-mc-username
- Usernamesdp-injector-mc-password
- Passwordsdp-injector-mc-profile-url
- Profile URLsdp-injector-mc-log-level
- Log level of the meta-clientsdp-injector-mc-device-id
- Device ID (UUID v4) of the meta-client$ kubectl create secret generic sdp-injector-mc-secret --namespace sdp-system \
--from-literal=sdp-injector-mc-username="<USERNAME>" \
--from-literal=sdp-injector-mc-password="<PASSWORD>" \
--from-literal=sdp-injector-mc-profile-url="<URL>"
$ kubectl create configmap sdp-injector-mc-config --namespace sdp-system \
--from-literal=sdp-injector-mc-log-level="<LOG_LEVEL>" \
--from-literal=sdp-injector-mc-device-id="<UUID>"
Additionally, you must provide an Entitlement for this user on the Controller:
ALLOW TCP up to <CONTROLLER ADMIN INTERFACE> - port 8443
<DOMAIN>
<INTERNAL DNS IP>
ALLOW TCP up to <INTERNAL DNS IP> - port 53
ALLOW UDP up to <INTERNAL DNS IP> - port 53
Note: User for the meta-client can be the same user as the Injector user
After creating the secret/configmap and configuring the policy/entitlement on SDP, provide the name of these resources to the helm chart and set sdp.metaClient.enabled=true
.
sdp:
metaClient:
enabled: true
adminSecret: sdp-injector-mc-secret
adminConfig: sdp-injector-mc-config
Upon installation of the chart, this Secret and ConfigMap will be passed to the sidecar injected next to the Identity Service.
You can specify the default injection strategy for a given namespace by specifying the annotation k8s.appgate.com/sdp-injector.strategy
.
There are two supported types of strategy:
enabledByDefault
- Inject sidecars to all pods created within the namespace.disabledByDefault
- Do not inject sidecars to pods automatically.Annotate the namespace with k8s.appgate.com/sdp-injector.strategy=<STRATEGY>
to set strategy. If the annotation is not set on the namespace, it will use enabledByDefault
as its default strategy.
$ kubectl annotate namespace k8s.appgate.com/sdp-injector.enabled="true"
$ kubectl annotate namespace k8s.appgate.com/sdp-injector.strategy="enabledByDefault"
To disable injection at a per-deployment basis in a namespace annotated with enabledByDefault
, annotate the Deployment with k8s.appgate.com/sdp-injector.enabled="false"
.
$ kubectl annotate Deployment <DEPLOYMENT> k8s.appgate.com/sdp-injector.enabled="false"
To enable injection at a per-deployment basis in a namespace annotated with disabledByDefault
, annotate each Deployment with k8s.appgate.com/sdp-injector.enabled=true
.
$ kubectl annotate Deployment <DEPLOYMENT> k8s.appgate.com/sdp-injector.enabled="true"
The Injector takes the helm value sdp.clientVersion
as the default client version to use. By annotating a Pod or Deployment with k8s.appgate.com/sdp-injector.client-version=<VERSION>
, the Injector will load an SDP Client version different from the default.
Assuming the default client version is 6.1, you can inject a 5.5 client at a per-deployment basis by annotating the Deployment with k8s.appgate.com/sdp-injector.client-version=5.5
.
$ kubectl annotate Deployment <DEPLOYMENT> k8s.appgate.com/sdp-injector.client-version="5.5"
When the sidecar injection is enabled and the Injector detects a new Pod with init-containers, it loads extra containers at the head (sdp-init-container-0
) and tail (sdp-init-container-f
) of the init-containers list.
The initial init-container sdp-init-container-0
is meant to preserve the original DNS configuration of the Pod by setting the nameserver to the kube DNS IP address and the nameservers specified in the helm value sdp.dnsmasq.dnsConfig.search
.
The last init-container sdp-init-container-f
overwrite /etc/resolv.conf
by setting the nameserver to 127.0.0.1
so the Pod can use the DNS server provided by the Injector's dnsmasq.
You can disable the injection of these init-containers by annotation the Deployment with k8s.appgate.com/sdp-injector.strategy.disable-init-containers="true"
.
$ kubectl annotate Deployment <DEPLOYMENT> k8s.appgate.com/sdp-injector.disable-init-containers="true"
You can connect multiple Kubernetes clusters to a single SDP system by installing an injector on each cluster. When installing the Injector, set a unique cluster ID in the helm value sdp.clusterID
. To prevent collision of resources created by the Injector, the SDP system will use this ID as a tag or prefix (e.g. Client Profiles, Service Users). It is advised to tag your admin users for each injector with the cluster ID.
SDP Kubernetes Injector supports various annotation-based behavior customization
Annotation | Available Options | Description |
---|---|---|
k8s.appgate.com/sdp-injector.strategy |
enabledByDefault , disabledByDefault |
Defines the default injection strategy of the namespace. Use this annotation with k8s.appgate.com/sdp-injector.enabled . If enabledByDefault , the Injector will always inject sidecars to deployment. If disabledByDefault , the Injector will only inject sidecars to deployments annotated with k8s.appgate.com/sdp-injector.enabled . If the annotation is not specified in the namespace, it will use enabledByDefault . |
k8s.appgate.com/sdp-injector.enabled |
true , false |
Defines whether the sidecar can be injected in the pod. Use this annotation with k8s.appgate.com/sdp-injector.strategy . In a enabledByDefault namespace, the default value will be true . In a disabledByDefault namespace, the default value will be false . |
k8s.appgate.com/sdp-injector.client-version |
6.0 , 6.1 , 6.2 , 6.3 |
Specifies the SDP Client version to inject as a sidecar. The default client version is specified by the helm value sdp.clientVersion . When this annotation is used on a deployment, it will override the helm value. |
k8s.appgate.com/sdp-injector.disable-init-containers |
true , false |
When initContainers are present in a pod, the Injector loads extra init-containers for DNS resolution. This annotation will disable the injection of init-containers if set to false |
k8s.appgate.com/sdp-injector.custom-dns-search |
Space-separated string of domains (e.g. svc.cluster.local cluster.local ) |
Additional domains to the list of domains in the DNS resolution. |
Name | Description | Value |
---|---|---|
global.image.repository |
Image registry to use for all SDP images. | ghcr.io/appgate/sdp-k8s-injector |
global.image.tag |
Image tag to use for all SDP images. If not set, it defaults to .Chart.appVersion . |
"" |
global.image.pullPolicy |
Image pull policy to use for all SDP images. | IfNotPresent |
global.image.pullSecrets |
Image pull secret to use for all SDP images. | [] |
sdp.host |
Hostname of the SDP controller | "" |
sdp.adminSecret |
Name of the secret for initial authentication | "" |
sdp.clientVersion |
Version of the SDP client to inject as sidecars. | 6.3 |
sdp.clusterID |
An identifier to prefix service users and client profiles | "" |
sdp.metaClient.enabled |
Whether to set up an SDP client on the Identity Service | false |
sdp.metaClient.adminSecret |
Name of the secret for initial authentication | "" |
sdp.metaClient.adminConfig |
Name of the config for initial authentication | "" |
sdp.metaClient.dnsService |
IP of the kube-dns service | "" |
sdp.metaClient.dnsConfig.searches |
Search domains to add to the Pod DNS configuration | ["svc.cluster.local","cluster.local"] |
sdp.injector.logLevel |
SDP Injector log level. | info |
sdp.injector.replica |
Number of Device ID Service replicas to deploy | 1 |
sdp.injector.certificatePollingInterval |
Polling interval in seconds to watch for changes to the certificate | 120 |
sdp.injector.image.repository |
SDP Injector image repository. If set, it overrides .global.image.repository . |
"" |
sdp.injector.image.tag |
SDP Injector image tag. If set, it overrides chart.appVersion . |
"" |
sdp.injector.image.pullPolicy |
SDP Injector pull policy. If set, it overrides .global.image.pullPolicy . |
Always |
sdp.identityService.sdpSystemNoVerify |
Do not verify SDP System certificate | false |
sdp.identityService.logLevel |
SDP Identity Service log level. | info |
sdp.identityService.replica |
Number of SDP Identity Service replicas to deploy | 1 |
sdp.identityService.image.repository |
SDP Identity Service image repository. If set, it overrides .global.image.repository . |
"" |
sdp.identityService.image.tag |
SDP Identity Service image tag. If set, it overrides .chart.appVersion . |
"" |
sdp.identityService.image.pullPolicy |
SDP Identity Service pull policy. If set, it overrides .global.image.pullPolicy . |
Always |
sdp.headlessService.image.tag |
SDP Headless Service image repository. If set, it overrides .global.image.repository . |
"" |
sdp.headlessService.image.repository |
SDP Headless Service image tag. If set, it overrides .sdp.clientVersion . |
"" |
sdp.headlessService.image.pullPolicy |
SDP Headless Service image pull policy. If set, it overrides .global.image.pullPolicy . |
Always |
sdp.headlessDriver.image.repository |
SDP Headless Driver image repository. If set, it overrides .global.image.repository . |
"" |
sdp.headlessDriver.image.tag |
SDP Headless Driver image tag. If set, it overrides sdp.clientVersion . |
"" |
sdp.headlessDriver.image.pullPolicy |
SDP Headless Service image pull policy. If set, it overrides .global.image.pullPolicy . |
Always |
sdp.dnsmasq.image.repository |
SDP Dnsmasq image repository. If set, it overrides .global.image.repository . |
"" |
sdp.dnsmasq.image.tag |
SDP Dnsmasq image tag. If set, it overrides sdp.clientVersion . |
"" |
sdp.dnsmasq.image.pullPolicy |
SDP Dnsmasq image pull policy. If set, it overrides .global.image.pullPolicy . |
Always |
sdp.dnsmasq.dnsConfig.searches |
Search domains to add to the Pod DNS configuration | ["svc.cluster.local","cluster.local"] |
This table above was generated using readme-generator-for-helm
SDP Kubernetes Injector consists of the following components:
SDP Identity Service is mainly responsible for the management of the Service User credentials. It consists of the following subcomponents:
As the name implies, Deployment Watcher continuously monitors for the creation of Deployment in the namespace labeled for sidecar injection. Identity Creator communicates with the SDP system to generate SDP system and maintains an in-memory pool of Service User credentials. Identity Manager facilitates the messaging between these subcomponents.
When the SDP Identity Service is initialized, the Identity Creator immediately creates Service Users on the SDP system and stores them as inactive credentials in its in-memory pool. When the Deployment Watcher discovers a newly created Deployment eligible for injection, it requests the Identity Manager to create a new ServiceIdentity. Upon creating a new ServiceIdentity, the Identity Manager instructs the Identity Creator to activate the corresponding Service User credentials which generates a Secret containing the Service User credentials in the deployment's namespace. This Secret is, later, mounted in the Pod and its credentials exposed as environment variables to the sidecar container.
Identity Service is also responsible for the management of Device IDs. When a Pod requires a new Device ID, it will get one from the pool of Device IDs found inside the device_id
field of ServiceIdentity. If there is no Device ID available in the pool, it will allocate a new UUID. On Pod deletion, the Device ID assigned to it is unregistered from controller, released and added back into the pool. Note that, by design, Device IDs unregistered from the Controller does not necessarily deallocate the IP assigned to the Device ID.
Injector is an admission webhook server that mutates Pod creation requests. By registering a Mutating Admission Webhook allows the Injector intercept all Pod creation requests in sdp-injection enabled namespace and patch the necessary configurations to enable egress traffic from Kubernetes workloads to resources protected by SDP.
When patching the pod, the Injector reads the ServiceIdentity and DeviceID (created by the aforementioned service) to inject the correct credentials and device ID into the pod.
Injector uses Controller API for managing identities of injected Clients, so it needs an Admin Role with Service User Management Preset
, which includes the following privileges:
SDP Clients can make DNS queries for specific hosts to specific DNS servers behind the SDP Gateways. This is configured by the sdp-driver which notifies the system about which domains should use the DNS servers behind the SDP Gateways.
In the case of the SDP Kubernetes Injector, a dnsmasq instance is configured according to the instructions that the sdp-driver sends. Since only sdp-driver container can modify /etc/resolv.conf
, the setup is done in the following steps:
/etc/resolv.conf
to point to sdp-dnsmasq. From this point onwards, sdp-dnsmasq takes the responsibility of resolving names inside the pod.The Injector function may fail due to various reasons such as missing secrets, wrong api credentials, unaccessible Controller API.
Make sure that the following pods are running.
$ kubectl get pods -n sdp-system
NAME READY STATUS RESTARTS AGE
sdp-k8s-injector-identity-service-67b847bd6-x5jst 1/1 Running 0 47h
sdp-k8s-injector-injector-6f7748f888-v88dh 1/1 Running 0 47h
Check the logs from the Injector pods:
```shell
$ kubectl logs sdp-k8s-injector-identity-service-67b847bd6-x5jst -n sdp-system
...
$ kubectl logs sdp-k8s-injector-injector-6f7748f888-v88dh -n sdp-system
...
Pod egress access may fail due to various reasons such as insufficient Service User license, missing IP Pool assignment in the Service Identity Provider, no Entitlements due to wrong Policy configuration.
Make sure that all pods are running.
$ kubectl get pods -n sdp-demo
NAME READY STATUS RESTARTS AGE
pingtest-c66bb48f9-s7n8j 4/4 Running 0 2m30s
Check the SDP Client logs, in all 3 sidecar containers: sdp-service, sdp-driver, sdp-dnsmasq
$ kubectl logs pingtest-c66bb48f9-s7n8j sdp-service -n sdp-demo
$ kubectl logs pingtest-c66bb48f9-s7n8j sdp-driver -n sdp-demo
$ kubectl logs pingtest-c66bb48f9-s7n8j sdp-dnsmasq -n sdp-demo
When running on GKE, the firewall needs to be configured to allow traffic from the Kubernetes API into the nodes to the port 8443 even if the service is listening. See issue on GitHub.
You can open a github issue or contact support@appgate.com