zyclonite / zerotier-docker

ZeroTier One as Docker Image
MIT License
321 stars 84 forks source link

K8s Deployment and Documentation Suggestions #21

Open sherif-fanous opened 1 year ago

sherif-fanous commented 1 year ago

First off, thanks for a great solution. It's unfortunate that zerotier don't directly provide/maintain a router based image as Tailscale do.

I managed to get zerotier:router running on my home lab K8s cluster.

The starter deployment provided in the repo here helped but I believe it could do with a few enhancements along with some documentation.

Here is the deployment manifest I ended up with

apiVersion: apps/v1
kind: Deployment
metadata:
  namespace: zerotier
  name: zerotier
  labels:
    app: zerotier
spec:
  replicas: 1
  selector:
    matchLabels:
      app: zerotier
  template:
    metadata:
      name: zerotier
      labels:
        app: zerotier
    spec:
       initContainers:
         - name: network-joiner
           image: busybox:latest
           env:
             - name: NETWORK_ID
               value: <Network_ID>
           command:
             - /bin/sh
             - -ec
             - mkdir -p /var/lib/zerotier-one/networks.d && touch /var/lib/zerotier-one/networks.d/$(NETWORK_ID).conf
           volumeMounts:
             - name: zerotier-working-directory
               mountPath: /var/lib/zerotier-one
      containers:
        - name: zerotier
          image: zyclonite/zerotier:router
          env:
            - name: ZEROTIER_ONE_GATEWAY_MODE
              value: inbound
            - name: ZEROTIER_ONE_LOCAL_PHYS
              value: eth0
            - name: ZEROTIER_ONE_NETWORK_IDS
              value: <Network_ID>
            - name: ZEROTIER_ONE_USE_IPTABLES_NFT
              value: "false"
          imagePullPolicy: Always
          securityContext:
            capabilities:
              add:
                - NET_ADMIN
                - NET_RAW
                - SYS_ADMIN
          volumeMounts:
            - name: tun
              mountPath: /dev/net/tun
              readOnly: true
            - name: zerotier-working-directory
              mountPath: /var/lib/zerotier-one
      securityContext:
        sysctls:
          - name: net.ipv4.ip_forward
            value: "1"
      volumes:
        - name: tun
          hostPath:
            path: /dev/net/tun
        - name: zerotier-working-directory
          persistentVolumeClaim:
            claimName: zerotier

The main issue with the deployment in the repo is that it is missing the following

securityContext:
  sysctls:
    - name: net.ipv4.ip_forward
      value: "1"

Just adding this to the deployment manifest is not enough though as per https://kubernetes.io/docs/tasks/administer-cluster/sysctl-cluster/#enabling-unsafe-sysctls

In my particular case (Cluster created with kubeadm), I had to add the following to the Kubelet config file. In my case the config file is /var/lib/kubelet/config.yaml

allowedUnsafeSysctls:
- net.ipv4.ip_forward

With this setup the pod is able to set net.ipv4.ip_forward to 1 and route traffic between the zerotier network and my K8s overlay pod and service networks.

Slyke commented 8 months ago

How did you deal with configuring iptables for custom routes and NATing?

sherif-fanous commented 8 months ago

@Slyke I didn't have to do anything. The container handles all this automatically.

Slyke commented 8 months ago

@sherif-fanous I'm having a terrible time getting it to route over Kubernetes, lol. Why is /dev/net/tun required?

sherif-fanous commented 8 months ago

@Slyke See the instructions here

I have this setup successfully working in 3 clusters using the instructions in the first post.