Project Network Isolation

KubeSphere project network isolation lets project administrators enforce which network traffic is allowed using different rules. This tutorial demonstrates how to enable network isolation among projects and set rules to control network traffic.

Prerequisites

Note

For the implementation of the Network Policy, you can refer to KubeSphere NetworkPolicy.

Enable/Disable Project Network Isolation

  1. Log in to KubeSphere as project-admin. Go to your project and select Network Isolation in Project Settings. By default, project network isolation is disabled.

    project-network-isolation

  2. To enable project network isolation, click On.

    Note

    When network isolation is turned on, egress traffic will be allowed by default, while ingress traffic will be denied for different projects. But when you add an egress network policy, only traffic that matches your policy will be allowed to go out.

  3. You can also disable network isolation on this page.

    isolation-off

    Note

    When network isolation is turned off, any previously created network policies will be deleted as well.

Set a Network Policy

If the default policy does not meet your needs when network isolation is enabled, you can customize your network policy to meet your needs. Currently, you can add custom network policies in KubeSphere for traffic within the cluster or incoming traffic outside the cluster.

For internal traffic within the cluster

Network policies at the project level within a cluster are used to control whether resources in this project can be accessed by other projects within the same cluster, and which Services you can access.

Assume a NGINX Deployment workload has been created in another project demo-project-2 and is exposed via the Service nginx on the port 80 with TCP. Here is an example of how to set ingress and egress traffic rules.

Note

For more information about how to create workloads, see Deployments and Services respectively.

Allow ingress traffic from workloads in a different project

  1. On the Network Isolation page of your current project, select Cluster Internal Allowlist.

  2. Click Add Allowlist.

  3. Select Ingress under Direction.

  4. Select the tab Project under Type.

  5. Select the project demo-project-2.

    ingress-rule

  6. Click OK and you can see that the project is now in the allowlist.

    ingress-rule-added

Note

If the network is not accessible after you set the network policy, then you need to check whether the peer project has a corresponding egress rule in it.

Allow egress traffic to Services in a different project

  1. On the Network Isolation page of your current project, select Cluster Internal Allowlist.

  2. Click Add Allowlist.

  3. Select Egress under Direction.

  4. Select the tab Service under Type.

  5. Select the project demo-project-2 from the drop-down list.

  6. Select the Service that is allowed to receive egress traffic. In this case, check nginx.

    engress-rule

  7. Click OK and you can see that the Service is now in the allowlist.

    egress-rule-added

Note

When creating a Service, you must make sure that the selectors of the Service are not empty.

For incoming traffic outside the cluster

KubeSphere uses CIDR to distinguish between peers. Assume a Tomcat Deployment workload has been created in your current project and is exposed via the NodePort Service demo-service on the NodePort 80 with TCP. For an external client with the IP address 192.168.1.1 to access this Service, you need to add a rule for it.

Allow ingress traffic from an client outside the cluster

  1. On the Network Isolation page of your current project, select Cluster External IP Address and click Add Rule.

  2. Select Ingress under Direction.

  3. Enter 192.168.1.1/32 for CIDR.

  4. Select the protocol TCP and enter 80 as the port number.

    ingress-CIDR

  5. Click OK and you can see that the rule has been added.

    ingress-cidr-set

Note

It is recommended to set spec.externalTrafficPolicy in the Service configuration to local, so that the source address of the packet will not change. Namely, the source address of the packet is the source address of the client.

Assume the IP address of an external client is http://10.1.0.1:80, then you need to set a rule for the egress traffic so that the internal Service can access it.

Allow egress traffic to Services outside the cluster

  1. On the Network Isolation page of your current project, select Cluster External IP Address and click Add Rule.

  2. Select Egress under Direction.

  3. Enter 10.1.0.1/32 for CIDR.

  4. Select the protocol TCP and enter 80 as the port number.

    egress-CIDR

  5. Click OK and you can see that the rule has been added.

    egress-CIDR-added

Note

In step 4, when you select SCTP, you must make sure SCTP is enabled.

Best practices

To ensure that all Pods in a project are secure, a best practice is to enable network isolation. When network isolation is on, the project cannot be accessed by other projects. If your workloads need to be accessed by others, you can follow these steps:

  1. Set a gateway in Project Settings.
  2. Expose workloads that need to be accessed to a gateway via a Service.
  3. Allow ingress traffic from the namespace where your gateway locates.

If egress traffic is controlled, you should have a clear plan of what projects, Services, and IP addresses can be accessed, and then add them one by one. If you are not sure about what you want, it is recommended that you keep your network policy unchanged.

FAQs

Q: Why can’t the custom monitoring system of KubeSphere get data after I enabled network isolation?

A: After you enabled custom monitoring, the KubeSphere monitoring system will access the metrics of the Pod. You need to allow ingress traffic for the KubeSphere monitoring system. Otherwise, it cannot access Pod metrics.

KubeSphere provides a configuration item allowedIngressNamespaces to simplify similar configurations, which allows all projects listed in the configuration.

  1. [email protected]:~# kubectl get -n kubesphere-system clusterconfigurations.installer.kubesphere.io ks-installer -o yaml
  2. apiVersion: installer.kubesphere.io/v1alpha1
  3. kind: ClusterConfiguration
  4. metadata:
  5. ...
  6. name: ks-installer
  7. namespace: kubesphere-system
  8. ...
  9. spec:
  10. ...
  11. networkpolicy:
  12. enabled: true
  13. nsnpOptions:
  14. allowedIngressNamespaces:
  15. - kubesphere-system
  16. - kubesphere-monitoring-system
  17. ...

Q: Why can’t I access a Service even after setting a network policy through the Service?

A: When you add a network policy and access the Service via the cluster IP address, if the network is not working, check the kube-proxy configuration to see if masqueradeAll is false.

  1. [email protected]:~# kubectl get cm -n kube-system kube-proxy -o yaml
  2. apiVersion: v1
  3. data:
  4. config.conf: |-
  5. ...
  6. iptables:
  7. masqueradeAll: false
  8. ...
  9. ...
  10. kind: ConfigMap
  11. metadata:
  12. ...
  13. labels:
  14. app: kube-proxy
  15. name: kube-proxy
  16. namespace: kube-system
  17. ...

Q: How do I determine the CIDR when I set the ingress rule?

A: In Kubernetes, the source IP address of the packet is often handled by NAT, so you need to figure out what the source address of the packet will be before you add the rule. For more information, refer to Source IP.