App Mesh Inject
The AWS App Mesh Kubernetes sidecar injecting Admission Controller.
Security disclosures
If you think you’ve found a potential security issue, please do not post it in the Issues. Instead, please follow the instructions here or email AWS security directly.
Prerequisites
Install
To deploy the sidecar injector you must export the name of your new mesh
$ export MESH_NAME=my_mesh_name
(Optional) To enable stats_tags on sidecar (Envoy) use
$ export ENABLE_STATS_TAGS=true
(Optional) If enabled, Envoy will emit DogStatsD metrics to 127.0.0.1:8125, where it expects to find a statsd receiver. This could be either a Datadog sidecar, or something like statsd_exporter (see below).
$ export ENABLE_STATSD=true
(Optional) To deploy statsd_exporter as a sidecar, which can recieve statsd metrics and republish them in Prometheus format. It listens for metrics on 127.0.0.1:8125, and exposes a prometheus endpoint at 127.0.0.1:9201. This is useful as statsd provides metrics around request latency (p50, p99 etc), whereas the standard Envoy prometheus endpoint does not.
$ export INJECT_STATSD_EXPORTER_SIDECAR=true
(Optional) To enable the xray-daemon sidecar injection use
$ export INJECT_XRAY_SIDECAR=true
(Optional) The appmesh injector needs a CA bundle to trust the webhooks coming from Kubernetes. The installation scripts will make a best-effort attempt at fetching it automatically, but this cannot be done in some cases.
The CA bundle can also be configured manually by setting a CA_BUNDLE
environment variable to the content of the bundle.
$ export CA_BUNDLE=$(cat /path/to/ca-bundle | base64)
Now you can deploy the appmesh injector
Option 1: clone the repository
$ make deploy
This will bootstrap the required certificates and start the sidecar injector in your cluster.
To cleanup you can run
$ make clean
Option 2: download and execute the install script
curl https://raw.githubusercontent.com/aws/aws-app-mesh-inject/master/scripts/install.sh | bash
To cleanup you can run
kubectl delete namespace appmesh-inject; kubectl delete mutatingwebhookconfiguration aws-app-mesh-inject;
kubectl delete clusterrolebindings aws-app-mesh-inject-binding; kubectl delete clusterrole aws-app-mesh-inject-cr;
Under the hood
Enable Sidecar injection
To enable sidecar injection for a namespace, you need to label the namespace with appmesh.k8s.aws/sidecarInjectorWebhook=enabled
kubectl label namespace appmesh-demo appmesh.k8s.aws/sidecarInjectorWebhook=enabled
Default behavior and how to override
Sidecars will be injected to all new pods in the namespace that has enabled sidecar injector webhook. To disable injecting the sidecar
to particular pods in that namespace, add appmesh.k8s.aws/sidecarInjectorWebhook: disabled
annotation to the pod spec.
All container ports defined in the pod spec will be passed to sidecars as application ports.
To override, add appmesh.k8s.aws/ports: "<ports>"
annotation to the pod spec.
By default all egress traffic ports will be routed, except SSH.
To override, add appmesh.k8s.aws/egressIgnoredPorts: "<ports>"
annotation to the pod spec. ( Comma separated list of ports for which egress traffic will be ignored )
The name of the controller that creates the pod will be used as virtual node name and pass over to the sidecar. For example, if a pod
is created by a deployment, the virtual node name will be <deployment name>-<namespace>
.
To override, add appmesh.k8s.aws/virtualNode: <virtual node name>
annotation to the pod spec.
The mesh name provided at install time can be overridden with the appmesh.k8s.aws/mesh: <mesh name>
annotation at POD spec level.
For example:
apiVersion: appsv1
kind: Deployment
metadata:
labels:
name: my-cool-deployment
spec:
template:
metadata:
annotations:
appmesh.k8s.aws/mesh: my-mesh
appmesh.k8s.aws/ports: "8079,8080"
appmesh.k8s.aws/egressIgnoredPorts: "22"
appmesh.k8s.aws/virtualNode: my-app
appmesh.k8s.aws/sidecarInjectorWebhook: disabled
To see an example on how to use this sidecar injector you can visit the demo page.
Troubleshooting
CA bundle not configured properly
If the CA bundle isn't configured properly, the pod will log the following log message:
TLS handshake error from 10.0.0.1:45390: remote error: tls: bad certificate
If this happens, set the CA_BUNDLE
environment variable to the content of the CA bundle. Make sure that this value is base64 encoded (e.g. it shouldn't start with -----BEGIN CERTIFICATE-----
).