I have a small Kubernetes on prem cluster (Rancher 2.3.6) consisting of three nodes. The deployments inside the cluster are provisioned dynamically by an external application and always have their replica count set to 1, because these are stateful applications and high availability is not needed.
The applications are exposed to the internet by NodePort services with a random port and ExternalTrafficPolicy set to Cluster. So if the user requests one of the three nodes, the k8s proxy will route and s-NAT the request to the correct node with the application pod.
To this point, everything works fine.
The problem started when we added Applications that rely on the requests source IP. Since the s-NAT replaces the request IP with an internal IP this applications don't work properly.
I know, that setting the services ExternalTrafficPolicy to local will disabke s-natting. But this will also break the architecture, because not every pod has an instance of the application running.
Is there a way to preserve the original client IP and still make use of the internal routing, so i won't have to worry about on which node the request will land?
It depends on how the traffic gets into your cluster. But let's break it down a little bit:
Generally, there are two strategies on how to handle source ip preservation:
By default packets to NodePort and LoadBalancer are SourceNAT'd (to the node's IP that received the request), while packets send to ClusterIP are not SourceNAT'd.
As you metioned already, there is a way to turn off SNAT for NodePort and LoadBalancer Services by setting service.spec.externalTrafficPolicy: Local which preserves the original source IP address, but with the undesired effect that kube-proxy only proxies proxy requests to local endpoints, and does not forward traffic to other nodes.
a) Nginx Ingress Controller and L7 LoadBalancer
X-Forwarded-For header, Nginx by default evaluates the header containing the source ip if we have set the LB CIDR/Address in the proxy-real-ip-cidruse-forwarded-headers explicitly to make nginx forward the header informationenable-real-ip so the realip_module replaces the real ip that has ben set in the X-Forwarded-For header provided by the trusted LB specified in proxy-real-ip-cidr.b) Proxy Protocol and L4 LoadBalancer
use-proxy-protocol: "true" the header is not evaulated and the connection details will be send before forwarding the TCP actual connection. The LBs must support this.If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!
Donate Us With