You can use NGINX to proxy into a Consul Connect service mesh without a sidecar by fetching the required certificates using Consul-Template. This guide is based off the introductory Connect Services - Service Mesh Learn guide and, like it, reviews a simple example you can run locally. Please see the mesh introductory guide for more details as this guide will just run through the basics to get the example running.
This guide is only meant to demonstrate features and many things have been simplified, it is not a production ready or secure deployment.
To follow this guide you'll need Nginx, a web-server, Consul and Consul-template installed. Additionally the shell script requires some standard Unix CLI tools as well as GNU Screen.
Each of the services below will run in the foreground and output its logs to that console. They are designed to all run from files in the same directory.
For convenience, you can find a shell script to extract the configuration files and run the commands the from this document in the nginx-connect-proxy/ sub-directory. The script should be a handy reference even if you don't want to run it directly.
Start the consul agent in dev mode using the configuration file below for the 'webserver' and 'ingress' services.
$ consul agent -dev -log-level=info -config-file=consul-services.json
This contains the service definitions for both the webserver
and the
ingress
proxy (below). The names used are important as those are how you will
refer to them later.
cat > consul-services.json << EOF
{
"services": [
{
"name": "ingress",
"port": 8080
},
{
"name": "webserver",
"connect": { "sidecar_service": {} },
"port": 8000
}
]
}
EOF
First, you need a web server to proxy to and for that we'll just use the simple
http server included with Python as you probably already have it installed. By
default it listens on port 8000 and will publish an index.html
if found.
$ python -m SimpleHTTPServer
Then start the sidecar for the webserver
service.
$ consul connect proxy -sidecar-for webserver
Note: the argument to -sidecar-for
needs to match the name registered
with consul in the consul-services.json
config file above.
cat > index.html << EOF
Brought to you by NGINX!
EOF
Now that you have a web-server running, registered with Consul with a sidecar proxy running, you can run a NGINX proxy that will route traffic directly to the web-server's sidecar via the encrypted mesh network.
To connect to the mesh network you will need the required TLS certificates, the root certificate (the CA) and the client certificates. You can use a separate template for each certificate, to put each in their own file.
cat > ca.crt.tmpl << EOF
{{range caRoots}}{{.RootCertPEM}}{{end}}
EOF
cat > cert.pem.tmpl << EOF
{{with caLeaf "ingress"}}{{.CertPEM}}{{end}}
EOF
cat > cert.key.tmpl << EOF
{{with caLeaf "ingress"}}{{.PrivateKeyPEM}}{{end}}
EOF
With all the certificate templates in place, you now just need the
configuration file template for the NGINX proxy, it uses the connect
template
function to get all the "webserver" connect enabled services.
cat > nginx-proxy.conf.tmpl << EOF
daemon off;
master_process off;
pid nginx.pid;
error_log /dev/stdout;
events {}
http {
access_log /dev/stdout;
server {
listen 8080 default_server;
location / {
{{range connect "webserver"}}
proxy_pass https://{{.Address}}:{{.Port}};
{{end}}
# these refer to files written by templates above
proxy_ssl_certificate cert.pem;
proxy_ssl_certificate_key cert.key;
proxy_ssl_trusted_certificate ca.crt;
}
}
}
EOF
For more on the details of the NGINX configuration file, please see the NGINX documentation.
Using the consul-template configuration below, run the NGINX proxy.
$ consul-template -config ingress-config.hcl -log-level=info
Consul-template will restart the NGINX server when any of the templates are rendered (files written). Note that if multiple templates are rendered, it will still only restart it once.
cat > ingress-config.hcl << EOF
exec {
command = "/usr/sbin/nginx -p . -c nginx-proxy.conf"
}
template {
source = "ca.crt.tmpl"
destination = "ca.crt"
}
template {
source = "cert.pem.tmpl"
destination = "cert.pem"
}
template {
source = "cert.key.tmpl"
destination = "cert.key"
}
template {
source = "nginx-proxy.conf.tmpl"
destination = "nginx-proxy.conf"
}
EOF
$ curl http://localhost:8080
Welcome to nginx!
Since the ingress service was registered with Consul, you can control what services it is able to connect to within the mesh network using intentions. Note that you refer to the services using the names registered with consul above.
$ curl http://localhost:8080
Welcome to nginx!
$ consul intention create -deny ingress webserver
Created: ingress => webserver (deny)
$ curl http://localhost:8080
<html>
<head><title>502 Bad Gateway</title></head>
<body bgcolor="white">
<center><h1>502 Bad Gateway</h1></center>
<hr><center>nginx/1.14.2</center>
</body>
</html>
$ consul intention delete ingress webserver
Intention deleted.
$ curl http://localhost:8080
Welcome to nginx!
Included is a shell script that will extract the config files from this document and runs all the different services in multiple GNU Screen windows. The script provides some basic instructions on using Screen.
$ cd examples/nginx-connect-proxy/
$ ./run-nginx-connect-proxy
...