-
Notifications
You must be signed in to change notification settings - Fork 712
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Wrongly attributed local side in outbound internet connections #1598
Comments
There are entries in the network topology indicating that Scope indeed identified short-lived connections between the scope probe (10.0.2.15) and hosts like I am not sure how that could had happened, but it's certainly not the app's fault. ";10.0.2.15;51392": {
"id": ";10.0.2.15;51392",
"topology": "endpoint",
"counters": {},
"sets": {},
"adjacency": [
";216.58.213.106;443"
],
"edges": {
";216.58.213.106;443": {}
},
"controls": {},
"latest": {
"addr": {
"timestamp": "2016-06-17T11:13:12.385838862Z",
"value": "10.0.2.15"
},
"copy_of": {
"timestamp": "2016-06-17T11:13:12.385838862Z",
"value": ";10.32.0.16;51392"
},
"port": {
"timestamp": "2016-06-17T11:13:12.385838862Z",
"value": "51392"
},
"conntracked": {
"timestamp": "2016-06-17T11:13:12.192988883Z",
"value": "true"
}
},
"parents": {},
"children": null
},
[...]
";216.58.213.106;443": {
"id": ";216.58.213.106;443",
"topology": "endpoint",
"counters": {},
"sets": {
"reverse_dns_names": [
"lhr25s02-in-f10.1e100.net",
"lhr25s02-in-f106.1e100.net"
]
},
"adjacency": null,
"edges": {},
"controls": {},
"latest": {
"conntracked": {
"timestamp": "2016-06-17T11:13:12.192990336Z",
"value": "true"
},
"addr": {
"timestamp": "2016-06-17T11:13:12.192984244Z",
"value": "216.58.213.106"
},
"port": {
"timestamp": "2016-06-17T11:13:12.192984244Z",
"value": "443"
}
},
"parents": {},
"children": null
}, I am going to try to reproduce and check the conntrack flows. I am suspecting that, for some reason, flows may be lingering like in #1110 and get attributed to the wrong container when destroying and recreating the service. |
I have managed to reproduce and flows do show established connections from the probe IP to
Which I believe means that This triggers two questions:
|
So:
|
After a short discussion with @tomwilkie , it turns out that we don't treat the host networking namespace specially. So, if there's a single container mapped to the host networking namespace, all the short-lived connections from/to the host will be attributed to it (Related #1260 ) So, we should:
|
After some thought, I've concluded that the duplication is technically correct, since it just adds the IP/ports with and without translation, which are unique. We do it, among other things, to identify connections between DNAT-ed containers in different hosts. What's wrong is attributing the duplicated endpoint to a container in the host networking namespace since: not only it can belong to another process in the same networking namespace, but also it might not really belong to any process at all (if it's a DNAT-ed address like in this case). |
I was running the service locally to test the 0.16 release (#1587) and got puzzled when I saw authfe was talking to the internet
Then I realized that it's due to the new logging sidecar talking to bigquery:
... but the local side is being attributed to a scope probe instead of the authfe pod (note the the connections to hosts like
lhr25s01-in-f74.1e100.net
fromscope-probe-tgeqv
)Report: report.json.gz
The text was updated successfully, but these errors were encountered: