How did that sidecar get there?

Scott Rahner
Nov 19, 2018 · 7 min read

One way to automate and extend Kubernetes.

When I began investigating sidecars and service meshes I needed to understand how a key feature, automatic sidecar injection, worked. If I use something like Istio or Consul, when I deploy my application container, an Envoy container suddenly appears preconfigured in the same pod. Huh? How? This led me to start digging….

For those who are unaware, a sidecar container is a container that you deploy alongside your application containers to assist the application in some way. A few examples of this include a proxy to help manage traffic and terminate TLS, a container for streaming logs and metrics, or a container that scans for security issues. The idea is to isolate and encapsulate the various concerns of a full application from the business logic itself by using separate containers for each function.

Before I continue, I want to set some expectations. The point of this article is not to explain the intricacies or use cases of Docker, Kubernetes, service meshes, etc., but rather to clearly illustrate one powerful method for extending these technologies. This article is for those already somewhat familiar with using these technologies or, at the very least, done a good amount of reading. You will need a machine with docker and Kubernetes already setup to try this. Easiest method: https://docs.docker.com/docker-for-windows/kubernetes/ (works on docker for mac as well)

Overview

First, let’s take apart Kubernetes a bit.

Kube Arch licensed under CC BY 4.0

When you want to deploy something to Kubernetes, you need to send an object to the kube-apiserver. The way most folks do that is by passing arguments or a YAML file to kubectl. When you do this, the API server goes through a handful of stages before pushing the data to etcd and getting things scheduled:

This is the pipeline we need to understand in order to understand how sidecar injection works. Specifically, we need to look at Admission Control, which is where Kubernetes validates and, if needed, alters the objects before they are persisted. Kubernetes also allows the registration of webhooks, which can perform custom validation and mutation.

However, this process of creating and registering custom hooks is not tremendously straightforward or well documented. I had to spend several days reading and rereading documents and reverse engineering both Istio and Consul code. I honestly spent at least half a day doing random trial and error when it came to coding some of the API response.

So, once I finally had this working, I thought it would be unconscionable not to share it with all of you. It’s simple and powerful. The lack of a clear guide was the only thing missing!

The Code

The webhook is exactly what is sounds like: an HTTP endpoint that implements an API defined by Kubernetes. You are creating an API server that Kubernetes can call before proceeding with deployments. This was one of the more cryptic items to get right. There were only a couple examples, some just Kubernetes unit tests, others buried in some pretty large code bases, all written in Go. I choose something a bit more accessible — Node.js:

index.js

The API path, /mutate in this case, can be whatever you like (just needs to match the Kubernetes YAML later on) — the important thing is to see and understand the JSON you receive from the API server. In this use case we aren’t grabbing anything out of the JSON, but you may need to. What we are doing in the code above is updating the JSON. You need two things for this: 1) learn and understand JSON Patch, and 2) properly convert the JSON Patch statement into a base64 encoded byte array. Once you get those two things right, you just need to respond to the API server with a very simple object. In this case, we are simply adding a label to any pod that comes through: foo=bar.

The Deployment

Ok, so we have some code that can listen and respond to requests from the Kubernetes API server, but where do we deploy it? And how do we get Kubernetes to forward us those requests? You can deploy this endpoint anywhere the Kubernetes API server has connectivity. The simplest place to deploy this code is within the Kubernetes cluster itself, which is what we will do for this example. I’ve tried to keep the example as simple as possible so everything is done with Docker and kubectl. Let’s start by building a container to host the code:

Dockerfile

As you can see this is as simple as it gets. Take the community node image and push our code into it. Then you can do a simple build:

docker build . -t localserver

Next, we create a Kubernetes deployment:

deployment.yaml

Notice how we reference the image we just created? This could have just as easily been a pod, or anything we can connect a Kubernetes service to. Let’s define that service next:

service.yaml

That will create an internal named endpoint within Kubernetes that points to our container. The final step will be to tell Kubernetes that we want the API server to call this service when it’s ready to do mutations:

hook.yaml

MutatingWebhookConfiguration… that’s a mouthful. The name and path can be anything here, but I tried to make them as semantic as possible. Changing the path will mean you also need to change it in your JavaScript. The webhook failurePolicy is important as well — that will determine whether or not the object should be persisted if your hook returns an error or fails. In this case, we are telling Kubernetes NOT to proceed if that happens. Finally, the rules — these will change depending on what type of API calls you want Kubernetes to send. Here, since we are trying to emulate sidecar injection, we want to intercept pod creation requests.

That’s it! So simple… but what about security? One aspect we won’t cover here is RBAC within Kubernetes. I am assuming that you are just running all this with minikube, or the Kubernetes that comes with Docker for X. However, we will cover one required element. Kubernetes API server will only call HTTPS endpoints, and for that, you need to have SSL certificates on the application. You’ll also need to tell Kubernetes what the root certificate authority is.

TLS

For DEMO PURPOSES ONLY — I have added some code to the Dockerfile to create a root CA and use it to sign a certificate:

I figured I’d save you the trouble of dusting off your OpenSSL and the 10 to 15 tries it took me to get this right. Notice: the last step cats a base64 encoded single line of the root CA. That is what’s required for the hook configuration, so when you are testing this for yourself later, make sure to cut and paste that into the caBundle field of hook.yaml. The Dockerfile drops the certs right in the WORKDIR so the Javascript just picks them right up and uses them for the server:

Now, we have the code updated to run HTTPS and have told Kubernetes where to find us and which certificate authority to trust. All that’s left is to deploy it all to the cluster:

kubectl create -f deployment.yaml
kubectl create -f service.yaml
kubectl create -f hook.yaml

Recap

  • The deployment.yaml runs our container which serves the hook API via https and returns the JSON Patch to mutate the object
  • The service.yaml gives our container an endpoint: webhook-service.default.svc
  • The hook.yaml tells the API server where to find us https://webhook-service.default.svc/mutate

Test it!

Now that everything is deployed to the cluster, let’s test it by adding a new pod/deployment. If everything is working the hook should add the extra foo label:

test.yaml

kubectl create -f test.yaml

Ok so you got “deployment.apps test created”… but did it work?

kubectl describe pods testName: test-6f79f9f8bd-r7tbd
Namespace: default
Node: docker-for-desktop/192.168.65.3
Start Time: Sat, 10 Nov 2018 16:08:47 -0500
Labels: component=test
foo=bar

Awesome! You see how, even though test.yaml only had a component label, the resulting pod has two labels component and foo?

Homework

Wait?! Weren’t we going to be using this to create a sidecar container? … I said I was going to show you how to add a sidecar ;) Now you have the knowledge and even the resulting code: https://github.com/dowjones/k8s-webhook Go play with it and figure out how to make your own auto injected sidecar. It should be pretty simple. You just need to figure out the proper JSON Patch that will add the extra container to the list in the test deployment. Happy Orchestrating!

Comments, questions, corrections? Just let me know on twitter, via email scott.rahner@dowjones.com, submit an issue, or comment right here!

Dow Jones Tech

Dow Jones Technology's blog – follow us to learn more about how we power our products, such as the Wall Street Journal, Barron's, MarketWatch and more, to move markets, inform critical decisions and power top companies and careers.

Scott Rahner

Written by

Avid skier, novice archer, and distinguished engineer @DowJones

Dow Jones Tech

Dow Jones Technology's blog – follow us to learn more about how we power our products, such as the Wall Street Journal, Barron's, MarketWatch and more, to move markets, inform critical decisions and power top companies and careers.

More From Medium

Welcome to a place where words matter. On Medium, smart voices and original ideas take center stage - with no ads in sight. Watch
Follow all the topics you care about, and we’ll deliver the best stories for you to your homepage and inbox. Explore
Get unlimited access to the best stories on Medium — and support writers while you’re at it. Just $5/month. Upgrade