Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Can you chain Cilium on top of other plugins and enable Cilium transparent encryption? #15596

Closed
joestringer opened this issue Apr 7, 2021 · 4 comments
Labels
kind/question Frequently asked questions & answers. This issue will be linked from the documentation's FAQ.

Comments

@joestringer
Copy link
Member

Q: Can you chain Cilium on top of other plugins such as aws-cni or calico, and enable Cilium transparent encryption?

A: This is not supported currently. Typically the other plugin in this scenario is responsible for underlying connectivity to the network, so it is difficult for Cilium to correctly integrate at that layer to ensure that the traffic is encrypted.

Users who are interested in encryption with Cilium are suggested to avoid chaining on top of other plugins, and install Cilium by itself instead.

@joestringer joestringer added the kind/question Frequently asked questions & answers. This issue will be linked from the documentation's FAQ. label Apr 7, 2021
@joestringer
Copy link
Member Author

joestringer commented Apr 7, 2021

@jrfastab and I had a brief discussion on Slack today about this, our assessment was that we don't identify any fundamental limitations that prevent this from being supported, but it would require significant additional work to implement and fully validate. It would depend on the exact packet paths that are taken through the stack while chaining with a particular other plugin.

Beyond that, from a pure operational perspective it is simpler to have just one plugin in charge of the CNI networking, as it is then easier to debug and pinpoint where networking problems are. As such, it's unlikely that we will work on solving this any time soon. We would accept patches to extend Cilium to support this use case.

@dhruvjain51
Copy link

@joestringer - the AWS CNI chaining doc particularly call out IPSec as incompatible with aws cni-chaining. Does the same restriction apply with Wireguard as well?

@joestringer
Copy link
Member Author

The same principle applies in general that the AWS CNI is responsible for networking in that case, so it's hard to guarantee that it will work. You could try it out, and if you find that WireGuard works in your environment chaining with AWS CNI then please report back your findings.

@austince
Copy link
Contributor

For AWS, it seems like they've got a guide for enabling wireguard w/ chaining mode: https://aws.amazon.com/blogs/containers/transparent-encryption-of-node-to-node-traffic-on-amazon-eks-using-wireguard-and-cilium/

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/question Frequently asked questions & answers. This issue will be linked from the documentation's FAQ.
Projects
None yet
Development

No branches or pull requests

3 participants