Istio CNI Implementation in OpenShift
Overview
Istio CNI is a component of the Istio service mesh that modifies pod networking to transparently redirect traffic through the service mesh. In OpenShift environments, Istio CNI has specific configuration and operational aspects that differ from standard Kubernetes deployments.
Components and Deployment
Istio CNI is deployed as a daemonset named istio-cni-node
. This daemonset runs on all cluster nodes and performs two primary functions:
- Deploy CNI Plugin Binary: The container image contains the CNI plugin binary, which it copies to the node’s CNI plugin directory.
- Generate CNI Configuration: The daemonset creates the appropriate CNI configuration file on each node.
Path Differences: Standard K8s vs OpenShift
Resource | Standard K8s Path | OpenShift Path |
---|---|---|
CNI Plugin Binary | /opt/cni/bin | /var/lib/cni/bin |
CNI Config Files | /etc/cni/net.d/ | /etc/cni/multus/net.d |
Configuration Type
The CNI configuration can be generated in two formats:
.conf
file (whenchained-cni=false
).conflist
file (whenchained-cni=true
)
Important: In OpenShift, chained-cni
is set to false
in the helm values when rendering the CNI daemonset. This causes the generation of a .conf
file rather than a .conflist
file.
Diagram
Plugin Invocation Process
In Kubernetes, CNI plugins are invoked by container runtimes when pods are created or deleted. In OpenShift:
- The container runtime is CRI-O
- CRI-O scans pod annotations for the
k8s.v1.cni.cncf.io/networks
key - When a pod has the annotation
k8s.v1.cni.cncf.io/networks: istio-cni
(or includingistio-cni
in a comma-separated list), CRI-O recognizes it needs to invoke the Istio CNI plugin - CRI-O searches for a NetworkAttachmentDefinition resource:
- If the annotation contains no namespace prefix (e.g., just
istio-cni
), it searches in the pod’s namespace - If the annotation includes a namespace (e.g.,
default/istio-cni
), it searches in that specific namespace
- If the annotation contains no namespace prefix (e.g., just
- Once found, CRI-O invokes the plugin binary from
/var/lib/cni/bin/istio-cni
Example Pod Annotation
1
2
3
metadata:
annotations:
k8s.v1.cni.cncf.io/networks: istio-cni
Alternatively, to use a NetworkAttachmentDefinition from a different namespace:
1
2
3
metadata:
annotations:
k8s.v1.cni.cncf.io/networks: default/istio-cni
NetworkAttachmentDefinition Resource
The NetworkAttachmentDefinition acts as a reference point for CRI-O to find and invoke the appropriate CNI plugin. This is created as part of the Istio CNI installation process and referenced by pod annotations.
Customer Issue and Solution: Init Container Traffic and Istio Redirection
Background
We encountered a customer issue in an OpenShift environment where init containers needed to bypass Istio traffic redirection since the istio-proxy container isn’t ready to handle redirected traffic during init phase.
The Problem
Prior to Istio 1.20, this was handled by running init containers with UID 1337 (the same as istio-proxy), as Istio CNI included rules to skip redirection for traffic from this UID. Beginning with Istio 1.20, this approach stopped working because:
- Istio changed how it selects UIDs in OpenShift environments
- Instead of using a fixed UID 1337, Istio now selects the last UID from the namespace annotation
openshift.io/sa.scc.uid-range
- This broke existing deployments where vault init containers were hardcoded to use UID 1337. The vault init container was hardcoded based on earlier Istio CNI rules to skip redirection for 1337 UID.
- The customer needed a centralized solution that wouldn’t require application teams to modify their deployments. Removing hard-coded UID from vault init containers will required modifying all their existing deployments.
Solution Approaches
We considered several approaches:
- Using excludeOutboundIPRanges:
- This Istio feature skips redirection for traffic to specific IP subnets
- Limitation: Works only for TCP traffic, not for UDP-based DNS queries
- DNS queries would still be redirected to port 15053, failing because istio-proxy wasn’t ready
- Setting hostAliases:
- Add static DNS resolution in pod specs and use excludeOutboundIPRanges
- Rejected because it would require modifications to all application deployments **
- Using k8s native sidecars for istio-proxy
- If we look at real cause of the problem, it is because istio-proxy is not ready to handle the redirected traffic from the init containers.
- k8s native sidecars can solve this issue because then istio-proxy would be run as an ever running init container. You can read more here
- We could not go this path because customer was not at the minimum required k8s(openshift) version for native sidecar support.
- Custom CNI Plugin Solution (Selected Approach):
- Develop a shell-based CNI plugin to add iptables rules skipping redirection for UID 1337
- Deploy via ConfigMap and DaemonSet
- Add NetworkAttachmentDefinition for the custom plugin
- Modify sidecar-injection-template to include the custom plugin in network annotations
Implementation Details
The solution uses a custom CNI plugin with these components:
- A ConfigMap containing:
- CNI configuration file (
99-exclude-dns.conf
) - Shell script implementing the CNI plugin logic
- CNI configuration file (
- A DaemonSet that:
- Mounts the ConfigMap
- Copies the plugin to
/var/lib/cni/bin
- Copies the configuration to
/etc/cni/multus/net.d
- The CNI plugin adds an iptables rule to allow traffic from UID 1337 to bypass redirection
1
2
3
4
5
6
7
8
9
10
11
12
# Example CNI configuration
{
"kubernetes": {
"cni_bin_dir": "/var/lib/cni/bin",
"exclude_namespaces": [
"istio-system",
"kube-system"
]
},
"name": "excludedns",
"type": "excludedns"
}
The DaemonSet installs this configuration and the script on all nodes, providing a centralized solution that doesn’t require application teams to modify their deployments.
Debugging Istio CNI in OpenShift
When troubleshooting Istio CNI issues in OpenShift, follow these steps:
1. Verify Pod Annotations
Check if the pod has the proper network annotation:
1
oc get pod <pod-name> -o jsonpath='{.metadata.annotations.k8s\.v1\.cni\.cncf\.io/networks}'
2. Verify NetworkAttachmentDefinition CR
Ensure the NetworkAttachmentDefinition exists in the correct namespace:
1
2
oc get network-attachment-definitions -n <namespace>
oc describe network-attachment-definition <name> -n <namespace>
3. Examine Node CNI Configuration
SSH to the node where the problematic pod is running:
1
oc debug node/ip-10-0-15-84.us-east-2.compute.internal
Once on the node, check CNI config files:
1
2
3
4
5
6
7
8
9
10
11
# Access host filesystem
chroot /host
# Check CNI binaries location
ls -la /var/lib/cni/bin/
# Check CNI configuration directory
ls -la /etc/cni/multus/net.d/
# Examine CNI config content
cat /etc/cni/multus/net.d/<config-file>.conf
4. Check CRI-O Logs
Look for CNI-related errors in the CRI-O logs:
1
journalctl -u crio | grep -i cni
5. Examine Container Details with crictl
List all containers:
1
crictl ps
Find the specific container ID for your pod:
1
crictl ps | grep <pod-name>
6. Determine Container PID
Get the process ID for container inspection:
1
2
crictl inspect <container-id> | grep pid
# Example output: "pid": 12345,
7. Inspect iptables Rules in Container Namespace
View the NAT table rules in the container’s network namespace:
1
nsenter -t <pid> -n iptables -L -n -v -t nat
This lets you verify if the expected Istio redirection rules are present and if any custom rules (like those from the custom CNI plugin) are working as expected.
Summary
In OpenShift environments, Istio CNI operates with specific path differences and configuration settings compared to standard Kubernetes. Understanding these details is critical both for normal operation and for implementing solutions to issues like the init container traffic redirection problem described above.
The key elements are:
- Modified filesystem paths for CNI components
- Use of
.conf
files instead of.conflist
files - Reliance on pod annotations and NetworkAttachmentDefinition resources for plugin invocation
- Integration with CRI-O as the container runtime
- Ability to extend with custom CNI plugins for specialized requirements