kubernetes - 如何配置 NGINX 入口 Controller 以与 Cloudflare 和 digital ocean 负载均衡器配合使用?

标签 kubernetes digital-ocean cloudflare kubernetes-ingress nginx-ingress

我已经尝试了 this question 中的答案。这是我当前的配置:

apiVersion: v1
kind: ConfigMap
metadata:
  labels:
    helm.sh/chart: ingress-nginx-2.13.0
    app.kubernetes.io/name: ingress-nginx
    app.kubernetes.io/instance: ingress-nginx
    app.kubernetes.io/version: 0.35.0
    app.kubernetes.io/managed-by: Helm
    app.kubernetes.io/component: controller
  name: ingress-nginx-controller
  namespace: ingress-nginx
data:
  use-proxy-protocol: 'true'
  enable-real-ip: "true"
  proxy-real-ip-cidr: "173.245.48.0/20,173.245.48.0/20,103.21.244.0/22,103.22.200.0/22,103.31.4.0/22,141.101.64.0/18,108.162.192.0/18,190.93.240.0/20,188.114.96.0/20,197.234.240.0/22,198.41.128.0/17,162.158.0.0/15,104.16.0.0/12,172.64.0.0/13,131.0.72.0/22,2400:cb00::/32,2606:4700::/32,2803:f800::/32,2405:b500::/32,2405:8100::/32,2a06:98c0::/29,2c0f:f248::/32"
  # use-forwarded-headers: "true"
  # compute-full-forwarded-for: "true"
  # forwarded-for-header: "Cf-Connecting-Ip"
  # forwarded-for-header: "X-Original-Forwarded-For"
  server-snippet: |
    real_ip_header CF-Connecting-IP;

我尝试过的所有配置实际上都没有将原始 IP 作为真实 IP。

在应用配置之前,我得到:

Host: example.com
X-Request-ID: deadcafe
X-Real-IP: 162.158.X.X (A Cloudflare IP)
X-Forwarded-For: 162.158.X.X (Same as above)
X-Forwarded-Proto: https
X-Forwarded-Host: example.com
X-Forwarded-Port: 80
X-Scheme: https
X-Original-Forwarded-For: <The Originating IP that I want>
Accept-Encoding: gzip
CF-IPCountry: IN
CF-RAY: cafedeed
CF-Visitor: {"scheme":"https"}
user-agent: Mozilla/5.0 
accept-language: en-US,en;q=0.5
referer: https://pv-hr.jptec.in/
upgrade-insecure-requests: 1
cookie: __cfduid=012dadfad
CF-Request-ID: 01234faddad
CF-Connecting-IP: <The Originating IP that I want>
CDN-Loop: cloudflare

应用配置映射后,标题为:

Host: example.com
X-Request-ID: 0123fda
X-Real-IP: 10.X.X.X (An IP that matches the private ip of the Digital Ocean droplets in the vpc, so guessing its the load balancer)
X-Forwarded-For: 10.X.X.X (Same as above)
X-Forwarded-Proto: http
X-Forwarded-Host: example.com
X-Forwarded-Port: 80
X-Scheme: http
X-Original-Forwarded-For: <Originating IP>
Accept-Encoding: gzip
CF-IPCountry: US
CF-RAY: 5005deeb
CF-Visitor: {"scheme":"https"}
accept: /
user-agent: Mozilla/5.0
CF-Request-ID: 1EE7af
CF-Connecting-IP: <Originating IP>
CDN-Loop: cloudflare

因此,配置后唯一的变化是真实 IP 现在指向 Digital Ocean vpc 上的某些内部资源。我无法找到它,但我猜它是负载平衡器。我确信它是 DO 资源,因为它与 kubernetes 节点的 ip 匹配。所以,我不太确定为什么会发生这种情况,以及我应该做什么才能将原始 ip 作为真实 ip。

最佳答案

您面临的问题在这里:

proxy-real-ip-cidr:“173.245.48.0/20,173.245.48.0/20,103.21.244.0/22,103.22.200.0/22,103.31.4.0/22,141.101.64.0/18,108.162.192。 0/18,190.93.240.0/20,188.114.96.0/20,197.234.240.0/22,198.41.128.0/17,162.158.0.0/15,104.16.0.0/12,172.64.0.0/13,131.0.72.0/22,2400:cb00::/32,2606:4700::/32, 2803:f800::/32 ,2405:b500::/32,2405:8100::/32,2a06:98c0::/29,2c0f:f248::/32"

但是,看到的流量来自您的 DO LB,而不是 10.x.x.x。这导致该规则被忽略。

我做了以下操作来使其正常运行:

apiVersion: v1
data:
  enable-real-ip: "true"
  server-snippet: |
    real_ip_header CF-Connecting-IP;
kind: ConfigMap
metadata:
[...]

安全声明:这将适用于所有流量,即使它不是源自 Cloudflare 本身。因此,有人可以欺骗请求的 header 来冒充另一个 IP 地址。

关于kubernetes - 如何配置 NGINX 入口 Controller 以与 Cloudflare 和 digital ocean 负载均衡器配合使用?,我们在Stack Overflow上找到一个类似的问题: https://stackoverflow.com/questions/64295445/

相关文章:

kubernetes - 将 prometheus 图表从 prometheus-operator 更新为 kube-prometheus-stack

docker - 如何更新所有命名空间的 Kubernetes secret

java - 调用K8s集群上运行的docker容器内的特定java主类

node.js - 如何在服务器上部署 Node Js 后端和 React Js 前端?

docker - 失败的 docker build 没有日志 - "configured logging driver does not support reading"

sockets - 使用Cloudflare的套接字IO给出了/socket.io/?EIO=3&transport=polling&t=M8UDUNL的404

ssl - 如何在 FR 帐户上未启用 SSL 的情况下将 Cloudflare SSL 与 Fortrabbit 一起使用?

c# - 401 的 ASP.NET WebApi 调用更改为 303 -> 400

docker - 当 docker 容器 pod 出现 Error 或 CarshLoopBackOff kubernetes 时发出警报

linux - 如何获取我的队列 :work to work on digital ocean server