Connect external services to Consul with terminating gateways
Consul terminating gateways give your services the ability to communicate securely with applications and services outside of your service mesh. Common use cases include managed services (such as Amazon RDS), legacy services running on an unsupported OS, and hybrid applications transitioning towards the service mesh that require integration testing or are required to maintain compatibility with other legacy systems. This extends the ability to securely connect your applications on any runtime, any cloud, or on-premises environments with Consul.
Terminating gateways provide service mesh extendability to these scenarios that would otherwise require alternate security and policy enforcement mechanisms. They terminate service mesh mTLS connections, enforce intentions, and forward requests to the appropriate destination.
In this tutorial, you will deploy a Consul terminating gateway that provides secure communication with a managed AWS RDS instance. You will connect the front end of the HashiCups demo application to the HashiCups backend database on AWS RDS. In the process you will see how this feature provides you with simplified and secure communication to services external to your service mesh.
Note
Consul v1.19 introduces the Registration
CRD for Consul on Kubernetes to simplify the process to register external services. We recommend using the Registration
CRD to register external services directly with Consul instead of using Terminating Gateways. For more information, refer to Register services running on external nodes to Consul on Kubernetes.
Scenario overview
HashiCups is a coffee shop demo application. It has a microservices architecture and uses Consul service mesh to securely connect the services. At the beginning of this tutorial, you will use Terraform to deploy the HashiCups microservices, a self-managed Consul cluster on AWS EKS, and a managed AWS RDS instance that contains the HashiCups database.
In this tutorial, you will:
- Deploy the following resources with Terraform:
- Elastic Kubernetes Service (EKS) cluster
- A self-managed Consul datacenter on EKS
- A managed AWS RDS instance
- HashiCups demo application on EKS
- Perform the following Consul procedures:
- Explore the demo application (broken state)
- Review and enable the terminating gateway feature
- Register the AWS RDS instance as a Consul service
- Configure and link the AWS RDS service to the terminating gateway
- Update the service mesh applications to communicate with AWS RDS
- Explore the demo application (working state)
Prerequisites
The tutorial assumes that you are familiar with Consul and its core functionality. If you are new to Consul, refer to the Consul Getting Started tutorials collection.
For this tutorial, you will need:
- An AWS account configured for use with Terraform
- terraform >= 1.0
- consul >= 1.17.0
- consul-k8s >= 1.2.1
- helm >= 3.0
- git >= 2.0
- kubectl > 1.24
Clone GitHub repository
Clone the GitHub repository containing the configuration files and resources.
$ git clone https://github.com/hashicorp-education/learn-consul-terminating-gateways
Change into the directory that contains the complete configuration files for this tutorial.
$ cd learn-consul-terminating-gateways/self-managed/eks
Review repository contents
This repository contains Terraform configuration to spin up the initial infrastructure and all files to deploy Consul, the demo application, and the observability suite resources.
The eks
directory contains the following Terraform configuration files:
aws-vpc.tf
defines the AWS VPC resourcesaws-lambda.tf
defines the AWS Lambda resourcesaws-rds.tf
defines the AWS RDS resourceseks-cluster.tf
defines Amazon EKS cluster deployment resourceseks-consul.tf
defines the self-managed Consul deploymenteks-hashicups-with-consul.tf
defines the HashiCups resourcesproviders.tf
defines AWS and Kubernetes provider definitions for Terraformvariables.tf
defines variables you can use to customize the tutorial
The directory also contains the following subdirectories:
api-gw
contains the Kubernetes configuration files for the Consul API gatewayhashicups
contains the Kubernetes configuration files for HashiCupsconfig
contains the custom Consul ACL configuration file, AWS Lambda database initialization function, and terminating gateway configuration fileshelm
contains the Helm charts for Consul
Deploy infrastructure and demo application
With these Terraform configuration files, you are ready to deploy your infrastructure. Initialize your Terraform configuration to download the necessary providers and modules.
$ terraform initInitializing the backend...Initializing provider plugins...## ...Terraform has been successfully initialized!## …
Then, deploy the resources. Confirm the run by entering yes.
$ terraform apply## ...Do you want to perform these actions?Terraform will perform the actions described above.Only 'yes' will be accepted to approve.Enter a value: yes## ...Apply complete! Resources: 103 added, 0 changed, 0 destroyed.
The Terraform deployment could take up to 15 minutes to complete.
Connect to your infrastructure
Now that you have deployed the Kubernetes cluster, configure kubectl
to interact with it.
$ aws eks --region $(terraform output -raw region) update-kubeconfig --name $(terraform output -raw kubernetes_cluster_id)
Configure your CLI to interact with Consul datacenter
In this section, you will set environment variables in your terminal so your Consul CLI can interact with your Consul datacenter. The Consul CLI reads these environment variables for behavior defaults and will reference these values when you run consul
commands.
Set the Consul destination address.
$ export CONSUL_HTTP_ADDR=https://$(kubectl get services/consul-ui --namespace consul -o jsonpath='{.status.loadBalancer.ingress[0].hostname}')
Retrieve the ACL bootstrap token from the respective Kubernetes secret and set it as an environment variable.
$ export CONSUL_HTTP_TOKEN=$(kubectl get --namespace consul secrets/consul-bootstrap-acl-token --template={{.data.token}} | base64 -d)
Export the Consul CA certificate to use for TLS communication with Consul.
$ kubectl get --namespace consul secrets/consul-ca-cert -o json | jq -r '.data."tls.crt"' | base64 -d > ca.crt && \export CONSUL_CACERT=ca.crt
Set the server name to use as the SNI host for connecting to Consul via TLS.
$ export CONSUL_TLS_SERVER_NAME=server.dc1.consul
Run the consul catalog services
CLI command to print all known services in your Consul catalog.
$ consul catalog servicesapi-gatewayconsulfrontendfrontend-sidecar-proxynginxnginx-sidecar-proxypaymentspayments-sidecar-proxyproduct-apiproduct-api-sidecar-proxypublic-apipublic-api-sidecar-proxy
Explore the demo application (broken state)
In this section, you will visit your demo application to explore the HashiCups UI.
Retrieve the Consul API gateway public DNS address.
$ export CONSUL_APIGW_ADDR=http://$(kubectl get svc/api-gateway -o json | jq -r '.status.loadBalancer.ingress[0].hostname') && echo $CONSUL_APIGW_ADDRhttp://a4cc3e77d86854fe4bbcc9c62b8d381d-221509817.us-west-2.elb.amazonaws.com
Open the Consul API gateway's URL in your browser and explore the HashiCups UI. Notice that HashiCups is in a broken state and unable to retrieve coffees from the backend product database. This behavior is expected since the HashiCups frontend services within the Consul service mesh cannot securely communicate with the external backend product database (on AWS RDS) by default.
Enable Consul terminating gateway
Consul terminating gateways are egress proxies that provide your service mesh applications connectivity to external destinations by terminating mTLS connections, enforcing Consul intentions, and forwarding requests to appropriate destination services.
In this section, you will review the parameters that enable this feature and update your Consul installation to apply the new configuration.
Review the Consul values file
Review the highlighted lines in the values file below to see the parameters that enable terminating gateways.
helm/consul-v2-terminating-gw.yaml
## …## ...# Configures and installs the Consul terminating gateway.terminatingGateways: # Enable terminating gateway deployment. Requires `connectInject.enabled=true`. enabled: true
Refer to the Consul metrics for Kubernetes documentation and official Helm chart values to learn more about metrics configuration options and details.
Update Consul in your Kubernetes cluster with Consul K8S CLI to deploy a terminating gateway. Confirm the run by entering y
.
$ consul-k8s upgrade -config-file=helm/consul-v2-terminating-gw.yaml
Refer to the Consul K8S CLI documentation to learn more about additional settings.
The Consul update could take up to 5 minutes to complete.
Review the official Helm chart values to learn more about these settings.
Verify the Consul terminating gateway successfully deployed in your environment.
$ kubectl get pods --namespace consulNAME READY STATUS RESTARTS AGEconsul-connect-injector-7869cf6f69-sqqb4 1/1 Running 0 7m58sconsul-server-0 1/1 Running 0 5m40sconsul-server-1 1/1 Running 0 6m41sconsul-server-2 1/1 Running 0 7m56sconsul-terminating-gateway-d6bfbf5fd-4km4x 1/1 Running 0 7m57sconsul-webhook-cert-manager-7646f7456d-l2z8w 1/1 Running 0 7m57s
Register the AWS RDS instance as a Consul service
To reach external services through the Consul terminating gateway, the external service must be registered in the Consul catalog.
In this section, you will create the Consul service configuration file for your AWS RDS instance and register it in the Consul catalog with the name managed-aws-rds
.
Retrieve the AWS RDS private DNS address and set it as an environment variable.
$ export AWS_RDS_ENDPOINT=$(terraform output -raw aws_rds_endpoint) && \echo $AWS_RDS_ENDPOINT
Create a custom Consul service configuration file for managed-aws-rds
with envsubst
. This will fill all placeholders with your unique AWS RDS private DNS address.
$ envsubst < config/external-service.template > config/external-service.json
Review your unique Consul service configuration file.
config/external-service.json
{ "Node": "AWS RDS", "Address": "learn-consul-4yyx.cvjehh8zzfhg.us-west-2.rds.amazonaws.com", "NodeMeta": { "external-node": "true", "external-probe": "true" }, "Service": { "ID": "managed-aws-rds", "Service": "managed-aws-rds", "Tags": ["external", "postgres"], "Port": 5432 }}
Refer to the Consul services configuration documentation to learn more about Consul service configuration options and details.
Register managed-aws-rds
as a service in Consul.
$ curl -k \ --request PUT \ --data @config/external-service.json \ --header "X-Consul-Token: $CONSUL_HTTP_TOKEN" \ $CONSUL_HTTP_ADDR/v1/catalog/register
Apply the Consul service defaults for the external managed-aws-rds
service. The configuration in service-defaults.yaml
creates a virtual service in Consul, which allows the services within your service mesh to communicate with the external service using Consul DNS.
$ kubectl apply --filename config/service-defaults.yaml
Confirm that Consul can successfully resolve your external service.
$ kubectl exec -it svc/consul-server --namespace consul -- /bin/sh -c "nslookup -port=8600 managed-aws-rds.virtual.consul 127.0.0.1"Defaulted container "consul" out of: consul, locality-init (init)Server: 127.0.0.1Address: 127.0.0.1:8600 Name: managed-aws-rds.virtual.consulAddress: 240.0.0.6 Name: managed-aws-rds.virtual.consulAddress: 240.0.0.6
Notice that managed-aws-rds.virtual.consul
resolves to a multicast IP address, which facilitates one-to-many communication for all instances of the managed-aws-rds
Consul service.
Configure and link the AWS RDS service to the terminating gateway
To begin routing traffic to external services, you must configure the Consul security systems and link your external service to the terminating gateway.
In this section, you will configure Consul ACLs and intentions to allow secure communication between the services within your mesh, the terminating gateway, and the external managed-aws-rds
service. You will then link your external managed-aws-rds
service to the terminating gateway.
First, create a custom ACL policy that allows the terminating gateway to communicate with the managed-aws-rds
service.
$ consul acl policy create -name "managed-aws-rds-write-policy" \ -datacenter "dc1" \ -rules @config/write-acl-policy.hcl
Example output:
ID: 56cd0458-2115-3722-22a5-aee974a4edb8Name: managed-aws-rds-write-policyDescription:Datacenters:Rules:# Set write access for external managed-aws-rds serviceservice "managed-aws-rds" {policy = "write"intentions = "read"}
Review the Consul ACL Policies documentation to learn more.
Retrieve the terminating gateway ACL role ID and set it as an environment variable.
$ export TGW_ACL_ROLE_ID=$(consul acl role list -format=json | jq --raw-output '[.[] | select(.Name | endswith("-terminating-gateway-acl-role"))] | if (. | length) == 1 then (. | first | .ID) else "Unable to determine the role ID because there are multiple roles matching this name.\n" | halt_error end')
Attach your custom ACL policy to the terminating gateway role.
$ consul acl role update -id $TGW_ACL_ROLE_ID \ -datacenter "dc1" \ -policy-name managed-aws-rds-write-policy
Example output:
ID: af87a7bb-660b-8d7b-39ea-e909c13779e7Name: consul-terminating-gateway-acl-roleDescription: ACL Role for consul-terminating-gatewayPolicies:054eccc4-e379-6aa7-a36d-ebf0fd0ce02f - terminating-gateway-policy56cd0458-2115-3722-22a5-aee974a4edb8 - managed-aws-rds-write-policy
Create an intention that allows communication from the product-api
service to the managed-aws-rds
service. This intention allows traffic to flow from the HashiCups frontend services to the HashiCups backend database service.
$ kubectl apply --filename config/service-intentions.yamlserviceintentions.consul.hashicorp.com/managed-aws-rds created
Deploy the terminating gateway for the managed-aws-rds
by applying the terminating-gateway.yaml
CRD to your cluster.
$ kubectl apply --filename config/terminating-gateway.yamlterminatinggateway.consul.hashicorp.com/terminating-gateway created
Update your service mesh applications to communicate with external services
To configure your service mesh applications, the respective Consul virtual address must be configured into the relevant application connection parameter.
In this section, you will deploy the product-api
service mesh application to communicate with the external managed-aws-rds
virtual service.
Open your config/products-api
deployment configuration file and review the ConfigMap
section of the deployment.
config/product-api.yaml
apiVersion: v1kind: ConfigMapmetadata: name: db-configmap namespace: defaultdata: config: | { "db_connection": "host=managed-aws-rds.virtual.consul port=5432 user=postgres password=password dbname=products sslmode=disable", "bind_address": ":9090", "metrics_address": ":9103" }##..
Notice how the database connection string for this HashiCups service includes the managed-aws-rds.virtual.consul
Consul DNS address.
Note
The placement of the external service's virtual address is unique to the application. This scenario uses PostgreSQL as the HashiCups database.
Deploy the product-api
service.
$ kubectl apply -f config/product-api.yamlconfigmap/db-configmap createdservice/product-api createdserviceaccount/product-api createdservicedefaults.consul.hashicorp.com/product-api createddeployment.apps/product-api created
Explore demo application (working state)
Open the HashiCup's URL in your browser and refresh the HashiCups UI.
$ echo $CONSUL_APIGW_ADDRhttp://a4cc3e77d86854fe4bbcc9c62b8d381d-221509817.us-west-2.elb.amazonaws.com
Notice that the HashiCups UI functions correctly. You have successfully connected the HashiCups frontend to the external HashiCups backend database on AWS RDS using Consul terminating gateway.
Clean up resources
Destroy the Terraform resources to clean up your environment. Confirm the destroy operation by inputting yes
.
$ terraform destroy ## ...Do you really want to destroy all resources? Terraform will destroy all your managed infrastructure, as shown above. There is no undo. Only 'yes' will be accepted to confirm. Enter a value: yes ## ... Destroy complete! Resources: 0 added, 0 changed, 103 destroyed.
Note
Due to race conditions with the cloud resources in this tutorial, you may need to run the destroy
operation twice to remove all the resources.
Next steps
In this tutorial, you deployed and configured a Consul terminating gateway to extend secure communication to services outside of your Consul service mesh. This integration offers increased simplicity for network, security, and policy uniformity. It also provides reduced operational overhead and ease of adoption for legacy services.
For more information about the topics covered in this tutorial, refer to the following resources: