istio.io/content/en/docs/tasks/security/webhook/index.md

9.9 KiB

title description weight keywords
Istio Webhook Management [Experimental] How to manage webhooks in Istio through istioctl. 100
security
webhook

{{< boilerplate experimental-feature-warning >}}

Istio has two webhooks: validation and sidecar injection. By default, these webhooks manage their own configurations. From a security perspective, this default behavior is not recommended because a compromised webhook could then conduct privilege escalation attacks.

This task shows how to use the new {{< istioctl >}} x post-install webhook command to securely manage the configurations of the webhooks.

Getting started

  • Install Istio with DNS certificates configured and global.operatorManageWebhooks set to true.

    {{< text bash >}} $ cat < ./istio.yaml apiVersion: install.istio.io/v1alpha2 kind: IstioControlPlane spec: values: global: operatorManageWebhooks: true certificates: - secretName: dns.istio-galley-service-account dnsNames: [istio-galley.istio-system.svc, istio-galley.istio-system] - secretName: dns.istio-sidecar-injector-service-account dnsNames: [istio-sidecar-injector.istio-system.svc, istio-sidecar-injector.istio-system] EOF $ istioctl manifest apply -f ./istio.yaml {{< /text >}}

  • Install jq for JSON parsing.

Check webhook certificates

To display the DNS names in the webhook certificates of Galley and the sidecar injector, you need to get the secret from Kubernetes, parse it, decode it, and view the text output with the following commands:

{{< text bash >}} $ kubectl get secret dns.istio-galley-service-account -n istio-system -o json | jq -r '.data["cert-chain.pem"]' | base64 --decode | openssl x509 -in - -text -noout $ kubectl get secret dns.istio-sidecar-injector-service-account -n istio-system -o json | jq -r '.data["cert-chain.pem"]' | base64 --decode | openssl x509 -in - -text -noout {{< /text >}}

The output from the above commands should include the DNS names of Galley and the sidecar injector, respectively:

{{< text plain >}} X509v3 Subject Alternative Name: DNS:istio-galley.istio-system.svc, DNS:istio-galley.istio-system {{< /text >}}

{{< text plain >}} X509v3 Subject Alternative Name: DNS:istio-sidecar-injector.istio-system.svc, DNS:istio-sidecar-injector.istio-system {{< /text >}}

Enable webhook configurations

  1. To generate the MutatingWebhookConfiguration and ValidatingWebhookConfiguration configuration files, run the following command.

    {{< text bash >}} $ istioctl manifest generate > istio.yaml {{< /text >}}

  2. Open the istio.yaml configuration file, search for kind: MutatingWebhookConfiguration and save the MutatingWebhookConfiguration of the sidecar injector to sidecar-injector-webhook.yaml. The following is a MutatingWebhookConfiguration in an example istio.yaml.

    {{< text yaml >}} apiVersion: admissionregistration.k8s.io/v1beta1 kind: MutatingWebhookConfiguration metadata: name: istio-sidecar-injector labels: app: sidecarInjectorWebhook release: istio webhooks:

    • name: sidecar-injector.istio.io clientConfig: service: name: istio-sidecar-injector namespace: istio-system path: "/inject" caBundle: "" rules:
      • operations: [ "CREATE" ] apiGroups: [""] apiVersions: ["v1"] resources: ["pods"] failurePolicy: Fail namespaceSelector: matchLabels: istio-injection: enabled {{< /text >}}
  3. Open the istio.yaml configuration file, search for kind: ValidatingWebhookConfiguration and save the ValidatingWebhookConfiguration of Galley to galley-webhook.yaml. The following is a ValidatingWebhookConfiguration in an example istio.yaml (only a part of the configuration is shown to save space).

    {{< text yaml >}} apiVersion: admissionregistration.k8s.io/v1beta1 kind: ValidatingWebhookConfiguration metadata: name: istio-galley labels: app: galley release: istio istio: galley webhooks:

    • name: pilot.validation.istio.io clientConfig: service: name: istio-galley namespace: istio-system path: "/admitpilot" caBundle: "" rules:
      • operations:
        • CREATE
        • UPDATE apiGroups:
        • config.istio.io ... SKIPPED failurePolicy: Fail sideEffects: None {{< /text >}}
  4. Verify that there are no existing webhook configurations for Galley and the sidecar injector. The output of the following two commands should not contain any configurations for Galley and the sidecar injector.

    {{< text bash >}} $ kubectl get mutatingwebhookconfiguration $ kubectl get validatingwebhookconfiguration {{< /text >}}

    If there are existing webhook configurations (e.g., from a previous Istio deployment) for Galley and the sidecar injector, delete them using the following commands. Before running these commands, replace the webhook configuration names in the commands with the actual webhook configuration names of Galley and the sidecar injector in your cluster.

    {{< text bash >}} $ kubectl delete mutatingwebhookconfiguration SIDECAR-INJECTOR-WEBHOOK-CONFIGURATION-NAME $ kubectl delete validatingwebhookconfiguration GALLEY-WEBHOOK-CONFIGURATION-NAME {{< /text >}}

  5. Use istioctl to enable the webhook configurations:

    {{< text bash >}} $ istioctl experimental post-install webhook enable --webhook-secret dns.istio-galley-service-account
    --namespace istio-system --validation-path galley-webhook.yaml
    --injection-path sidecar-injector-webhook.yaml {{< /text >}}

  6. To check that the sidecar injector webhook is working, verify that the webhook injects a sidecar container into an example pod with the following commands:

    {{< text bash >}} $ kubectl create namespace test-injection $ kubectl label namespaces test-injection istio-injection=enabled $ kubectl run --generator=run-pod/v1 --image=nginx nginx-app --port=80 -n test-injection $ kubectl get pod -n test-injection {{< /text >}}

    The output from the get pod command should show the following. The 2/2 value means that the webhook injected a sidecar into the example pod:

    {{< text plain >}} NAME READY STATUS RESTARTS AGE nginx-app 2/2 Running 0 10s {{< /text >}}

  7. Check that the validation webhook is working:

    {{< text bash >}} $ kubectl create namespace test-validation $ kubectl apply -n test-validation -f - <<EOF apiVersion: networking.istio.io/v1alpha3 kind: Gateway metadata: name: invalid-gateway spec: selector: # DO NOT CHANGE THESE LABELS # The ingressgateway is defined in install/kubernetes/helm/istio/values.yaml # with these labels istio: ingressgateway EOF {{< /text >}}

    The output from the gateway creation command should show the following output. The error in the output indicates that the validation webhook checked the gateway's configuration YAML file:

    {{< text plain >}} Error from server: error when creating "invalid-gateway.yaml": admission webhook "pilot.validation.istio.io" denied the request: configuration is invalid: gateway must have at least one server {{< /text >}}

Show webhook configurations

  1. If you named the sidecar injector's configuration istio-sidecar-injector and named Galley's configuration istio-galley-istio-system, use the following command to show the configurations of these two webhooks:

    {{< text bash >}} $ istioctl experimental post-install webhook status --validation-config=istio-galley-istio-system --injection-config=istio-sidecar-injector {{< /text >}}

  2. If you named the sidecar injector's configuration istio-sidecar-injector, use the following command to show the configuration of the sidecar injector:

    {{< text bash >}} $ istioctl experimental post-install webhook status --validation=false --injection-config=istio-sidecar-injector {{< /text >}}

  3. If you named Galley's configuration istio-galley-istio-system, show Galley's configuration with the following command:

    {{< text bash >}} $ istioctl experimental post-install webhook status --injection=false --validation-config=istio-galley-istio-system {{< /text >}}

Disable webhook configurations

  1. If you named the sidecar injector's configuration istio-sidecar-injector and named Galley's configuration istio-galley-istio-system, use the following command to disable the configurations of these two webhooks:

    {{< text bash >}} $ istioctl experimental post-install webhook disable --validation-config=istio-galley-istio-system --injection-config=istio-sidecar-injector {{< /text >}}

  2. If you named the sidecar injector's configuration istio-sidecar-injector, disable the webhook with the following command:

    {{< text bash >}} $ istioctl experimental post-install webhook disable --validation=false --injection-config=istio-sidecar-injector {{< /text >}}

  3. If you named Galleys's configuration istio-galley-istio-system, disable the webhook with the following command:

    {{< text bash >}} $ istioctl experimental post-install webhook disable --injection=false --validation-config=istio-galley-istio-system {{< /text >}}

Cleanup

You can run the following command to delete the resources created in this tutorial.

{{< text bash >}} $ kubectl delete ns test-injection test-validation $ kubectl delete -f galley-webhook.yaml $ kubectl delete -f sidecar-injector-webhook.yaml {{< /text >}}