It’s no secret that Kubernetes has seen a booming interest in the past year or two. It’s also known that its learning curve is steep and its complexity remains relatively high. Because of this I’ve been interested in striking a simpler alternative in Docker Swarm for a while now. The following is my experiment for setting up a Swarm cluster that is able to publish different services using Let’s Encrypt SSL certificates with ease.
Why Swarm?
I’m not going to talk about the good Kubernetes brings to the table (it’s actually plenty of good), if interested you can look that up on your own. I’m just going to list a couple of benefits of Docker Swarm since they are the reason I chose to start dabbling on this topic:
- Swarm comes packaged within Docker CE meaning no further installation is needed
- A Swarm cluster is easy to spin up and manage with a few of commands
- Machines/Instances/Droplets can become worker nodes with a single command
- Plenty of great features come without including any other “project”, i.e:
- Service discovery
- Load balancing within services
- Rolling updates
Despite these (and probably other reasons) the most important for me is: I want to do less ops. I can’t stress this enough, since I’m using this project to host my blog and other side projects. My primary objective is to focus on the development of these services and not on keeping up with state of the art container orchestration.
If “the buzz” is on Kubernetes while Swarm is considered boring technology, then good! That’s aligned with my needs, which are clearly not the same as a company with employees working full-time on Ops/DevOps.
Gateway to our inner network of services
So you want to expose 3 services to the public internet, they’re 3 web apps that rely on 2 private services each. The services are called A, B, and C, while the private services are called A1, A2, B1, B2, C1, and C2. You own the domains a.com, b.com, and c.com. In the end we want this hypothetical system to look something like this:
Reverse proxy separate domain requests to the respective service
There are many different ways we can achieve this. However, we do want a way to make each domain accessible with HTTPS using Let’s Encrypt. Since this wasn’t easy (at least I couldn’t find it possible) with existing tools I coded a very simple CLI that would help automate this: lecli.
Also, based on a previous attempt I posted a while ago I decided to receive all incoming requests in a small NGINX container. This entrypoint will handle TLS and reverse proxy to the respective A, B, and C service. This would actually make all services private, and the only public facing service with access to ports 80
& 443
would be the reverse proxy.
So, a sample NGINX config snippet file to make this happen would be:
http {
server {
listen 80 default_server;
server_name a.com;
location / {
return 301 https://$server_name$request_uri;
}
location /.well-known/acme-challenge/ {
proxy_pass http://5.39.70.224/;
}
}
server {
listen 443 default_server ssl;
server_name a.com;
ssl_certificate /etc/nginx/ssl/swarm.pem;
ssl_certificate_key /etc/nginx/ssl/request.pem;
location / {
proxy_pass http://service-a:5000;
proxy_read_timeout 90;
}
}
...
# "b.com" and "c.com" should have an almost identical config
...
}
Here, incoming requests are being redirected from HTTP to HTTPS except when they have the “Let’s Encrypt HTTP challenge” form, this will make sense soon. Those requests are being redirected to a hardcoded IP address, which will be our “support server’s” IP address.
HTTPS requests will be served from port 443
using Let’s Encrypt SSL certificates. Since this NGINX proxy will be another container inside our cluster we will need to create it’s image from a Dockerfile similar to this:
FROM nginx:alpine
COPY nginx.conf /etc/nginx/nginx.conf
COPY certificates/request.pem /etc/nginx/ssl/request.pem
COPY certificates/swarm.pem /etc/nginx/ssl/swarm.pem
I know this may seem as plenty of moving parts, bear with me though. At this point we have a Dockerfile to create a reverse proxy that will do 3 things:
- Redirect HTTP to HTTPS on 3 websites: a.com, b.com, and c.com
- Work as reverse proxy to 3 webapps that serve each domain (service discovery and load balancing is managed by Swarm networking)
- Redirect Let’s Encrypt domain validation requests to our “support server”
We can now proceed by creating a GitHub private repo with the nginx.conf
and Dockerfile
for versioning. All we need is the support server to periodically renew the certificates (lecli), then build this small reverse proxy container and redeploy it on our cluster.
The support server (on DigitalOcean)
I know this is lazy naming and there could even be a better way to include this server functionality into the cluster without the need of a separate server instance. But this is a nice balance I found between ease of setup and cleanliness after experimenting different approaches (yes, both are subjective).
In the end, plenty of cloud providers will give you instances for $5/month or less so it shouldn’t be a big deal… Sign up with this link and get $10 free on DigitalOcean to kickstart your experimenting! (which will help me out too :winkwink:)
Now back to it, this support server will have a cron job that will execute the lecli CLI. Head over to that repo and take a look at the README to understand the basics of how it works. Besides installing it with gem install lecli
, you’ll need to create a build_proxy.sh
script to be executed after lecli has successfully generated new certificates. Something like the following:
#!/bin/sh
aws ecr get-login --region us-east-1 | cut -d' ' -f 1,2,3,4,5,6,9 | sh
docker build -t 123123123.ecr.us-east-1.amazonaws.com/r-proxy .
docker push 123123123.ecr.us-east-1.amazonaws.com/r-proxy
ssh -i /root/.ssh/swarm_manager root@10.2.2.2 'cd ~/server && bash -s' < deploy_stack.sh
ssh -i /root/.ssh/swarm_manager root@10.2.2.2 docker system prune -f
docker system prune -f
In broad terms the script will:
- Login to AWS ECR, which you can substitute with any other private container registry
- Build and push the reverse proxy container image
- SSH into the Swarm Manager (using private IP’s while you’re at it) and remotely execute the
deploy_stack.sh
script (which you’ll need to create next) - After that it will just cleanup dangling images both locally and in the manager
What’s inside the deploy_stack.sh
file? It’s just a simple script to redeploy the stack on the Swarm cluster. That means that the new container image will be pulled from ECR and then a new reverse proxy container with the updated Let’s Encrypt certificates will be used. deploy_stack.sh
can look something like:
#!/bin/sh
aws ecr get-login --region us-east-1 | cut -d' ' -f 1,2,3,4,5,6,9 | sh
docker stack deploy -c docker-compose.yml --with-registry-auth stack_name
Again, this script is run on the Swarm manager which will gain access to ECR (to pull the new container images available) and redeploy the stack defined in the docker-compose.yml
file on the cluster.
So far I haven’t talked about how to layout your stack, and I won’t. You can read the Swarm Docs or my previous post on load balancing on a Swarm cluster for ideas (stick to the docker-compose.yml
file section but be aware a newer version syntax is out).
Making sure Let’s Encrypt finds the verification tokens
So by now you should have:
- The domains DNS pointing towards your cluster (more on this later)
- Your reverse proxy forwarding to your support server the Let’s Encrypt requests to verify the domain ownership
You now need the support server to respond to those requests. This can do the trick:
docker run -d --name simple-server --restart -p 80:80 -v "$PWD":/usr/local/apache2/htdocs/ httpd:2.4
Now just make sure the simple-server containers’ volume matches the challenges_relative_path so the lecli CLI tokens are accessible when requested by Let’s Encrypt.
That’s it! Your cluster’s reverse proxy is relaying Let’s Encrypt requests to your support server.
Different approaches for different purposes (and scales)
I omitted the way IP addresses are pointing to your cluster, because the reverse proxy has to be on a specific IP address and your domain DNS record pointing there. Or does it?
A simple way to make this work would be using the options available for the docker-compose.yml
services placement. You could set a single dedicated worker node to host the reverse proxy container. This way you know on which droplet to find that container and use its IP address for your domains’ DNS records.
Plenty of different solutions can be hacked using this idea. Another possible solution could be having 3 nodes for the reverse proxy service, then taking just one instance’s IP address for the a.com DNS record, another IP address for the b.com, and a third IP address for c.com DNS record.
Regardless of the technique to be used there are pros and cons, mostly regarding possible downtime of the droplets used as entrypoint.
Since I don’t face heavy traffic on my projects, my solution went towards housing the reverse proxy on the master node. This isn’t recommended for important production settings because if your only manager node goes down it will take along with him your only entrypoint. However, this is very easy to setup using the placement constraint from the reverse proxy service as:
placement:
constraints:
- node.role == manager
The cluster topology would look like the following diagram, with each service in containers distributed throughout worker nodes:
It’s not difficult to see the bottleneck or single point of failure here. As stated before, if for whatever reason the manager node fails your entire cluster is out of reach. Under heavy load a single machine would have trouble keeping up, more even being such a crucial part of your infrastructure.
In the end we all strive to have services with millions of users, right? We would be forced to scale our infrastructure to keep up with them as we grow, so I do have a topology that relies on these same principles but will provide a more scalable solution.
As a disclaimer I haven’t put this proposed solution to practice so it remains to be tested in a real life scenario. I’m open to suggestions on alternative approaches, but hear me out on this one…
A load balancer in front of your load balancers, dawg
There are certain best practices when implementing high availability on Docker Swarm, like having multiple manager nodes and not placing any workload on them (configurable on docker-compose.yml
).
In order to distribute the reverse proxy load we can have a reverse proxy on each worker node. This would mean that if a node goes down we still have all other worker nodes able to receive any incoming request. To place a container on each worker node we can enable the mode: global
setting.
The problem with this solution is we can no longer rely on the DNS record to forward towards all worker nodes’ IP addresses. But on DigitalOcean we can use their Load Balancer service (or an alternative like ELB on AWS)
- Make sure to mark all worker node droplets with a label “worker node”
- Create the Load Balancer with a passthrough policy
- Set the load balancer to forward all incoming traffic towards your droplets that have that “worker node” label
The topology should now resemble the following diagram
More complex setups could be set in place if certain workloads take over some node’s capability to reverse proxy. But the layout and its setup would remain fairly similar, so no need to elaborate on that now.
Conclusions
I don’t recommend this for a production system with heavy traffic. There are things that could go wrong and are generally better implemented in Kubernetes. However, for side projects and other smaller implementations it’s a relatively easy way to manage a cluster, run your container workloads and host webapps in an efficient way.
There is nothing too scary here for someone with some general SysAdmin/Docker knowledge. Also there’s no need to keep up with the fast paced Kubernetes ecosystem. Again, don’t get me wrong, Kubernetes is most likely the “best tool for the job” on most cases, just not for everyone and certainly not me (at least for now).
CI/CD
I have my repositories setup with CI/CD using CircleCI and a bit of ducktape (a.k.a. bash). Still relying on the previous topology example: A PR to the service “B1” will trigger CI. Whenever that PR is merged into master a container build is triggered (you guessed it, in our support server) and deployed to the cluster as well. This makes all the effort to setup the “containerized service paradigm” worth it.
A blog post on this (way easier than this cluster setup, all downhill from here I promise) will hopefully come in the near future. Until then it would be great to hear feedback and alternative setups, Pura Vida!