[prev in list] [next in list] [prev in thread] [next in thread] 

List:       nix-dev
Subject:    Re: [Nix-dev] nixos-container networking
From:       Danylo Hlynskyi <abcz2.uprola () gmail ! com>
Date:       2017-03-14 6:01:56
Message-ID: CANZg+yddUwFXzNjwB4KZAnuxZHhSRF=4zObsp=PsC35gnyk7Mg () mail ! gmail ! com
[Download RAW message or body]

[Attachment #2 (multipart/alternative)]


Strange, I have lot's of containers with "-" and experience no problems.
But maybe you've exceeded by accident limit 13 symbols per container name?

Also, last time I tried "veth" networking, I was struggling from
https://github.com/NixOS/nixpkgs/issues/16330. My container experience was
awful when I tried container renames. That's why I've already switched to
bridged networking

---

BTW, I highly recommend patch to switch-to-configuration.pl
<https://github.com/NixOS/nixpkgs/pull/3021/commits/6e36619b277f78ece1bb81b79b5651897e46a2bf#diff-0a057d6ff3f6f83f68b859178484f4fe>
 from
https://github.com/NixOS/nixpkgs/pull/3021/commits/6e36619b277f78ece1bb81b79b5651897e46a2bf


It isn't clear from commit message, but it does the following: makes
declarative containers truly reloadable (when you change
container config, it activates new configuration for container). The
culprit is *it should be* default behavior, because of

1.
https://github.com/NixOS/nixpkgs/blob/master/nixos/modules/virtualisation/containers.nix#L225-L230
 2.
https://github.com/NixOS/nixpkgs/blob/master/nixos/modules/virtualisation/containers.nix#L676


I'd like to PR this, but got no time to test properly other parts of Nixos.

2017-03-14 4:42 GMT+02:00 Tomasz Czyż <tomasz.czyz@gmail.com>:

> Michael, Ian, thank you for your answers.
> 
> Looks like my problem was with the container name. I tried bunch of
> different setups which didn't work and I discovered that when I'm using "-"
> in container name it doesn't work (I had impression that worked one or two
> times when I started machine from scratch, but most of the time didn't).
> 
> After I removed "-" from the name, looks like private network is working
> (I can access private IP of container) so I don't need NAT actually.
> 
> Tom
> 
> 2017-03-13 23:54 GMT+00:00 Ian-Woo Kim <ianwookim@gmail.com>:
> 
> > I've recently made nixos-container port forwarding easier (both
> > imperative and declarative) and it's now merged into master.
> > 
> > https://github.com/NixOS/nixpkgs/pull/20869
> > 
> > Hope that this helps.
> > 
> > Ian
> > 
> > On Sun, Mar 12, 2017 at 7:52 PM, Michael Walker <mike@barrucadu.co.uk>
> > wrote:
> > > Tomasz,
> > > 
> > > I have declarative container networking set up and working on a VPS,
> > > but I wrote most of the configuration as I was learning things, so it
> > > may not be the best way.
> > > 
> > > Here's the configuration.nix for the VPS:
> > > https://github.com/barrucadu/nixfiles/blob/master/hosts/innsmouth.nix
> > > Each container has a config file here:
> > > https://github.com/barrucadu/nixfiles/tree/master/containers
> > > 
> > > Containers have ports forwarded to them via NAT; each container is
> > > running a web server on port 80 with the host reverse-proxying via
> > > nginx; the host also does https and letsencrypt for all the proxied
> > > containers.
> > > 
> > > At the top of the innsmouth.nix file, I have a "containerSpecs" record
> > > which has all the details for each container. The relevant bits of the
> > > config are:
> > > 
> > > 1. Set up the networking and NAT:
> > > 
> > > networking.nat.enable = true;
> > > networking.nat.internalInterfaces = ["ve-+"];
> > > networking.nat.externalInterface = "enp0s4";
> > > 
> > > 2. Forward ports to containers:
> > > 
> > > networking.nat.forwardPorts = concatMap
> > > ( {num, ports, ...}:
> > > map (p: { sourcePort = p; destination =
> > > "192.168.255.${toString num}:${toString p}"; }) ports
> > > ) containerSpecs';
> > > 
> > > 3. Define all the containers:
> > > 
> > > containers = mapAttrs
> > > (_: {num, config, ...}:
> > > { autoStart = true
> > > ; privateNetwork = true
> > > ; hostAddress = "192.168.254.${toString num}"
> > > ; localAddress = "192.168.255.${toString num}"
> > > ; config = config
> > > ; }
> > > ) containerSpecs;
> > > 
> > > 4. Reverse-proxy HTTPS to HTTP in each container, manage letsencrypt
> > > certificates, and forward HTTP to HTTPS.
> > > 
> > > This is a little complex as I have a fairly custom nginx config (see
> > > the services/nginx.nix file in the repository), but the
> > > reverse-proxying is fairly straightfoward. Here is the generated
> > > nginx.conf: https://misc.barrucadu.co.uk/nginx.txt
> > > 
> > > On 13 March 2017 at 02:12, Tomasz Czyż <tomasz.czyz@gmail.com> wrote:
> > > > Hey,
> > > > 
> > > > could anyone using nixos-container (declarative style) share how you
> > setup
> > > > networking?
> > > > 
> > > > I'm trying to setup few containers with private network and http proxy
> > at
> > > > the front. Each container potentially could run application on port 80
> > and I
> > > > would like to expose them through proxy.
> > > > 
> > > > I tried to set this up with
> > > > 
> > > > privateNetwork=true;
> > > > hostAddress
> > > > localAddress
> > > > 
> > > > and I tried to also run nat on the host with (just to enable outbound
> > > > traffic)
> > > > internalInterfaces = ["ve-+"];
> > > > externalInterfaces = "eth0";
> > > > 
> > > > but no luck.
> > > > My next try will be creating bridge on the host and add containers to
> > that
> > > > bridge. Is that how you do stuff or are better ways of doing container
> > > > networking?
> > > > 
> > > > Tom
> > > > 
> > > > _______________________________________________
> > > > nix-dev mailing list
> > > > nix-dev@lists.science.uu.nl
> > > > http://lists.science.uu.nl/mailman/listinfo/nix-dev
> > > > 
> > > 
> > > 
> > > 
> > > --
> > > Michael Walker (http://www.barrucadu.co.uk)
> > > _______________________________________________
> > > nix-dev mailing list
> > > nix-dev@lists.science.uu.nl
> > > http://lists.science.uu.nl/mailman/listinfo/nix-dev
> > 
> 
> 
> 
> --
> Tomasz Czyż
> 
> _______________________________________________
> nix-dev mailing list
> nix-dev@lists.science.uu.nl
> http://lists.science.uu.nl/mailman/listinfo/nix-dev
> 
> 


[Attachment #5 (text/html)]

<div dir="ltr"><div><div><div><div>Strange, I have lot&#39;s of containers with \
&quot;-&quot; and experience no problems. But maybe you&#39;ve exceeded by accident \
limit 13 symbols per container name?<br><br></div>Also, last time I tried \
&quot;veth&quot; networking, I was struggling from <a \
href="https://github.com/NixOS/nixpkgs/issues/16330">https://github.com/NixOS/nixpkgs/issues/16330</a>. \
My container experience was awful when I tried container renames. That&#39;s why \
I&#39;ve already switched to bridged networking<br><br>---<br><br></div>BTW, I highly \
recommend patch to <a \
href="https://github.com/NixOS/nixpkgs/pull/3021/commits/6e36619b277f78ece1bb81b79b5651897e46a2bf#diff-0a057d6ff3f6f83f68b859178484f4fe" \
class="gmail-link-gray-dark" \
title="nixos/modules/system/activation/switch-to-configuration.pl">switch-to-configuration.pl
  </a> from <a href="https://github.com/NixOS/nixpkgs/pull/3021/commits/6e36619b277f78 \
ece1bb81b79b5651897e46a2bf">https://github.com/NixOS/nixpkgs/pull/3021/commits/6e36619b277f78ece1bb81b79b5651897e46a2bf</a><br><br></div>It \
isn&#39;t clear from commit message, but it does the following: makes declarative \
containers truly reloadable (when you change <br>container config, it activates new \
configuration for container). The culprit is *it should be* default behavior, because \
of<br><br>1. <a href="https://github.com/NixOS/nixpkgs/blob/master/nixos/modules/virtu \
alisation/containers.nix#L225-L230">https://github.com/NixOS/nixpkgs/blob/master/nixos/modules/virtualisation/containers.nix#L225-L230</a><br>2. \
<a href="https://github.com/NixOS/nixpkgs/blob/master/nixos/modules/virtualisation/con \
tainers.nix#L676">https://github.com/NixOS/nixpkgs/blob/master/nixos/modules/virtualisation/containers.nix#L676</a><br><br></div>I&#39;d \
like to PR this, but got no time to test properly other parts of Nixos.<br></div><div \
class="gmail_extra"><br><div class="gmail_quote">2017-03-14 4:42 GMT+02:00 Tomasz \
Czyż <span dir="ltr">&lt;<a href="mailto:tomasz.czyz@gmail.com" \
target="_blank">tomasz.czyz@gmail.com</a>&gt;</span>:<br><blockquote \
class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc \
solid;padding-left:1ex"><div dir="ltr"><div><div>Michael, Ian, thank you for your \
answers.<br><br></div><div>Looks like my problem was with the container name. I tried \
bunch of different setups which didn&#39;t work and I discovered that when I&#39;m \
using &quot;-&quot; in container name it doesn&#39;t work (I had impression that \
worked one or two times when I started machine from scratch, but most of the time \
didn&#39;t).<br><br></div><div>After I removed &quot;-&quot; from the name, looks \
like private network is working (I can access private IP of container) so I don&#39;t \
need NAT actually.<br><br></div><div>Tom<br></div></div></div><div \
class="gmail_extra"><div><div class="h5"><br><div class="gmail_quote">2017-03-13 \
23:54 GMT+00:00 Ian-Woo Kim <span dir="ltr">&lt;<a href="mailto:ianwookim@gmail.com" \
target="_blank">ianwookim@gmail.com</a>&gt;</span>:<br><blockquote \
class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc \
solid;padding-left:1ex">I&#39;ve recently made nixos-container port forwarding easier \
(both<br> imperative and declarative) and it&#39;s now merged into master.<br>
<br>
<a href="https://github.com/NixOS/nixpkgs/pull/20869" rel="noreferrer" \
target="_blank">https://github.com/NixOS/nixpk<wbr>gs/pull/20869</a><br> <br>
Hope that this helps.<br>
<span class="m_-7295093421595560673HOEnZb"><font color="#888888"><br>
Ian<br>
</font></span><div class="m_-7295093421595560673HOEnZb"><div \
class="m_-7295093421595560673h5"><br> On Sun, Mar 12, 2017 at 7:52 PM, Michael Walker \
&lt;<a href="mailto:mike@barrucadu.co.uk" \
target="_blank">mike@barrucadu.co.uk</a>&gt; wrote:<br> &gt; Tomasz,<br>
&gt;<br>
&gt; I have declarative container networking set up and working on a VPS,<br>
&gt; but I wrote most of the configuration as I was learning things, so it<br>
&gt; may not be the best way.<br>
&gt;<br>
&gt; Here&#39;s the configuration.nix for the VPS:<br>
&gt; <a href="https://github.com/barrucadu/nixfiles/blob/master/hosts/innsmouth.nix" \
rel="noreferrer" target="_blank">https://github.com/barrucadu/n<wbr>ixfiles/blob/master/hosts/inns<wbr>mouth.nix</a><br>
 &gt; Each container has a config file here:<br>
&gt; <a href="https://github.com/barrucadu/nixfiles/tree/master/containers" \
rel="noreferrer" target="_blank">https://github.com/barrucadu/n<wbr>ixfiles/tree/master/containers</a><br>
 &gt;<br>
&gt; Containers have ports forwarded to them via NAT; each container is<br>
&gt; running a web server on port 80 with the host reverse-proxying via<br>
&gt; nginx; the host also does https and letsencrypt for all the proxied<br>
&gt; containers.<br>
&gt;<br>
&gt; At the top of the innsmouth.nix file, I have a &quot;containerSpecs&quot; \
record<br> &gt; which has all the details for each container. The relevant bits of \
the<br> &gt; config are:<br>
&gt;<br>
&gt; 1. Set up the networking and NAT:<br>
&gt;<br>
&gt; networking.nat.enable = true;<br>
&gt; networking.nat.internalInterfa<wbr>ces = [&quot;ve-+&quot;];<br>
&gt; networking.nat.externalInterfa<wbr>ce = &quot;enp0s4&quot;;<br>
&gt;<br>
&gt; 2. Forward ports to containers:<br>
&gt;<br>
&gt; networking.nat.forwardPorts = concatMap<br>
&gt;        ( {num, ports, ...}:<br>
&gt;              map (p: { sourcePort = p; destination =<br>
&gt; &quot;192.168.255.${toString num}:${toString p}&quot;; }) ports<br>
&gt;        ) containerSpecs&#39;;<br>
&gt;<br>
&gt; 3. Define all the containers:<br>
&gt;<br>
&gt; containers = mapAttrs<br>
&gt;        (_: {num, config, ...}:<br>
&gt;              { autoStart = true<br>
&gt;              ; privateNetwork = true<br>
&gt;              ; hostAddress = &quot;192.168.254.${toString num}&quot;<br>
&gt;              ; localAddress = &quot;192.168.255.${toString num}&quot;<br>
&gt;              ; config = config<br>
&gt;              ; }<br>
&gt;        ) containerSpecs;<br>
&gt;<br>
&gt; 4. Reverse-proxy HTTPS to HTTP in each container, manage letsencrypt<br>
&gt; certificates, and forward HTTP to HTTPS.<br>
&gt;<br>
&gt; This is a little complex as I have a fairly custom nginx config (see<br>
&gt; the services/nginx.nix file in the repository), but the<br>
&gt; reverse-proxying is fairly straightfoward. Here is the generated<br>
&gt; nginx.conf: <a href="https://misc.barrucadu.co.uk/nginx.txt" rel="noreferrer" \
target="_blank">https://misc.barrucadu.co.uk/n<wbr>ginx.txt</a><br> &gt;<br>
&gt; On 13 March 2017 at 02:12, Tomasz Czyż &lt;<a \
href="mailto:tomasz.czyz@gmail.com" target="_blank">tomasz.czyz@gmail.com</a>&gt; \
wrote:<br> &gt;&gt; Hey,<br>
&gt;&gt;<br>
&gt;&gt; could anyone using nixos-container (declarative style) share how you \
setup<br> &gt;&gt; networking?<br>
&gt;&gt;<br>
&gt;&gt; I&#39;m trying to setup few containers with private network and http proxy \
at<br> &gt;&gt; the front. Each container potentially could run application on port \
80 and I<br> &gt;&gt; would like to expose them through proxy.<br>
&gt;&gt;<br>
&gt;&gt; I tried to set this up with<br>
&gt;&gt;<br>
&gt;&gt; privateNetwork=true;<br>
&gt;&gt; hostAddress<br>
&gt;&gt; localAddress<br>
&gt;&gt;<br>
&gt;&gt; and I tried to also run nat on the host with (just to enable outbound<br>
&gt;&gt; traffic)<br>
&gt;&gt; internalInterfaces = [&quot;ve-+&quot;];<br>
&gt;&gt; externalInterfaces = &quot;eth0&quot;;<br>
&gt;&gt;<br>
&gt;&gt; but no luck.<br>
&gt;&gt; My next try will be creating bridge on the host and add containers to \
that<br> &gt;&gt; bridge. Is that how you do stuff or are better ways of doing \
container<br> &gt;&gt; networking?<br>
&gt;&gt;<br>
&gt;&gt; Tom<br>
&gt;&gt;<br>
&gt;&gt; ______________________________<wbr>_________________<br>
&gt;&gt; nix-dev mailing list<br>
&gt;&gt; <a href="mailto:nix-dev@lists.science.uu.nl" \
target="_blank">nix-dev@lists.science.uu.nl</a><br> &gt;&gt; <a \
href="http://lists.science.uu.nl/mailman/listinfo/nix-dev" rel="noreferrer" \
target="_blank">http://lists.science.uu.nl/mai<wbr>lman/listinfo/nix-dev</a><br> \
&gt;&gt;<br> &gt;<br>
&gt;<br>
&gt;<br>
&gt; --<br>
&gt; Michael Walker (<a href="http://www.barrucadu.co.uk" rel="noreferrer" \
target="_blank">http://www.barrucadu.co.uk</a>)<br> &gt; \
______________________________<wbr>_________________<br> &gt; nix-dev mailing \
list<br> &gt; <a href="mailto:nix-dev@lists.science.uu.nl" \
target="_blank">nix-dev@lists.science.uu.nl</a><br> &gt; <a \
href="http://lists.science.uu.nl/mailman/listinfo/nix-dev" rel="noreferrer" \
target="_blank">http://lists.science.uu.nl/mai<wbr>lman/listinfo/nix-dev</a><br> \
</div></div></blockquote></div><br><br clear="all"><br></div></div><span \
class="HOEnZb"><font color="#888888">-- <br><div \
class="m_-7295093421595560673gmail_signature" data-smartmail="gmail_signature">Tomasz \
Czyż</div> </font></span></div>
<br>______________________________<wbr>_________________<br>
nix-dev mailing list<br>
<a href="mailto:nix-dev@lists.science.uu.nl">nix-dev@lists.science.uu.nl</a><br>
<a href="http://lists.science.uu.nl/mailman/listinfo/nix-dev" rel="noreferrer" \
target="_blank">http://lists.science.uu.nl/<wbr>mailman/listinfo/nix-dev</a><br> \
<br></blockquote></div><br></div>



_______________________________________________
nix-dev mailing list
nix-dev@lists.science.uu.nl
http://lists.science.uu.nl/mailman/listinfo/nix-dev


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic