Run lueur as a Docker Container
This guide will show you how can you easily introduce network faults with Docker containers.
Info
lueur container images are hosted on GitHub Container Registry.
They are distroless images available for amd64 and arm64 architectures.
Run lueur as A Container
-
Pull the lueur image
-
Run lueur with a latency fault
docker run \ -p 8080:8080 \ # (1)! --rm \ # (2)! -it \ # (3)! ghcr.io/rebound-how/lueur \ run \ --proxy-address 0.0.0.0:8080 \ # (4)! --upstream http://192.168.1.3:7070 \ # (5)! --with-latency --latency-mean 300
- Expose the proxy port if you need to access it from the host
- Release the system resources once the container finishes
- Give the process a terminal
- The default behavior is to bind the proxy to the loopback which would prevent the proxy from being reached. Bind to all public interfaces with
0.0.0.0
- The address of the demo application we will apply the latency to
-
Run the lueur demo using the same image
- Expose the demo application port to the host
- Run the demo server and bind to all container's interfaces
-
Make a request to the demo application and see it impacted by the proxy
Run Stealh Mode in A Container
Warning
Stealth mode gives the opportunity to intercept traffic without having to explicitely set the proxy on the client. It relies on eBPF and therefore requires a lot of provileges which likely you would not have in a production environment.
-
Pull the lueur image
Abstract
We do not provide a container image with a
latest
tag for the stealth mode. You must provide a specific versionned tag. The one used in this documentation may be outdated, please check the registry for the newest version. -
Run lueur with a latency fault
docker run \ -p 8080:8080 \ # (1)! --rm \ # (2)! -it \ # (3)! --pid=host \ # (4)! -v /sys/fs/cgroup/:/sys/fs/cgroup/:ro \ # (5)! --cap-add=SYS_ADMIN \ # (6)! --cap-add=BPF \ # (7)! --cap-add=NET_ADMIN \ # (8)! ghcr.io/rebound-how/lueur:0.2.1-stealth \ # (9)! run \ --stealth \ # (10)! --capture-process curl \ # (11)! --proxy-address 0.0.0.0:8080 \ # (12)! --with-latency --latency-mean 300
- Expose the proxy port if you need to access it from the host
- Release the system resources once the container finishes
- Give the process a terminal
- Share the host process namespace to access the client's process
- Give access to the host's kernel resources for lueur eBPF programs to attach to
- Give too much power to the container but unfortunately we cannot reduce the scope so we need it
- Specific BPF priviledges
- lueur needs quite a bit of access to networking to do its job
- lueur does not expose a
latest
tag for its eBPF-ready images. You must use a specific versionned tag. - Enable stealth mode and loads eBPF programs
- Let's capture traffic coming from
curl
commands - The default behavior is to bind the proxy to the loopback which would prevent the proxy from being reached. Bind to all public interfaces with
0.0.0.0
-
Run the lueur demo using the same image
- Expose the demo application port to the host
- Run the demo server and bind to all container's interfaces
-
Make a request to the demo application and see it impacted by the proxy
curl \ -w "\nConnected IP: %{remote_ip}\nTotal time: %{time_total}s\n" \ http://192.168.1.3:7070 <h1>Hello, World!</h1> Connected IP: ::1 Total time: 0.313161s
Notice how we do not need to be explicit about routing traffic to the proxy by omitting setting
-x http://localhost:8080