Setup Cloud NAT for public GKE clusters

10/26/2018

I'd like to setup a NAT gateway, using Cloud NAT, so that VMs/Pods in a public GKE cluster use static IP addresses.

The issue I'm facing is that the NAT gateway seems to only be used if VMs have no other options, i.e:

GCP forwards traffic using Cloud NAT only when there are no other matching routes or paths for the traffic.

But in the case of a public GKE cluster, VMs have ephemeral external IPs, so they don't use the gateway.

According to the doc:

If you configure an external IP on a VM's interface [...] NAT will not be performed on such packets. However, alias IP ranges assigned to the interface can still use NAT because they cannot use the external IP to reach the Internet.

And

With this configuration, you can connect directly to a GKE VM via SSH, and yet have the GKE pods/containers use Cloud NAT to reach the Internet.

That's what I want, but I fail to see what precisely to setup here.

What is implied by alias IP ranges assigned to the interface can still use NAT and how to set this up?

-- Sylvain
google-cloud-platform
google-kubernetes-engine
nat

3 Answers

3/19/2020

This might cloud be helpful to someone :

You can simply run this terraform script with version TF 11. it will create VM and use it as NAT gateway and route all public VM traffic via it.

https://github.com/GoogleCloudPlatform/terraform-google-nat-gateway/tree/master/examples/gke-nat-gateway

For production use case there is also HA setup :

https://github.com/GoogleCloudPlatform/terraform-google-nat-gateway/tree/master/examples/ha-nat-gateway

-- Harsh Manvar
Source: StackOverflow

10/29/2018

"Unfortunately, this is not currently the case. While Cloud NAT is still in Beta, certain settings are not fully in place and thus the pods are still using SNAT even with IP aliasing. Because of the SNAT to the node's IP, the pods will not use Cloud NAT."

Indeed, as Patrick W says above, it's not currently working as documented. I tried as well, and spoke with folks on the GCP Slack group in the Kubernetes Engine channel. They also confirmed in testing that it only works with a GKE private cluster. We haven't started playing with private clusters yet. I can't find solid documentation on this simple question: If I create a private cluster, can I still have public K8S services (aka load balancers) in that cluster? All of the docs about private GKE clusters indicate you don't want any external traffic coming in, but we're running production Internet-facing services on our GKE clusters.

I filed a ticket with GCP support about the Cloud NAT issue, and here's what they said:

"I have been reviewing your configuration and the reason that Cloud NAT is not working is because your cluster is not private. To use Cloud NAT with GKE you have to create a private cluster. In the non-private cluster the public IP addresses of the cluster are used for communication between the master and the nodes. That’s why GKE is not taking into consideration the Cloud NAT configuration you have. Creating a private cluster will allow you to combine Cloud NAT and GKE.

I understand this is not very clear from our documentation and I have reported this to be clarified and explained exactly how it is supposed to work."

I responded asking them to please make it work as documented, rather than changing their documentation. I'm waiting for an update from them...

-- Ryan White
Source: StackOverflow

10/26/2018

The idea here is that if you use native VPC (Ip alias) for the cluster, your pods will not use SNAT when routing out of the cluster. With no SNAT, the pods will not use the node's external IP and thus should use the Cloud NAT.

Unfortunately, this is not currently the case. While Cloud NAT is still in Beta, certain settings are not fully in place and thus the pods are still using SNAT even with IP aliasing. Because of the SNAT to the node's IP, the pods will not use Cloud NAT.

This being said, why not use a private cluster? It's more secure and will work with Cloud NAT. You can't SSH directly into a node, but A) you can create a bastion VM instance in your project that can SSH using the internal IP flag and B) you generally do not need to SSH into the node on most occassions.

-- Patrick W
Source: StackOverflow