An analyzer for Network Policies and other connectivity-configuration resources
Project description
Network Config Analyzer (NCA)
What is NCA?
NCA is a tool for analyzing Network Policies and other connectivity-configuration resources. It takes such resources as input, in addition to a list of relevant endpoints, and provides answers to queries such as:
- What is my current connectivity posture?
- How is my connectivity posture changing?
- Is specific traffic allowed/denied?
- What are the endpoints that are not covered by any policy?
- Are my policies implemented efficiently?
Installation (requires Python 3.8 or above)
For command-line use, NCA is installed with:
pip install network-config-analyzer
NCA can also be consumed as a Docker container, GitHub Action or Tekton Tasks.
Usage
Basic NCA command-line usage:
nca <query> [--resource_list <resource_list>] [--base_resource_list <base_resource_list>]
For example:
nca --connectivity --resource_list k8s # Read policies and endpoints from a live Kubernetes cluster and report connectivity
# OR
nca --semantic_diff -r istio --base_resource_list ./old_config # Compare two istio connectivity configs
The full list of queries is:
--sanity
- Running several sanity checks on the given set of NetworkPolicies--connectivity
- Get the list of allowed connections (as firewall rules or as a graph) as implied by the given set of NetworkPolicies--semantic_diff
- Get the semantic connectivity difference (as firewall rules) between two sets of NetworkPolicy sets--equiv
- Semantically comparing two sets of NetworkPolicy sets to decide whether they allow exactly the same traffic--interferes
- Checking whether the given set of NetworkPolicies interferes with the base set of NetworkPolicies (allows more traffic between relevant endpoints)--permits
- Checking whether the base set of NetworkPolicies permits the traffic explicitly specified in the given set of NetworkPolicies--forbids
- Checking whether the base set of NetworkPolicies forbids the traffic explicitly specified in the given set of NetworkPolicies
The arguments to --resource_list
and to --base_resource_list
should be one of:
- a path to a yaml/json file defining NetworkPolicies and/or endpoints
- a path to a directory with files containing NetworkPolicies and/or endpoints
- a URL of a GitHub repository/dir/file with NetworkPolicies and/or endpoints
- The string
k8s
, instructing the tool to take all NetworkPolicies and endpoints from a Kubernetes cluster (usingkubectl
) - The string
calico
, instructing the tool to take all NetworkPolicies and endpoints from a Kubernetes cluster with Calico (usingcalicoctl
) - The string
istio
, instructing the tool to take all AuthorizationPolicies and endpoints from a Kubernetes cluster with Istio (usingkubectl
)
Additional command-line switches:
--resource_list <an argument from the list above>
Specifies where to take namespaces, endpoints and NetworkPolicies from. This switch may be specified multiple times
shorthand:-r
--ns_list <an argument from the list above>
Specifies where to take the list of namespaces from (and ignoring namespaces found by--resource_list
). This switch may be specified multiple times
default: the result ofkubectl get ns
shorthand:-n
--pod_list <an argument from the list above>
Specifies where to take the list of pods/endpoints from (and ignoring those found by--resource_list
). This switch may be specified multiple times
default: the result ofkubectl get pods -A
shorthand:-p
--base_resource_list <an argument from the list above>
Specifies where to take namespaces, endpoints and NetworkPolicies to compare against. This switch may be specified multiple times--base_np_list <an argument from the list above>
The set of NetworkPolicies to compare against. Using this switch will ignore NetworkPolicies found by--base_resource_list
default: The result ofkubectl get netpol -A
shorthand:-b
--base_ns_list <an argument from the list above>
Specifies files with list of namespaces to compare against (and ignoring those found by--base_resource_list
). This switch may be specified multiple times--base_pod_list <an argument from the list above>
Specifies files with list of pods/endpoints to compare against (and ignoring those found by--base_resource_list
). This switch may be specified multiple times--ghe_token <token>
A valid token to access a GHE repository--period <minutes>
Run NCA with given arguments every specified number of minutes--daemon
Run NCA as a daemon. Send and receive data using a REST API.--output_format <format>
Output format specification (txt/yaml/csv/md/dot).
default: txt
shorthand:-o
--file_out <file name>
A file path to redirect output into.
shorthand-f
--expected_output <file name>
A file path to the expected query output (for connectivity or semantic_diff queries).\--pr_url <URL>
Write output as GitHub PR comment. URL points to the relevantcomments
resource in the GitHub API.
e.g., https://api.github.com/repos/shift-left-netconfig/online-boutique/issues/1/comments--output_endpoints
Choose endpoints type in output (pods/deployments).
default: deployments
For more information on command-line switches combinations, see Common Query Patterns
Exit Code Meaning:
The exit value of running a command-line without a scheme is the combination of two factors:
- The result of running the query (0/1) as specified here
- The result of comparing the query output with the expected output file contents (if given)
And it can be in the range 0 to 3 as followed:
- 0 : query result is 0, output comparison passed.
- 1 : query result is 1, output comparison passed.
- 2 : query result is 0, output comparison failed.
- 3 : query result is 1, output comparison failed.
Running with a scheme file
Scheme files allow running NCA on multiple queries in a single command-line, and also for fine-tuning the output.
To run NCAs with a scheme file, use the --scheme
switch.
nca --scheme <scheme_file>
where scheme_file
is a yaml file describing what to verify.
Scheme files should follow this specification. See an example scheme file.
Supported platforms
- Kubernetes
- Calico
- Istio (see what is supported here.)
Contributing
If you have any questions or issues you can create a new issue here.
Pull requests are very welcome! Make sure your patches are well tested. Ideally create a topic branch for every separate change you make. For example:
- Fork the repo
- Create your feature branch (
git checkout -b my-new-feature
) - Commit your changes (
git commit -am 'Added some feature'
) - Push to the branch (
git push origin my-new-feature
) - Create new Pull Request
License
All source files must include a Copyright and License header. The SPDX license header is preferred because it can be easily scanned.
If you would like to see the detailed LICENSE click here.
#
# Copyright 2020- IBM Inc. All rights reserved
# SPDX-License-Identifier: Apache2.0
#
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Hashes for network-config-analyzer-1.4.2.tar.gz
Algorithm | Hash digest | |
---|---|---|
SHA256 | 22a5a3cd482c23ca2222398c091b466055e1ff30ecfa1899ee26505f9f79e58b |
|
MD5 | 6565a7184f946293aafec299067a1374 |
|
BLAKE2b-256 | ae414303a8fbb19667510adb7841f6155bb239f166869b48195d943bfe6e3217 |
Hashes for network_config_analyzer-1.4.2-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | af07676d9c1834390740cb2ea58272aca83398b849992e555f6582ab64a38b8d |
|
MD5 | e9be420d4a4674d38db90f55f200b164 |
|
BLAKE2b-256 | 431ba88700e83af244ae41e5ff49cd7a489e2b8a57bdc327ff9345fc6df1d4e6 |