Hi @pashinin, if consul, nomad, and vault are configured to only listen to a local address it won’t be possible to connect to them directly from inside the network namespace that the connect tasks run in. You could do something like make use of consul’s unix socket listener capability and volume mount the socket file into the allocation (Nomad actually does this for the Envoy sidecar’s xDS over gRPC connection to Consul), or do some iptables magic on the host to forward packets destined for a routable address.
A third option if possible would be to make your service Connect Native, which Nomad supports running in host networking mode rather than only bridge networking.
Interesting idea @pashinin, I think terminating gateways might work for this use case. Adding support for terminating and mesh gateways is on our upcoming roadmap.
Hey @shoenig,
thanks for the info and also thanks for the coding dive Nomad video.
Where can I go to check for updates on the timeline to adding Terminating Gateways to Nomad?
(My team is in need of a way to control egress and Terminating Gateways and External Services seem like they will allow us to do what we need to in a very nice way)
Hi @jl2501 I don’t have exact dates yet, but terminating + mesh gateways are on the roadmap following the 1.0 release. I realize we didn’t have any public issues for these yet, so I created GH-9445 and GH-9446 to track.