Ript: a terse but expressive DSL for iptables
Netfilter is an extremely powerful framework for manipulating packets, but does anyone actually like writing rules for it with iptables? Anyone who says they do likely hasn't had to maintain rulesets at scale, and if they have, they've almost certainly used some sort of tool that does the heavy lifting for them.
Enter Ript, a clean and opinionated Domain Specific Language for describing firewall rules, that implements database migrations-like functionality for applying these rules with zero downtime.
At Ript's core is an easy to use Ruby DSL for describing both simple and complex sets of iptables firewall rules. After defining the hosts and networks you care about, Ript's DSL provides helpers for all the common use cases: accepting, dropping, & rejecting packets, as well as for performing DNAT and SNAT.
Here is an example ruleset definition:
partition "joeblogsco" do
label "www.joeblogsco.com", :address => "188.8.131.52"
label "app-01", :address => "10.60.1.230"
rewrite "public website + ssh access" do
ports 80, 22
dnat "www.joeblogsco.com" => "app-01"
Ript provides a method to group common sets of rules together called "partitions", which are used at rule application time to perform zero-downtime migrations. This fosters a much more agile approach to firewall changes that limits the size and helps increase the frequency of changes - core principles behind Continuous Delivery.
Ript is designed from the ground up to be easy to use, and is extremely well tested end-to-end. Developed at Bulletproof Networks, it's been in use since 2012 in multi-tenanted firewall platforms as well as standalone systems.
In this talk Lindsay Holmwood will take you on a whirlwind tour of the DSL, explain how Ript utilises iptables features to work its magic, and provide some concrete examples of how Ript can help increase the reliability of the services you deliver.
Lindsay is sysadmin/developer/toolsmith/engineering manager, living in the New South Wales Blue Mountains.
He is the creator of cucumber-nagios (a tool that helps you describe how a system should work in natural language, and outputs whether it does in the Nagios plugin format), and Visage (a web service + interface for exposing collectd statistics).
Lindsay works at Bulletproof Networks running a distributed infrastructure development team that is strongly focused on testing & automation. He was responsible for keeping Movember up for the 2010 + 2011 campaigns, and works on scaling both internal and customer facing systems.
He served as President of the Sydney Linux Users Group from 2006-2008, was on the organising committee of linux.conf.au 2007, and organised the inaugural DevOps Down Under in 2010, and again in 2011. He also organises the monthly Sydney DevOps meetups, and speaks at conferences both in Australia and abroad.