Routes Minecraft client connections to backend servers based upon the requested server address
Go to file
2023-04-24 06:54:36 -05:00
.github build(deps): bump github.com/pires/go-proxyproto from 0.6.2 to 0.7.0 (#175) 2023-03-20 14:35:16 -05:00
cmd/mc-router Persistent routes from REST API (#145) 2022-12-05 07:58:13 -06:00
docs Enable network filtering for docker swarm discovery (#143) 2022-11-17 08:38:44 -06:00
mcproto Very minor clean-ups (import re-ordering by automated tooling) (#28) 2021-12-11 18:20:19 -06:00
server Persistent routes from REST API (#145) 2022-12-05 07:58:13 -06:00
test/mc-router-telegraf-backend Added influxdb as a metrics reporter/backend 2020-01-04 14:22:01 -06:00
.dockerignore Added a multi-stage Dockerfile for easier local image builds 2021-12-04 18:31:18 -06:00
.gitignore misc: added testing.http file 2020-05-04 18:01:04 -05:00
.goreleaser.yml Added a multi-stage Dockerfile for easier local image builds 2021-12-04 18:31:18 -06:00
Dockerfile build(deps): bump github.com/pires/go-proxyproto from 0.6.2 to 0.7.0 (#175) 2023-03-20 14:35:16 -05:00
Dockerfile.release Added a multi-stage Dockerfile for easier local image builds 2021-12-04 18:31:18 -06:00
go.mod Revert "build(deps): bump github.com/docker/docker (#184)" 2023-04-24 06:54:36 -05:00
go.sum Revert "build(deps): bump github.com/docker/docker (#184)" 2023-04-24 06:54:36 -05:00
http-client.env.json misc: added testing.http file 2020-05-04 18:01:04 -05:00
LICENSE.txt misc: updated license dates 2020-01-04 14:22:26 -06:00
Makefile ci: ensured Makefile test goal is "phony" 2020-07-05 20:14:14 -05:00
README.md Persistent routes from REST API (#145) 2022-12-05 07:58:13 -06:00
skaffold.yaml add support for developing in-cluster with Skaffold (#27) 2021-11-20 12:16:56 -06:00
testing.http misc: added testing.http file 2020-05-04 18:01:04 -05:00

GitHub issues Docker Pulls test GitHub release Discord Buy me a coffee

Routes Minecraft client connections to backend servers based upon the requested server address.

Usage

  -api-binding host:port
    	The host:port bound for servicing API requests (env API_BINDING)
  -auto-scale-up
      Increase Kubernetes StatefulSet Replicas (only) from 0 to 1 on respective backend servers when accessed (env AUTO_SCALE_UP)
  -connection-rate-limit int
    	Max number of connections to allow per second (env CONNECTION_RATE_LIMIT) (default 1)
  -cpu-profile string
    	Enables CPU profiling and writes to given path (env CPU_PROFILE)
  -debug
    	Enable debug logs (env DEBUG)
  -in-kube-cluster
    	Use in-cluster Kubernetes config (env IN_KUBE_CLUSTER)
  -kube-config string
    	The path to a Kubernetes configuration file (env KUBE_CONFIG)
  -in-docker-swarm
      Use in-swarm Docker config (env IN_DOCKER_SWARM)
  -docker-timeout
      Timeout configuration in seconds for the Docker Swarm integration (env DOCKER_TIMEOUT) (default 0)
  -docker-refresh-interval
      Refresh interval in seconds for the Docker Swarm integration (env DOCKER_REFRESH_INTERVAL) (default 15)
  -mapping string
    	Comma-separated mappings of externalHostname=host:port (env MAPPING)
  -metrics-backend string
    	Backend to use for metrics exposure/publishing: discard,expvar,influxdb (env METRICS_BACKEND) (default "discard")
  -metrics-backend-config-influxdb-addr string
    	 (env METRICS_BACKEND_CONFIG_INFLUXDB_ADDR)
  -metrics-backend-config-influxdb-database string
    	 (env METRICS_BACKEND_CONFIG_INFLUXDB_DATABASE)
  -metrics-backend-config-influxdb-interval duration
    	 (env METRICS_BACKEND_CONFIG_INFLUXDB_INTERVAL) (default 1m0s)
  -metrics-backend-config-influxdb-password string
    	 (env METRICS_BACKEND_CONFIG_INFLUXDB_PASSWORD)
  -metrics-backend-config-influxdb-retention-policy string
    	 (env METRICS_BACKEND_CONFIG_INFLUXDB_RETENTION_POLICY)
  -metrics-backend-config-influxdb-tags value
    	any extra tags to be included with all reported metrics (env METRICS_BACKEND_CONFIG_INFLUXDB_TAGS)
  -metrics-backend-config-influxdb-username string
    	 (env METRICS_BACKEND_CONFIG_INFLUXDB_USERNAME)
  -port port
    	The port bound to listen for Minecraft client connections (env PORT) (default 25565)
  -routes-config string
        The path to the routes config file (env ROUTES_CONFIG)
  -version
    	Output version and exit (env VERSION)

REST API

  • GET /routes (with Accept: application/json)

    Retrieves the currently configured routes

  • POST /routes (with Content-Type: application/json)

    Registers a route given a JSON body structured like:

    {
      "serverAddress": "CLIENT REQUESTED SERVER ADDRESS",
      "backend": "HOST:PORT"
    }
    
  • POST /defaultRoute (with Content-Type: application/json)

    Registers a default route to the given backend. JSON body is structured as:

    {
      "backend": "HOST:PORT"
    }
    
  • DELETE /routes/{serverAddress}

    Deletes an existing route for the given serverAddress

Docker Multi-Architecture Image

The multi-architecture image published at Docker Hub supports amd64, arm64, and arm32v6 (i.e. RaspberryPi).

Docker Compose Usage

The following diagram shows how the example docker-compose.yml configures two Minecraft server services named vanilla and forge, which also become the internal network aliases. Notice those services don't need their ports exposed since the internal networking allows for the inter-container access.

The router service is only one of the services that needs to exposed on the external network. The --mapping declares how the hostname users will enter into their Minecraft client will map to the internal services.

To test out this example, I added these two entries to my "hosts" file:

127.0.0.1 vanilla.example.com
127.0.0.1 forge.example.com

Kubernetes Usage

Using Kubernetes Service auto-discovery

When running mc-router as a Kubernetes Pod and you pass the --in-kube-cluster command-line argument, then it will automatically watch for any services annotated with

  • mc-router.itzg.me/externalServerName : The value of the annotation will be registered as the external hostname Minecraft clients would used to connect to the routed service. The service's clusterIP and target port are used as the routed backend. You can use more hostnames by splitting them with comma.
  • mc-router.itzg.me/defaultServer : The service's clusterIP and target port are used as the default if no other externalServiceName annotations applies.

For example, start mc-router's container spec with

image: itzg/mc-router
name: mc-router
args: ["--in-kube-cluster"]

and configure the backend minecraft server's service with the annotation:

apiVersion: v1
kind: Service
metadata:
  name: mc-forge
  annotations:
    "mc-router.itzg.me/externalServerName": "external.host.name"

you can use multiple host names:

apiVersion: v1
kind: Service
metadata:
  name: mc-forge
  annotations:
    "mc-router.itzg.me/externalServerName": "external.host.name,other.host.name"

mc-router will pick the service port named either minecraft or mc-router. If neither port names exist, it will use port value 25565.

Example Kubernetes deployment

This example deployment

  • Declares an mc-router service that exposes a node port 25565
  • Declares a service account with access to watch and list services
  • Declares --in-kube-cluster in the mc-router container arguments
  • Two "backend" Minecraft servers are declared each with an "mc-router.itzg.me/externalServerName" annotation that declares their external server name(s)
kubectl apply -f https://raw.githubusercontent.com/itzg/mc-router/master/docs/k8s-example-auto.yaml

Notes

  • This deployment assumes two persistent volume claims: mc-stable and mc-snapshot
  • I extended the allowed node port range by adding --service-node-port-range=25000-32767 to /etc/kubernetes/manifests/kube-apiserver.yaml

Auto Scale Up

The -auto-scale-up flag argument makes the router "wake up" any stopped backend servers, by changing replicas: 0 to replicas: 1.

This requires using kind: StatefulSet instead of kind: Service for the Minecraft backend servers.

It also requires the ClusterRole to permit get + update for statefulsets & statefulsets/scale, e.g. like this (or some equivalent more fine-grained one to only watch/list services+statefulsets, and only get+update scale):

apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
  name: services-watcher
rules:
- apiGroups: [""]
  resources: ["services"]
  verbs: ["watch","list"]
- apiGroups: ["apps"]
  resources: ["statefulsets", "statefulsets/scale"]
  verbs: ["watch","list","get","update"]

Docker Swarm Usage

Using Docker Swarm Service auto-discovery

When running mc-router in a Docker Swarm environment you can pass the --in-docker-swarm command-line argument and it will poll the Docker API periodically to find all the running services for minecraft instances. To enable discovery you have to set the mc-router.host label on the service. These are the labels scanned:

  • mc-router.host: Used to configure the hostname the Minecraft clients would use to connect to the server. The service endpoint will be used as the routed backend. You can use more than one hostname by splitting it with a comma.
  • mc-router.port: This value must be set to the port the Minecraft server is listening on. The default value is 25565.
  • mc-router.default: Set this to a truthy value to make this server the deafult backend. Please note that mc-router.host is still required to be set.
  • mc-router.network: Specify the network you are using for the router if multiple are present in the service. You can either use the network ID, it's full name or an alias.

Example Docker Swarm deployment

Refer to this example docker-compose.yml to see how to configure two different Minecraft servers and a mc-router instance. Notice how you don't have to expose the Minecraft instances ports, but all the containers are required to be in the same network.

Development

Building locally with Docker

docker build -t mc-router .

Build locally without Docker

After installing Go and doing a go mod download to install all required prerequisites, just like the Dockerfile does, you can:

make test # go test -v ./...
go build ./cmd/mc-router/

Skaffold

For "in-cluster development" it's convenient to use https://skaffold.dev. Any changes to Go source code will trigger a go build, new container image pushed to registry with a new tag, and refresh in Kubernetes with the image tag used in the deployment transparently updated to the new tag and thus new pod created pulling new images, as configured by skaffold.yaml:

skaffold dev

When using Google Cloud (GCP), first create a Docker Artifact Registry, then add the Artifact Registry Reader Role to the Compute Engine default service account of your GKE clusterService Account (to avoid error like "container mc-router is waiting to start: ...-docker.pkg.dev/... can't be pulled"), then use e.g. gcloud auth configure-docker europe-docker.pkg.dev or equivalent one time (to create a ~/.docker/config.json), and then use e.g. --default-repo=europe-docker.pkg.dev/YOUR-PROJECT/YOUR-ARTIFACT-REGISTRY option for skaffold dev.

Performing snapshot release with Docker

docker run -it --rm \
  -v ${PWD}:/build -w /build \
  -v /var/run/docker.sock:/var/run/docker.sock \
  goreleaser/goreleaser \
  release --snapshot --rm-dist

Related Projects