-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support dnsname plugin in networks created with internal flag (support isDefaultGateway) #8483
Comments
CC: @Luap99 and thanks for your help on irc. |
I guess this would be a good candidate for a network option after #8457 is merged |
Maybe something like |
A friendly reminder that this issue had no activity for 30 days. |
I did more testing and it looks like setting |
A friendly reminder that this issue had no activity for 30 days. |
@Luap99 can we close this issue now? |
Yes we cannot support this with the current dnsname architecture. We now print a warning if you create a internal network with the dnsname plugin. |
Is there any workaround for this? As I understand, it's currently not possible to use dns name resolution for rootful containers in a cni network created as "internal", right? So how to address a container from another container on the same network but without using pods, if the IP is assigned in an unpredictable way? I'm asking because I have two rootful containers in an internal network and one of them is supposed to access a port on the other but the name resolution fails and I can't use a fixed IP address because A) the IP address of rootful containers can't be fixed (right?) B) I'm trying to get docker-compose working which in turn allows setting the IP address of those containers which is not supported right now by the podman API socket I guess? I opened an issue about that specifically #10585 |
Currently dnsname plugins don't work when using
internal
podman network create --internal
because the cni network is configured with
"isGateway": false
and"isDefaultGateway": false
is hard coded tofalse
in the following linepodman/libpod/network/create.go
Line 175 in e239bfa
This has the following result:
cni-podman1
but with no ip address assigned to itTo resolve this issue it is possible to manually edit the cni network conflist file to use the following config:
Afterwards name resolution works and routing packets doesn't as expected because of the missing default route. Adding this route in the root container is prohibited (👍 ) as well.
Furthermore all cni networks are currently using the same dns zone
dns.podman
which is problematic when using multiple cni's in one container. It would be better to have different zones for different networks or to allow explicitly setting the name of the zone.I am not sure you want to change the defaults because of backward compatibility but it would be nice to set
isGateway
totrue
and add aisDefaultGateway
flag here which is set tofalse
podman/libpod/network/create.go
Lines 147 to 150 in e239bfa
The text was updated successfully, but these errors were encountered: