Skip to content
This repository has been archived by the owner on Sep 18, 2020. It is now read-only.

Stop networkd from interfering with Docker network interfaces #2300

Merged
merged 4 commits into from
Dec 6, 2016
Merged

Stop networkd from interfering with Docker network interfaces #2300

merged 4 commits into from
Dec 6, 2016

Conversation

dm0-
Copy link
Contributor

@dm0- dm0- commented Dec 6, 2016

This fixes coreos/bugs#1638.

It can be used to address coreos/bugs#1678.

Note that the problem with Docker from coreos/bugs#1485 is corrected by this, but that workaround is still in place to avoid changing behavior. See coreos/systemd#73.

@SpComb
Copy link

SpComb commented Dec 7, 2016

Would this change also serve to avoid the use of IPv6 autoconf on the host-side veths?

I think that currently the CoreOS host node will send ICMPv6 Router Solicitation messages on each container veth created by Docker, which isn't ideal. I'm not sure if it's possible for Docker containers to affect the host machine's IPv6 networking configuration that way.

@dm0-
Copy link
Contributor Author

dm0- commented Dec 7, 2016

@SpComb This change effectively makes veths invisible to networkd. I don't know offhand if anything else sends router solicitation messages, but they will no longer be triggered by networkd. (An exception since #2306 is veths named ve-*, but they should only be created by systemd-nspawn.)

From the issue you linked above, also note that systemd will support excluding devices by e.g. Driver=!bridge veth since systemd/systemd#4809. We don't plan to backport that feature to CoreOS, though, so it will be available with v233.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

No networking in some docker containers when spawned at high rate
3 participants