You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When using the containerd container runtime, the /etc/hosts file for container is populated with:
127.0.0.1 localhost
This is causes any application that relies on the container hostname for DNS lookups to fail. For my organisation specifically this causes problems for Hadoop.
There is a workaround where the container is run as privileged, and a bootstrap script updates the /etc/hosts file before starting the application.
Steps to reproduce
Hijack a container, or run the following in a task:
cat /etc/hosts
Compare the results when running on guardian and containerd.
Summary
When using the guardian container runtime, the /etc/hosts file for containers is populated with something like:
When using the containerd container runtime, the /etc/hosts file for container is populated with:
This is causes any application that relies on the container hostname for DNS lookups to fail. For my organisation specifically this causes problems for Hadoop.
There is a workaround where the container is run as privileged, and a bootstrap script updates the /etc/hosts file before starting the application.
Steps to reproduce
Hijack a container, or run the following in a task:
Compare the results when running on guardian and containerd.
Expected results
Actual results
Triaging info
Concourse version: v7.2.0
Helm Chart: 15.0.3
Kubernetes (AWS EKS): v1.19.8
Did this used to work?
This works when using the guardian container runtime. Containerd as a runtime has only just been introduced
The text was updated successfully, but these errors were encountered: