-
Notifications
You must be signed in to change notification settings - Fork 59
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
docker breaks (podman) network (rules) #408
Comments
Unfortunately I don't have links to past issues but I think it's generally known within the space that |
i understand that mixing both could lead to some strange effects... there i would agree to have this at least documented what i tried to describe above is more of a security risk i see i appreciate that fcos enforces selinux now but on the other side opens new security holes like that... |
@zyclonite - the default configuration is to have docker socket activated. We decided to do this so that users coming from Container Linux would have a smoother transition. However you can easily disable docker completely by masking the
I added a faq entry in our docs that specifically tells users not to run docker and podman together and also how to mask the docker service. Can you review it? |
ok, makes sense tested it and faq looks fine as well, thank you |
Thanks! I'll close this issue when the docs PR merges |
@dustymabe How about those of us who want to stay on Docker and disable Podman? What is correct way to do it? Main reason to do so would be able to keep things on control can do migration to FCOS first (we can coming from Rancher OS) before start evaluating Podman. |
AFAIU podman isn't a daemon that runs. If you don't call out to |
bug?
binding a port to the podman host interface and accessing it from another container is blocked by iptables rules
but if the docker service is started it seems something is messed up and the podman container is able to access the port (after a restart of the container)
reproducer
starting with a fresh installed fcos instance
binding a container to the host interface e.g.
podman run -d --name mongo -p 10.88.0.1:27017:27017 mongo
then running another container, trying to reach that ip:port
podman run --rm -it alpine sh -c "apk update && apk add busybox-extras && telnet 10.88.0.1 27017"
does not work (i assume this is intended)
after simply executing
docker info
(triggering a docker service start) and running the same from above again - it worksdocker adds a lot of iptables rules but i tried that without touching docker service and it still did not work
fcos version
Version: 31.20200210.3.0 (2020-02-24T16:48:02Z)
The text was updated successfully, but these errors were encountered: