New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support joining any network namespace #7455
Comments
ping @shykes @crosbymichael |
+1 This seems like a very flexible option for handling network configuration. People are constantly trying to do things other than simple "give docker a bridge and total control over address range" model, and this would make that a lot easier. |
I kind of like this idea. Might have to handle the /etc/resolv.conf issues also |
I guess this is pretty much what kubernetes does already, using native docker support:
So that basically gets you to the same place, at the expense of always requiring the network container. |
The extra net container is a constant source of questions for kubernetes, On Sat, Oct 4, 2014 at 8:16 PM, Lars Kellogg-Stedman <
|
Yes, totally; a docker native solution would be much preferable. My comment stemmed from the fact that I was explaining kubernetes container networking to somebody and suddenly a light went off in my head and I realized the connection to this issue. |
+1 |
It would be nice to get someone from Docker to actually comment on this... |
There was a PR opened here #8216 where a is discussion going on. |
This patch adds the new "netns" network mode, which allows Docker to connect a container to an existing network namespace that has been previously created using the `ip netns add` command. Currently a WIP. Closes moby#7455 Signed-off-by: Lars Kellogg-Stedman <lars@redhat.com>
Allows attaching an existing network namespace to a container on create. e.g. --net="netns:path-for-netns". Closes moby#7455 Signed-off-by: Hugo Duncan <hugo@hugoduncan.org>
Allows attaching an existing network namespace to a container on create. e.g. --net="netns:path-for-netns". Closes moby#7455 Signed-off-by: Hugo Duncan <hugo@hugoduncan.org> Docker-DCO-1.1-Signed-off-by: Dan Walsh <dwalsh@redhat.com> (github: rhatdan)
Allows attaching an existing network namespace to a container on create. e.g. --net="netns:path-for-netns". Closes moby#7455 Signed-off-by: Hugo Duncan <hugo@hugoduncan.org> Docker-DCO-1.1-Signed-off-by: Dan Walsh <dwalsh@redhat.com> (github: rhatdan)
Allows attaching an existing network namespace to a container on create. e.g. --net="netns:path-for-netns". Closes moby#7455 Signed-off-by: Hugo Duncan <hugo@hugoduncan.org> Docker-DCO-1.1-Signed-off-by: Dan Walsh <dwalsh@redhat.com> (github: rhatdan)
Closing as this is no longer relevant (and ultimately rejected in the aforementioned PR). |
If docker supports joining any network namespace, then network topology could be left to higher level orchestration. This allows for flexibility in docker deployments. The user could setup the network by creating a new network namespace via ip netns, customize as required and then just pass it to docker with something like --net=netns:/var/run/netns/mycustomnet1.
The advantage is that docker does not have to worry about supporting all the different types of bridges/switches/custom protocols that users might want to use.
The text was updated successfully, but these errors were encountered: