-
Notifications
You must be signed in to change notification settings - Fork 3.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Logging Driver: Allow driver to use docker DNS by joining docker network #2537
Comments
This issue has been automatically marked as stale because it has not had any activity in the past 30 days. It will be closed in 7 days if no further activity occurs. Thank you for your contributions. |
Bump
|
This issue has been automatically marked as stale because it has not had any activity in the past 30 days. It will be closed in 7 days if no further activity occurs. Thank you for your contributions. |
bump
|
This is highly desirable for my team. |
Would like some more info on this as well. |
This issue has been automatically marked as stale because it has not had any activity in the past 30 days. It will be closed in 7 days if no further activity occurs. Thank you for your contributions. |
up |
This issue has been automatically marked as stale because it has not had any activity in the past 30 days. It will be closed in 7 days if no further activity occurs. Thank you for your contributions. |
🔼 |
This issue has been automatically marked as stale because it has not had any activity in the past 30 days. It will be closed in 7 days if no further activity occurs. Thank you for your contributions. |
🆙 |
* handling of empty directories in filesystem object client Signed-off-by: Sandeep Sukhani <sandeep.d.sukhani@gmail.com> * calling os.Remove instead of os.RemoveAll while removing empty directory Signed-off-by: Sandeep Sukhani <sandeep.d.sukhani@gmail.com> * some minor improvement Signed-off-by: Sandeep Sukhani <sandeep.d.sukhani@gmail.com> * negative test for isNotEmptyErr Signed-off-by: Sandeep Sukhani <sandeep.d.sukhani@gmail.com> * some changes suggested from PR review Signed-off-by: Sandeep Sukhani <sandeep.d.sukhani@gmail.com> * fixed comment Signed-off-by: Sandeep Sukhani <sandeep.d.sukhani@gmail.com> * changes suggested from PR review Signed-off-by: Sandeep Sukhani <sandeep.d.sukhani@gmail.com>
@cyriltovena How to run plugin on different network? My service is ran on its own network:
It would be nice that I dig whole the day, to understand what is happening... =( |
Is your feature request related to a problem? Please describe.
We run a docker swarm and are looking into the Loki driver. One snag - all examples I can find for
loki-url
use either a static domain (e.g.loki.foo.com
) or they use the docker host IP address (host.docker.internal
).Neither of these work well a swarm with multiple nodes that is running a loki instance inside the swarm. The docker host address will not work at all on nodes other than the one node running loki
Describe the solution you'd like
Ideally, we could specify which network to attach the loki driver to (currently it runs with the host's network). That would allow the common docker pattern of using a docker-provided DNS name that round-robins to the matching containers. This would also work well in swarm mode using an overlay network. For example:
Describe alternatives you've considered
We considered HTTP redirect sidecars to make the host.docker.internal approach work on all nodes, even those not running loki. Problem is you need to run the sidecar on all nodes except the node running loki, so you now have to label your nodes specifically to work around this issue.
We also considering using a static name (e.g.
loki.foo.com
) and only making it available from inside the swarm. While this would work for our production stack, anyone trying to do local development would have a problem (we often spin up a vagrant-powered swarm cluster locally) and have to reconfigure their local machine to affix a permanent IP address to the loki container, which can change location. In short, they would have exactly the type of issue the docker dns system addresses ;-)The text was updated successfully, but these errors were encountered: