Add the possibility to forbid docker engine of certain IP CIDR blocks #35206
Labels
area/networking
kind/enhancement
Enhancements are not bugs or new features but can improve usability or performance.
We are running multiple VPC's with different IP addresses.
One of our swarm clusters resides in a VPC with 172.19.0.0/16 and communicates with another VPC
that uses the IP CIDR of 172.18.0.0/16
Our swarm cluster auto generated docker_gwbridge overlapping the other VPC CIDR
Or event stand alone docker0 that defaults to
This caused severe connectivity issues on our cluster due to overlapping of the route published in AWS Routing table.
I am suggesting a feature request to add a list of IP's to /etc/docker/daemon.json a list of restricted IP CIDR that the engine could not possibly understand by it self.
The text was updated successfully, but these errors were encountered: