Skip to content

Commit

Permalink
Prevent Docker from manipulating iptables
Browse files Browse the repository at this point in the history
Use built-in support in Kolla Ansible for preventing Docker from
manipulating iptables, to avoid connectivity issues with instances.

(cherry picked from commit 399455d)
  • Loading branch information
priteau committed Aug 26, 2020
1 parent a0f06b0 commit af360c2
Show file tree
Hide file tree
Showing 3 changed files with 4 additions and 10 deletions.
9 changes: 0 additions & 9 deletions README.rst
Original file line number Diff line number Diff line change
Expand Up @@ -230,15 +230,6 @@ VM:
source config/src/kayobe-config/etc/kolla/public-openrc.sh
./config/src/kayobe-config/init-runonce.sh
We also need to relax iptables policies that are changed by Docker, which
prevent traffic from reaching instances. You may need to rerun this command if
Docker reverts the FORWARD policy to DENY again. A proper fix will be
integrated soon.

.. code-block:: console
kayobe overcloud host command run --command "iptables -P FORWARD ACCEPT" --become --limit controllers
Following the instructions displayed by the above script, boot a VM.
You'll need to have activated the `~/os-venv` virtual environment.

Expand Down
1 change: 0 additions & 1 deletion a-universe-from-nothing.sh
Original file line number Diff line number Diff line change
Expand Up @@ -69,6 +69,5 @@ kayobe overcloud container image pull
kayobe overcloud service deploy
source config/src/kayobe-config/etc/kolla/public-openrc.sh
kayobe overcloud post configure
kayobe overcloud host command run --command "iptables -P FORWARD ACCEPT" --become --limit controllers
source config/src/kayobe-config/etc/kolla/public-openrc.sh
./config/src/kayobe-config/init-runonce.sh
4 changes: 4 additions & 0 deletions etc/kayobe/kolla/globals.yml
Original file line number Diff line number Diff line change
Expand Up @@ -7,3 +7,7 @@ nova_compute_virt_type: qemu
# Reduce the control plane's memory footprint by limiting the number of worker
# processes to one per-service.
openstack_service_workers: "1"

# Prevent Docker from manipulating iptables. Docker changes the default policy
# on the FORWARD chain, which prevents traffic from reaching instances.
docker_disable_default_iptables_rules: true

0 comments on commit af360c2

Please sign in to comment.