-
Notifications
You must be signed in to change notification settings - Fork 638
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[rootless] bridge network degrading ending in failure to expose port #3488
Comments
Restarting containerd does fix the issue - until repeat usage will trigger it again. @AkihiroSuda is containerd maintaining the list of mapped ports? |
I am very much out of my comfort zone. Is this just the rootless variant of #3253 ? |
No, the daemon doesn't care about ports
Maybe? |
I have been running qkboy patch for a few hours. |
Notes. Clearly, the issue comes from iptables getting clobbered. This:
With
Will immediately fix the issue when it happens. At this point, I am not convinced that the PR opened on cni plugins will fully address this - I think containers get destroyed without iptables NAT entries getting cleaned - either inside the CNI plugins, or somehow inside nerdctl. To be completely honest, oci-hooks + binary networking plugins does not feel like a good solution. Anyhow, once done with the testing cleanup, rethinking/fixing networking should be top priority (along with login...). |
Description
After some time testing:
This is specific to that port - that has been used (past tense) by other containers (not specific to
5003
- just specific to whichever port has been used heavily).It looks like after these containers got destroyed, something in cni (?) does not completely release the port (maybe in iptables?).
This is tricky to reproduce - I usually trigger this with repeatedly running test suite.
The text was updated successfully, but these errors were encountered: