-
Notifications
You must be signed in to change notification settings - Fork 85
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[RFE] Support bridges created outside of netavark #1090
Comments
I'd like to add that my case is for a bridge-to-lan setup where the bridge acts as an L2 layer so VMs and Containers can access the campus LAN directly instead of adding another L3 virtual net |
I'm thinking of adding a boolean property: true is default and means netavark will manage the bridge Upon |
@RushingAlien FYI your use case can be handled by using the Have a look at podman-network-create(1) and/or this docker macvlan tutorial. |
It worked, thanks :D. On another note, Will rootless containers be able to use the exisitng bridge? if so can dhcp work for these rootless containers connected to the bridge? |
No rootless networking cannot use any host interfaces, be it macvlan or bridge, we simply have no privileges and thus the dhcp proxy will also never work there. Rootless networking runs always in a isolated namesapce, see containers/podman#22943 (comment) for the architecture |
@Luap99 What do you think about unmanaged bridge support? I also need it, because macvlans can't communicate with the host (which in my case is a router, so it has to. And forwarding is not an option because I want NAT-free IPv6). I can implement this, once we agreed on the details. What's not yet clear to me is what we want to do with the firewall rules and all the sysctl settings which are currently changed(I don't fully understand why that's done). If we disable too much one could ask why we even want to use the bridge driver instead of a new one(a plugin?). |
I was thinking of a network option like In this case all firewall rules would need to be managed by users which I think is the normal expected use case if you share a bridge with VMs and containers. |
cc @mheon In case you have onions here |
My only question is user experience. How do we expose this in a way that makes sense and doesn't introduce a lot of complexity? |
podman network create --opt mode=l2 if we just parse it as normal option like mtu for example. |
Fair enough... I'm not crazy about the idea, but code-wise it shouldn't be much burden to maintain |
While Linux doesn't support modes on bridges, we use this concept to let the user tell us if they want podman/netavark to own the bridge or not. L3 behaves the same way as before this commit. L2 requires the bridge to exist already, will not setup any sysctls or firewall rules on the host and will not delete the bridge once all containers left. Fixes containers#1090 Signed-off-by: Michael Zimmermann <[email protected]>
While Linux doesn't support modes on bridges, we use this concept to let the user tell us if they want podman/netavark to own the bridge or not. L3 behaves the same way as before this commit. L2 requires the bridge to exist already, will not setup any sysctls or firewall rules on the host and will not delete the bridge once all containers left. Fixes containers#1090 Signed-off-by: Michael Zimmermann <[email protected]>
While Linux doesn't support modes on bridges, we use this concept to let the user tell us if they want podman/netavark to own the bridge or not. L3 behaves the same way as before this commit. L2 requires the bridge to exist already, will not setup any sysctls or firewall rules on the host and will not delete the bridge once all containers left. Fixes containers#1090 Signed-off-by: Michael Zimmermann <[email protected]>
While Linux doesn't support modes on bridges, we use this concept to let the user tell us if they want podman/netavark to own the bridge or not. L3 behaves the same way as before this commit. L2 requires the bridge to exist already, will not setup any sysctls or firewall rules on the host and will not delete the bridge once all containers left. Fixes containers#1090 Signed-off-by: Michael Zimmermann <[email protected]>
While Linux doesn't support modes on bridges, we use this concept to let the user tell us if they want podman/netavark to own the bridge or not. Managed behaves the same way as before this commit. Unmanaged requires the bridge to exist already, will not setup any sysctls or firewall rules on the host and will not delete the bridge once all containers left. Fixes containers#1090 Signed-off-by: Michael Zimmermann <[email protected]>
Some users want to connect containers to a bridge that they have created outside of podman/netavark , e.g. so that VMs and containers can talk to each other. According to the comments in #868 we do not currently support this configuration:
The patch in that PR does work, but only coincidentally due to implementation details, and it leaves some cruft behind such as tables/chains that are left empty due to no IPs. We instead should explicitly support this configuration and not call the firewall code at all if the interface has no netavark-assigned IP.
The text was updated successfully, but these errors were encountered: