-
-
Notifications
You must be signed in to change notification settings - Fork 14.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Docker network / socket issues #11478
Comments
The networking issue on boot seems to be fixed now, but still no socket after restart. |
Setting
Wondering if the |
@jgillich you mean |
@domenkozar It's true by default, I had to set it to false. |
Disabling |
Likewise, I just moved from 15.09 to unstable, and had to set |
Well, in my case it just takes a few moments(~20seconds) to start-up, you On Sun, Feb 14, 2016 at 1:11 PM Christopher Martin notifications@github.com
|
@offlinehacker even after five minutes |
@jgillich any updates? |
No, I'm not even using NixOS currently. But feel free to look into it yourself. |
i've solved this by |
No, that's no a solution. FWIW, there's a similar issue with socket activation on Ubuntu Xenial: moby/moby#23793 |
It causes issues for many people, see NixOS#11478
All the new options in detail: Enable docker in multi-user.target make container created with restart=always to start. We still want socket activation as it decouples dependencies between the existing of /var/run/docker.sock and the docker daemon. This means that services can rely on the availability of this socket. Fixes NixOS#11478 NixOS#21303 wantedBy = ["multi-user.target"]; This allows us to remove the postStart hack, as docker reports on its own when it is ready. Type=notify The following will set unset some limits because overhead in kernel's ressource accounting was observed. Note that these limit only apply to containerd. Containers will have their own limit set. LimitNPROC=infinity LimitCORE=infinity TasksMax=infinity Upgrades may require schema migrations. This can delay the startup of dockerd. TimeoutStartSec=0 Allows docker to create its own cgroup subhierarchy to apply ressource limits on containers. Delegate=true When dockerd is killed, container should be not affected to allow `live restore` to work. KillMode=process
docker is also missing the modprobe binary - usually such firewall modules are automatically loaded by iptables but maybe we could add the binary to the paths to silence the warning. |
All the new options in detail: Enable docker in multi-user.target make container created with restart=always to start. We still want socket activation as it decouples dependencies between the existing of /var/run/docker.sock and the docker daemon. This means that services can rely on the availability of this socket. Fixes #11478 #21303 wantedBy = ["multi-user.target"]; This allows us to remove the postStart hack, as docker reports on its own when it is ready. Type=notify The following will set unset some limits because overhead in kernel's ressource accounting was observed. Note that these limit only apply to containerd. Containers will have their own limit set. LimitNPROC=infinity LimitCORE=infinity TasksMax=infinity Upgrades may require schema migrations. This can delay the startup of dockerd. TimeoutStartSec=0 Allows docker to create its own cgroup subhierarchy to apply ressource limits on containers. Delegate=true When dockerd is killed, container should be not affected to allow `live restore` to work. KillMode=process
Two issues here.
--net host
works too)systemctl restart docker
doesn't recreate the socket/var/run/docker.sock
So here is bascially what happens:
Journal logs:
The text was updated successfully, but these errors were encountered: