-
Notifications
You must be signed in to change notification settings - Fork 18.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Proposal: exposing SCTP ports for container #9689
Comments
-- from IRC -- I'm not very familiar with this part of the code base and there seems to be a large number of references, so this change might be better looked at by someone more experienced. It seems like just modifying the checks for the -p flag would be sufficient. |
ping @crosbymichael @mavenugo is there any reason, aside from trying to fail fast, that we don't just let the protocol string be passed all the way down to the iptables call and let unknown/invalid protocols be detected at that point? Then we don't need to check in docker itself and just let the underlying OS decide. |
ping @mavenugo could you answer this? |
With CNM (Container Networking Model), container connectivity across multiple hosts can be achieved through various drivers/plugins. Some of the drivers such as the in-built overlay, supports these container connectivity without the need to port mapping. Hence SCTP or other protocols can just work without the need to map or expose ports. But, in order to expose the service provided by a container to external networks that are not managed under CNM, we would have to do port-mapping and hence this request must be addressed. Also, the concept of external connectivity varies under different deployment scenario. This enhancement request should be included in that context when making design decisions. |
What is the current status of this feature ? |
@ishidawataru opened PR #33922 |
libnetwork-side PR has been opened as moby/libnetwork#1825 Anyone please look into the PR? |
@mavenugo What is the current status of this feature ? |
@mavenugo (Madhu), Can you please update the current status of this feature? |
hi can you please provide details on how SCTP is now supported? Any examples that you can share? |
I think all PR's are merged now, and will be included in Docker 18.03 (release candidates are available); see
Closing this issue, because it looks like we're done, but feel free to comment in case I missed something |
do you know if Kubernetes supports SCTP? |
@thaJeztah Can you please provide me a pointer to Docker 18.03? Should I see this in Edge releases? |
It's not released yet; release candidates are available in the "test" channel, or through the install script at https://test.docker.com |
@thaJeztah thanks...so I just run this script on my CentOS VM? Also, I would like to try the support for SCTP. Can you please provide some doc/info on how to use this feature in docker? |
@verizonold from docker's perspective it's mainly allowing you to specify |
@thaJeztah thanks...so what is the link to the release candidates in the "test" channel? |
@verizonold you just need to do
Kubernetes-part hasn't been worked out yet. |
Hi all. Are memory cgroups limits enforced for SCTP kernel buffers? |
@AkihiroSuda ^^ think you may have more insight into that |
@teknoraver You're talking about SCTP-equivalent of |
@AkihiroSuda exactly that one. One to avoid that a process will waste all the system memory? |
Although not specific to SCTP buffer, does |
Is there a way to run userspace sctp stack in the container? |
I don't think so. |
Hi, I recently discovered this, which is strictly related to this issue: |
While trying to expose an incoming SCTP port for my container, I found out that something like
-p x:y/sctp
is not yet supported. It would be great to have the flexibility of exposing ports for any protocol for a container, although SCTP currently has the highest priority on my wish list.The text was updated successfully, but these errors were encountered: