Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Docker daemon threads can become affixed to a container's network namespace, causing network errors later when the container is stopped (default network) #1140

Open
samuelkarp opened this issue Apr 25, 2016 · 1 comment

Comments

@samuelkarp
Copy link
Member

This is very similar to #1113, which concerns the embedded DNS server in non-default networks. However, running our repro script based on the repro provided in #1113, we're able to observe the same effect (daemon threads in a container's network namespace) while using a default network.

We've tested this in a few different configurations, and have the following results:

These tests were all run on Amazon EC2 instances running the Amazon Linux AMI on a mix of different instance types.

From these results, it looks like it has been a problem for a while, but got worse more recently.

@euank
Copy link

euank commented Jun 27, 2017

More recent docker versions (post the containerd/runc split) have changed significantly. Is this bug still accurate, or was it fixed somewhere along the way and not closed?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants