-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Pull image shows dial tcp: lookup registry-1.docker.io on 172.19.0.1:53: no such host #1974
Comments
if you pass proxy environment variables to |
you've set proxy settings for the host docker by configuring those files, but we need proxy configuration for the kind nodes and their nested container runtime. when you run the these environment variables seem to be the closest thing to a standard for supporting proxies, it should work with them, but it is not running underneath the docker.service so just configuring that isn't really sufficient at the moment. depending on how minikube was used the requirements will be different. |
Hi, Thanks |
You just need to set the environment variables when calling
the no_proxy is not causing this, it's set to no_proxy traffic between the internal components of the cluster. |
Thanks for the tips. I used command Is there anyway to add port mapping and no_proxy without recreating the whole cluster? |
👍
Internal to the cluster? We inject no_proxy for all the things we can predict (like the service namespace, node IP range, pod IP range, service VIP range), but we can't predict your pod / service names. If you use a more qualified name it should match (e.g.
I don't think we can reasonably do much more for proxies than we do now, we can't set no proxy for these arbitrary unqualified domains. We could try to work with the proxy settings passed to dockerd (if they're exposed in some way) but generally we need the chance to read your no_proxy so we can inject all these additional ranges when creating the node, and it sounds like those were only setting the proxy, not no_proxy.
not really (docker restrictions). though on linux you don't need kind level port mapping, that's for portability to mac etc. on linux you can reach the nodes by IP. recreating clusters is supposed to be cheap as well, but you could try to modify the http proxy configuration in systemd and restart all services on the node using docker exec. ... I really recommend recreating the cluster, it's not something binaries / dependencies we don't implement ourselves like containerd read dynamically, pretty universally proxy settings must be introduced before a process starts. |
I think anything remaining is at most a dupe of #1175 |
What happened:
Hi,
I use kind to create a local cluster. My machine is behind the proxy, and when I start a deployment, the pod logs shows that can not dial tcp: lookup registry-1.docker.io 172.19.0.1:53: on no such host. I have already set the env in /etc/systemd/system/docker.service.d/http-proxy.conf and /etc/systemd/system/docker.service.d/https-proxy.conf. I used minikube to create the cluster, there was no such issue then.
Is there any special config to pass the proxy setting into the cluster?
Here is the log
What you expected to happen:
pull image success
How to reproduce it (as minimally and precisely as possible):
Deploy apps behind a proxy (docker daemon must also be correctly configured)
Environment:
kind version
): 0.9.0kubectl version
): v1.19.1docker info
): 19.03.1/etc/os-release
): Red Hat Enterprise Linux 7The text was updated successfully, but these errors were encountered: