Short-Term fix for overlapping cidrs using docker options
A quick alternative solution, until PRs to upstream Docker get accepted,
can be Docker user passing pool name to both Kuryr ipam driver and
Kuryr network driver using corresponding network and ipam options
respectively:
Reviewed: https:/ /review. openstack. org/331050 /git.openstack. org/cgit/ openstack/ kuryr/commit/ ?id=709fede534e c15e4f260c78019 083aff9cf19282
Committed: https:/
Submitter: Jenkins
Branch: master
commit 709fede534ec15e 4f260c78019083a ff9cf19282
Author: vikaschoudhary16 <email address hidden>
Date: Fri Jun 17 16:23:34 2016 +0530
Short-Term fix for overlapping cidrs using docker options
A quick alternative solution, until PRs to upstream Docker get accepted,
can be Docker user passing pool name to both Kuryr ipam driver and
Kuryr network driver using corresponding network and ipam options
respectively:
$sudo docker network create --driver=kuryr --ipam-driver=kuryr \ pool.name= neutron_ pool1 \
--ipam- opt=neutron. pool.name= neutron_ pool1 \
eddb51ebca09 339cb17aaec05e4 8ffe60659ced6f3 fc41b020b0eb506 d364
--subnet 10.0.0.0/16 --ip-range 10.0.0.0/24 \
-o neutron.
foo
Now Docker user creates another network with same cidr as the previous,
i.e 10.0.0.0/16, but with different pool name, neutron_pool2:
$sudo docker network create --driver=kuryr --ipam-driver=kuryr \ pool.name= neutron_ pool2 \
--ipam- opt=neutron. pool.name= neutron_ pool2 \
397badb51ebca0 9339cb17aaec05e 48ffe60659ced6f 3fc41b020b0eb50 6d786
--subnet 10.0.0.0/16 --ip-range 10.0.0.0/24 \
-o neutron.
bar
At ``/IpamDriver. RequestAddress` `, correct subnet will be filtered out using
corresponding pool name received from the libnetwork as explained above.
Please refer https:/ /review. openstack. org/#/c/ 326894/ 6
TODO: unit test cases covering docker option scenario
DocImpact 8219a387da66e1b d30be900ab1
Change-Id: I7090027e68e8c7
Closes-bug: #1585572