[ 
https://issues.apache.org/jira/browse/MESOS-9031?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16533475#comment-16533475
 ] 

Qian Zhang edited comment on MESOS-9031 at 7/5/18 10:22 AM:
------------------------------------------------------------

[~Kirill P] It's weird, I think there should be no firewall issue in your 
environment since the default policy of your FORWARD chain is ACCEPT
{quote}:FORWARD ACCEPT [146628:34388360]
{quote}
So no packets will be dropped by this chain.

In my environment (a Ubuntu 17.10 VM), the default policy of the FORWARD chain 
is DROP, that's why I need to add that rule ("iptables -t filter -A FORWARD -o 
mesos-cni0 -j ACCEPT").

Can you please try another application rather than akka? E.g., launch a simple 
http server ("python -m SimpleHTTPServer 8080") to join a CNI bridge network 
and map its port to a host port, and then launch another container in the same 
CNI bridge network to access that http server via hostIP:hostPort, will it have 
the same timeout issue?


was (Author: qianzhang):
[~Kirill P] It's weird, I think there should be no firewall issue in your 
environment since the default policy of your FORWARD chain is ACCEPT
{quote}:FORWARD ACCEPT [146628:34388360]
{quote}
So no packets will be dropped by this chain.

In my environment (a Ubuntu 17.10 VM), the default policy of the FORWARD chain 
is DROP, that's why I need to add that rule ("iptables -t filter -A FORWARD -o 
mesos-cni0 -j ACCEPT").

> Mesos CNI portmap plugins' iptables rules doesn't allow connections via host 
> ip and port from the same bridge container network
> -------------------------------------------------------------------------------------------------------------------------------
>
>                 Key: MESOS-9031
>                 URL: https://issues.apache.org/jira/browse/MESOS-9031
>             Project: Mesos
>          Issue Type: Bug
>          Components: cni, containerization
>    Affects Versions: 1.6.0
>            Reporter: Kirill Plyashkevich
>            Assignee: Qian Zhang
>            Priority: Major
>
> using `mesos-cni-port-mapper` with folllowing config:
> {noformat}
> { 
>    "name" : "dcos", 
>    "type" : "mesos-cni-port-mapper", 
>    "excludeDevices" : [], 
>    "chain": "MESOS-CNI0-PORT-MAPPER", 
>    "delegate": { 
>        "type": "bridge", 
>        "bridge": "mesos-cni0", 
>        "isGateway": true, 
>        "ipMasq": true, 
>        "hairpinMode": true, 
>        "ipam": { 
>            "type": "host-local", 
>            "ranges": [ 
>                [{"subnet": "172.26.0.0/16"}] 
>            ], 
>            "routes": [ 
>                {"dst": "0.0.0.0/0"} 
>            ] 
>        } 
>    } 
> }
> {noformat}
>  - 2 services running on the same mesos-slave using unified containerizer in 
> different tasks and communicating via host ip and host port
>  - connection timeouts due to iptables rules per container CNI-XXX chain
>  - actually timeouts are caused by
> {noformat}
> Chain CNI-XXX (1 references)
> num  target     prot opt source               destination         
> 1    ACCEPT     all  --  anywhere             172.26.0.0/16        /* name: 
> "dcos" id: "YYYY" */
> 2    MASQUERADE  all  --  anywhere            !base-address.mcast.net/4  /* 
> name: "dcos" id: "YYYY" */
> {noformat}
> rule #1 is executed and no masquerading happens.
> there are multiple solutions:
>  - -simpliest and fastest one is not to add that ACCEPT- - NOT A SOLUTION. 
> it's happening in `bridge` plugin and `cni/portmap` shows that 
> snat/masquerade should be done during portmapping as well.
>  - perhaps, there's a better change in iptables rules that can fix it
>  - proper one (imho) is to finally implement cni spec 0.3.x in order to be 
> able to use chaining of plugins and use cni's `bridge` and `portmap` plugins 
> in chain (and get rid of mesos-cni-port-mapper completely eventually).



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to