1
コンコースがスウォームモードと互換性があるかどうか知っていますか? 私は集団ウェブをスピンアップできますが、集団モードを使用している場合はワーカーを操作することはできません。 フラグがprivileged:trueに設定された状態でdocker-composeを使用すると、動作します。執筆時点での バグレポートはDockerの集合モードとコンコース互換ですか?
Concourse version: fly-version is 3.2.1
fly -version
3.2.1
Deployment type (BOSH/Docker/binary):Docker
Infrastructure/IaaS:
Browser (if applicable):
Did this used to work?yes with docker-compose but not with in a docker swarm mode
[email protected] | Exit trace for group:
[email protected] | garden exited with error: Exit trace for group:
[email protected] | garden-runc exited with error: bulk starter: setting up default chains: iptables: setup-global-chains: + set -o nounset
[email protected] | + set -o errexit
[email protected] | + shopt -s nullglob
[email protected] | + filter_input_chain=w--input
[email protected] | + filter_forward_chain=w--forward
[email protected] | + filter_default_chain=w--default
[email protected] | + filter_instance_prefix=w--instance-
[email protected] | + nat_prerouting_chain=w--prerouting
[email protected] | + nat_postrouting_chain=w--postrouting
[email protected] | + nat_instance_prefix=w--instance-
[email protected] | + iptables_bin=/worker-state/3.2.1/assets/iptables/sbin/iptables
[email protected] | + case "${ACTION}" in
[email protected] | + setup_filter
[email protected] | + teardown_filter
[email protected] | + teardown_deprecated_rules
[email protected] | ++ /worker-state/3.2.1/assets/iptables/sbin/iptables -w -S INPUT
[email protected] | + rules=
[email protected] | + true
[email protected] | + echo ''
[email protected] | + grep ' -j garden-dispatch'
[email protected] | + sed -e s/-A/-D/ -e 's/\s+$//'
[email protected] | + xargs --no-run-if-empty --max-lines=1 /worker-state/3.2.1/assets/iptables/sbin/iptables -w
[email protected] | ++ /worker-state/3.2.1/assets/iptables/sbin/iptables -w -S FORWARD
[email protected] | + rules=
[email protected] | + true
[email protected] | + echo ''
[email protected] | + grep ' -j garden-dispatch'
[email protected] | + sed -e s/-A/-D/ -e 's/\s+$//'
[email protected] | + xargs --no-run-if-empty --max-lines=1 /worker-state/3.2.1/assets/iptables/sbin/iptables -w
[email protected] | + /worker-state/3.2.1/assets/iptables/sbin/iptables -w -F garden-dispatch
[email protected] | + true
[email protected] | + /worker-state/3.2.1/assets/iptables/sbin/iptables -w -X garden-dispatch
[email protected] | + true
[email protected] | ++ /worker-state/3.2.1/assets/iptables/sbin/iptables -w -S w--forward
[email protected] | + rules=
[email protected] | + true
[email protected] | + echo ''
[email protected] | + grep '-g w--instance-'
[email protected] | + sed -e s/-A/-D/ -e 's/\s+$//'
[email protected] | + xargs --no-run-if-empty --max-lines=1 /worker-state/3.2.1/assets/iptables/sbin/iptables -w
[email protected] | ++ /worker-state/3.2.1/assets/iptables/sbin/iptables -w -S
[email protected] | + rules=
[email protected] | + true
[email protected] | + echo ''
[email protected] | + grep '^-A w--instance-'
[email protected] | + sed -e s/-A/-D/ -e 's/\s+$//'
[email protected] | + xargs --no-run-if-empty --max-lines=1 /worker-state/3.2.1/assets/iptables/sbin/iptables -w
[email protected] | ++ /worker-state/3.2.1/assets/iptables/sbin/iptables -w -S
[email protected] | + rules=
[email protected] | + true
[email protected] | + echo ''
[email protected] | + grep '^-N w--instance-'
[email protected] | + sed -e s/-N/-X/ -e 's/\s+$//'
[email protected] | + xargs --no-run-if-empty --max-lines=1 /worker-state/3.2.1/assets/iptables/sbin/iptables -w
[email protected] | ++ /worker-state/3.2.1/assets/iptables/sbin/iptables -w -S FORWARD
[email protected] | + rules=
[email protected] | + true
[email protected] | + echo ''
[email protected] | + grep ' -j w--forward'
[email protected] | + sed -e s/-A/-D/ -e 's/\s+$//'
[email protected] | + xargs --no-run-if-empty --max-lines=1 /worker-state/3.2.1/assets/iptables/sbin/iptables -w
[email protected] | + /worker-state/3.2.1/assets/iptables/sbin/iptables -w -F w--forward
[email protected] | + true
[email protected] | + /worker-state/3.2.1/assets/iptables/sbin/iptables -w -F w--default
ci_concours[email protected] | + true
[email protected] | ++ /worker-state/3.2.1/assets/iptables/sbin/iptables -w -S INPUT
[email protected] | + rules=
[email protected] | + true
[email protected] | + echo ''
[email protected] | + grep ' -j w--input'
[email protected] | + sed -e s/-A/-D/ -e 's/\s+$//'
[email protected] | + xargs --no-run-if-empty --max-lines=1 /worker-state/3.2.1/assets/iptables/sbin/iptables -w
[email protected] | + /worker-state/3.2.1/assets/iptables/sbin/iptables -w -F w--input
[email protected] | + true
[email protected] | + /worker-state/3.2.1/assets/iptables/sbin/iptables -w -X w--input
[email protected] | + true
[email protected] | ++ ip route show
[email protected] | ++ grep default
[email protected] | ++ cut '-d ' -f5
[email protected] | ++ head -1
[email protected] | + default_interface=eth1
[email protected] | + /worker-state/3.2.1/assets/iptables/sbin/iptables -w -N w--input
[email protected] | + /worker-state/3.2.1/assets/iptables/sbin/iptables -w -F w--input
[email protected] | iptables v1.4.21: can't initialize iptables table `filter': Permission denied (you must be root)
[email protected] | Perhaps iptables or your kernel needs to be upgraded.
[email protected] |
[email protected] | dns-proxy exited with nil
[email protected] |
[email protected] | baggageclaim exited with nil
[email protected] | beacon exited with error: failed to dial: failed to connect to TSA: dial tcp: lookup concourse-web on 127.0.0.11:53: no such host
[email protected] |