2017-06-28 9 views
1

コンコースがスウォームモードと互換性があるかどうか知っていますか? 私は集団ウェブをスピンアップできますが、集団モードを使用している場合はワーカーを操作することはできません。 フラグがprivileged:trueに設定された状態でdocker-composeを使用すると、動作します。執筆時点での バグレポートはDockerの集合モードとコンコース互換ですか?

Concourse version: fly-version is 3.2.1 
fly -version 
3.2.1 
Deployment type (BOSH/Docker/binary):Docker 
Infrastructure/IaaS: 
Browser (if applicable): 
Did this used to work?yes with docker-compose but not with in a docker swarm mode 
[email protected] | Exit trace for group: 
[email protected] | garden exited with error: Exit trace for group: 
[email protected] | garden-runc exited with error: bulk starter: setting up default chains: iptables: setup-global-chains: + set -o nounset 
[email protected] | + set -o errexit 
[email protected] | + shopt -s nullglob 
[email protected] | + filter_input_chain=w--input 
[email protected] | + filter_forward_chain=w--forward 
[email protected] | + filter_default_chain=w--default 
[email protected] | + filter_instance_prefix=w--instance- 
[email protected] | + nat_prerouting_chain=w--prerouting 
[email protected] | + nat_postrouting_chain=w--postrouting 
[email protected] | + nat_instance_prefix=w--instance- 
[email protected] | + iptables_bin=/worker-state/3.2.1/assets/iptables/sbin/iptables 
[email protected] | + case "${ACTION}" in 
[email protected] | + setup_filter 
[email protected] | + teardown_filter 
[email protected] | + teardown_deprecated_rules 
[email protected] | ++ /worker-state/3.2.1/assets/iptables/sbin/iptables -w -S INPUT 
[email protected] | + rules= 
[email protected] | + true 
[email protected] | + echo '' 
[email protected] | + grep ' -j garden-dispatch' 
[email protected] | + sed -e s/-A/-D/ -e 's/\s+$//' 
[email protected] | + xargs --no-run-if-empty --max-lines=1 /worker-state/3.2.1/assets/iptables/sbin/iptables -w 
[email protected] | ++ /worker-state/3.2.1/assets/iptables/sbin/iptables -w -S FORWARD 
[email protected] | + rules= 
[email protected] | + true 
[email protected] | + echo '' 
[email protected] | + grep ' -j garden-dispatch' 
[email protected] | + sed -e s/-A/-D/ -e 's/\s+$//' 
[email protected] | + xargs --no-run-if-empty --max-lines=1 /worker-state/3.2.1/assets/iptables/sbin/iptables -w 
[email protected] | + /worker-state/3.2.1/assets/iptables/sbin/iptables -w -F garden-dispatch 
[email protected] | + true 
[email protected] | + /worker-state/3.2.1/assets/iptables/sbin/iptables -w -X garden-dispatch 
[email protected] | + true 
[email protected] | ++ /worker-state/3.2.1/assets/iptables/sbin/iptables -w -S w--forward 
[email protected] | + rules= 
[email protected] | + true 
[email protected] | + echo '' 
[email protected] | + grep '-g w--instance-' 
[email protected] | + sed -e s/-A/-D/ -e 's/\s+$//' 
[email protected] | + xargs --no-run-if-empty --max-lines=1 /worker-state/3.2.1/assets/iptables/sbin/iptables -w 
[email protected] | ++ /worker-state/3.2.1/assets/iptables/sbin/iptables -w -S 
[email protected] | + rules= 
[email protected] | + true 
[email protected] | + echo '' 
[email protected] | + grep '^-A w--instance-' 
[email protected] | + sed -e s/-A/-D/ -e 's/\s+$//' 
[email protected] | + xargs --no-run-if-empty --max-lines=1 /worker-state/3.2.1/assets/iptables/sbin/iptables -w 
[email protected] | ++ /worker-state/3.2.1/assets/iptables/sbin/iptables -w -S 
[email protected] | + rules= 
[email protected] | + true 
[email protected] | + echo '' 
[email protected] | + grep '^-N w--instance-' 
[email protected] | + sed -e s/-N/-X/ -e 's/\s+$//' 
[email protected] | + xargs --no-run-if-empty --max-lines=1 /worker-state/3.2.1/assets/iptables/sbin/iptables -w 
[email protected] | ++ /worker-state/3.2.1/assets/iptables/sbin/iptables -w -S FORWARD 
[email protected] | + rules= 
[email protected] | + true 
[email protected] | + echo '' 
[email protected] | + grep ' -j w--forward' 
[email protected] | + sed -e s/-A/-D/ -e 's/\s+$//' 
[email protected] | + xargs --no-run-if-empty --max-lines=1 /worker-state/3.2.1/assets/iptables/sbin/iptables -w 
[email protected] | + /worker-state/3.2.1/assets/iptables/sbin/iptables -w -F w--forward 
[email protected] | + true 
[email protected] | + /worker-state/3.2.1/assets/iptables/sbin/iptables -w -F w--default 
ci_concours[email protected] | + true 
[email protected] | ++ /worker-state/3.2.1/assets/iptables/sbin/iptables -w -S INPUT 
[email protected] | + rules= 
[email protected] | + true 
[email protected] | + echo '' 
[email protected] | + grep ' -j w--input' 
[email protected] | + sed -e s/-A/-D/ -e 's/\s+$//' 
[email protected] | + xargs --no-run-if-empty --max-lines=1 /worker-state/3.2.1/assets/iptables/sbin/iptables -w 
[email protected] | + /worker-state/3.2.1/assets/iptables/sbin/iptables -w -F w--input 
[email protected] | + true 
[email protected] | + /worker-state/3.2.1/assets/iptables/sbin/iptables -w -X w--input 
[email protected] | + true 
[email protected] | ++ ip route show 
[email protected] | ++ grep default 
[email protected] | ++ cut '-d ' -f5 
[email protected] | ++ head -1 
[email protected] | + default_interface=eth1 
[email protected] | + /worker-state/3.2.1/assets/iptables/sbin/iptables -w -N w--input 
[email protected] | + /worker-state/3.2.1/assets/iptables/sbin/iptables -w -F w--input 
[email protected] | iptables v1.4.21: can't initialize iptables table `filter': Permission denied (you must be root) 
[email protected] | Perhaps iptables or your kernel needs to be upgraded. 
[email protected] | 
[email protected] | dns-proxy exited with nil 
[email protected] | 
[email protected] | baggageclaim exited with nil 
[email protected] | beacon exited with error: failed to dial: failed to connect to TSA: dial tcp: lookup concourse-web on 127.0.0.11:53: no such host 
[email protected] | 

答えて

0

短い答え:いいえ

特権モードは群れでデプロイされたサービスのために利用可能ではありませんが、同様の権限を取得できるようになります機能が作業中です。 https://github.com/moby/moby/issues/32801

関連する問題