-
Notifications
You must be signed in to change notification settings - Fork 33
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support LXC #267
Comments
A quick fix for this issue would be to treat the puppet-nftables/manifests/bridges.pp Line 5 in 02d6e88
|
I don't think that would fully fix the issue because LXC containers also needs to reach the host via DNS and DHCP. |
I used to use exctly this kind of setup: vagrant-libvirt spawning qemu VMs with libvirt but with an nftables-based fireall and with libvirt configured with the default of setting up its firewall rules via iptables-compat. One thing that made this setup super simple was to leave the nftables table named I always thought that it's a bit sad that this module jams all of its rules by default in the iptables-compat table |
On a fairly default installation on Debian 12, LXC networking doesn't work out of the box when this module is managing the firewall rules.
Through some trial and error I figured out that packet forwarding was simply not enabled for the
lxcbr0
interface.In the end I used this declaration to fix my LXC setup:
Here
lxcbr0
and10.0.3.0/24
are both the default values used inlxc-net
.If you think it would make sense to introduce a rule specifically for LXC based on this I'd be happy to provide a PR.
The text was updated successfully, but these errors were encountered: