Open Zivodor opened 3 days ago
version: aardvark-dns 1.4.0
That is outdated. We only support the latest versions upstream.
In general I don't understand how you configure the containers, please provide exact commands. Setting up up a dns server inside should in now way effect the aardvark-dns running on the host. Are you sure you do not bypass the aardvark-dns resolver ip set in resolv.conf in the container?
I am using podman-compose to run everything, but will be switching to Quadlets when this is resolved. I ran these commands myself and it made no difference.
podman network create wgnet --subnet=10.89.2.0/24
podman pod create --name=pod_nextcloud --infra=false
podman run --name=nextcloud_db -d --pod=pod_nextcloud --label PODMAN_SYSTEMD_UNIT=podman-compose@nextcloud.service -v /home/podman/appdata/nextcloud/mysql:/var/lib/mysql:z --network=wgnet --network-alias=db --restart always --uidmap 0:11000:1000 docker.io/mariadb:latest --transaction-isolation=READ-COMMITTED --log-bin=binlog --binlog-format=ROW
podman run --name=nextcloud -d --pod=pod_nextcloud --label PODMAN_SYSTEMD_UNIT=podman-compose@nextcloud.service -v /data/nextcloud:/var/www/html:z -v /home/podman/appdata/nextcloud/nextcloud-apache-optimization.conf:/etc/httpd/conf.d/nextcloud-apache-optimization.conf:z --network=wgnet --network-alias=app -p 11000:80 --restart always --uidmap 0:11000:1000 docker.io/nextcloud:latest
podman run --name=nextcloud_redis -d --pod=pod_nextcloud --label PODMAN_SYSTEMD_UNIT=podman-compose@nextcloud.service --network=wgnet --network-alias=redis --restart always --uidmap 0:11000:1000 docker.io/redis:latest
podman pod create --name=pod_dashy --infra=false
podman run --name=dashy -d --pod=pod_dashy PODMAN_SYSTEMD_UNIT=podman-compose@dashy.service -v /home/podman/appdata/dashy/my-conf.yml:/app/user-data/conf.yml:Z --network=wgnet --network-alias=dashy -p 4000:8080 --uidmap 0:4000:1000 lissy93/dashy:latest
podman pod create --name=pod_technitium --infra=false
podman run --name=technitium -d --pod=pod_technitium --label PODMAN_SYSTEMD_UNIT=podman-compose@technitium.service --cap-add NET_ADMIN --cap-add NET_RAW -v /home/podman/appdata/technitium/data:/app/data --network=wgnet --network-alias=technitium -p 53:53/tcp -p 53:53/udp -p 5380:5380 --restart unless-stopped --uidmap 0:1000:2000 docker.io/technitium/dns-server
Below are the three test I performed on the Dashy container. I ran these through the terminal provided by Cockpit for containers.
This first image happens before I started the Technitium container, it is the same result regardless of whether its Technitium or dnsmasq.
This second image happens after I start the Technitium container.
This third image shows the resolv.conf, it is identical before and after enabling the Technitium container.
I will try updating aadvark-dns to see if that resolves the issue.
Issue Description
Attempting to run dnsmasq or Technitium in a container while using a user created network with dns enabled causes container name resolution to fail while it the container is running.
I have not been able to find documentation about this "feature" or functionality nor a work around for having both my own dns service running while also allowing automatic resolution of the container names to their ip addresses.
Steps to reproduce the issue
Describe the results you received
The dns resolution fails and the ip address is not resolved.
Describe the results you expected
The dns resolution is successful and the ip address is resolved.
podman info output
Podman in a container
No
Privileged Or Rootless
Rootless
Upstream Latest Release
Yes
Additional environment details
I am running this on a Debian 12.5 headless server.
Additional information
I want to use a custom dns server to allow me to resolve a local domain instead of having to use the server's local ip address. I don't understand what or why the dns resolution is being disabled when the dnsmasq container is active. I have not been able to find documentation on having both the built in dns resolution as well as a custom dns resolution. Ideally I do not want to assign static ips to these containers and configure dnsmasq to know as this would make adding new services annoying and it seems unnecessary.