LWN: Comments on "The future of Docker containers" https://lwn.net/Articles/788282/ This is a special feed containing comments posted to the individual LWN article titled "The future of Docker containers". en-us Wed, 22 Oct 2025 11:43:53 +0000 Wed, 22 Oct 2025 11:43:53 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net The future of Docker containers https://lwn.net/Articles/790010/ https://lwn.net/Articles/790010/ mijo <div class="FormattedComment"> Absolutely, we need a new way of container image delivery. All the current registries I am familiar with are not future proven. So far I haven't seen any peer-to-peer implementation, or did I miss one? If not, I am pretty sure that this will change latest by 2020, depending on the time I can spend writing code ... :)<br> I've shared the need for a P2P Docker registry with Patrick Devine from Docker Inc. back in 2016. As far as I remember he told me that they did also at least think about it, not sure if they also had already any code in place.<br> </div> Fri, 31 May 2019 15:41:32 +0000 The future of Docker containers https://lwn.net/Articles/788965/ https://lwn.net/Articles/788965/ Cyberax <div class="FormattedComment"> It basically manually assembles a network out of multiple individual IPv6 addresses. This is doable, but not at all nice. I'm not sure a simple IPv6 NAT is worse than that.<br> <p> The better way is to just use a CNI plugin to dynamically create ENI (Amazon's virtual network interfaces) and assign them to containers directly.<br> <p> You also still need a stateful firewall because you do NOT want to expose all containers' ports automatically.<br> </div> Tue, 21 May 2019 02:28:57 +0000 The future of Docker containers https://lwn.net/Articles/788964/ https://lwn.net/Articles/788964/ foom <div class="FormattedComment"> Looks like it's *possible* with aws, if not easy:<br> <a href="https://medium.freecodecamp.org/how-to-run-ipv6-enabled-docker-containers-on-aws-87e090ab0397">https://medium.freecodecamp.org/how-to-run-ipv6-enabled-d...</a><br> </div> Tue, 21 May 2019 02:18:07 +0000 The future of Docker containers https://lwn.net/Articles/788837/ https://lwn.net/Articles/788837/ drag <div class="FormattedComment"> Containers are the only way forward without breaking a huge amount of old Unix assumptions that applications depend on without sacrificing the modern features that Linux can offer. <br> <p> I've seen what happens when organizations struggle to run and manage dozens of applications side by side on a single system without containers or virtualization to try to efficiently take advantage of the capacities offered by modern hardware. It isn't pretty. A 'nightmare' would describe it better. <br> </div> Sat, 18 May 2019 23:41:48 +0000 The future of Docker containers https://lwn.net/Articles/788814/ https://lwn.net/Articles/788814/ Cyberax <div class="FormattedComment"> ILA is honestly not that different from the current crop of overlay networks.<br> <p> The major advantage of ILA over some over methods is that it doesn't use encapsulation and instead rewrites source/destination addresses directly. This avoids issues with PMTU which STILL is not working correctly everywhere (even in a datacenter). <br> <p> And the disadvantage is that the lower portion of the address basically becomes a client ID, so datacenter tenants won't be able to use the private IPv6 address space or ULAs.<br> <p> Other than that, it's just yet another way to organize a datacenter-level SDN.<br> </div> Sat, 18 May 2019 02:18:08 +0000 The future of Docker containers https://lwn.net/Articles/788807/ https://lwn.net/Articles/788807/ farnz <p>Out of curiosity (I don't work in this area, and my employer's networks team makes IPv6 Just Work for my needs), what do you think of <a href="https://lwn.net/Articles/657012/">ILA</a> as a mechanism to run an IPv6 overlay network between containers? It looks to me like something that Docker/Kubernetes et al should be able to implement, and it replaces the need for NAT with a need for a /64 for the ILA overlay, plus a /64 for each container host. Fri, 17 May 2019 21:02:36 +0000 The future of Docker containers https://lwn.net/Articles/788808/ https://lwn.net/Articles/788808/ Cyberax <div class="FormattedComment"> ?? You are not charged on a per-IP basis at Amazon. It's more like an architectural limitation, Amazon readily assigns a /56 prefix to your VPCs.<br> </div> Fri, 17 May 2019 20:47:32 +0000 The future of Docker containers https://lwn.net/Articles/788806/ https://lwn.net/Articles/788806/ flussence <div class="FormattedComment"> <font class="QuotedText">&gt;It seems like a bug in aws if you cannot easily assign multiple ipv6 addresses to a host.</font><br> <p> It's price scalping, is what it is. OVH does the same thing with its cheaper dedi offerings, even though they already have the infra to allocate you a /56 on the rest.<br> </div> Fri, 17 May 2019 20:29:14 +0000 The future of Docker containers https://lwn.net/Articles/788794/ https://lwn.net/Articles/788794/ Cyberax <div class="FormattedComment"> Overlay networks are not going away, you still need them for services to speak with each other securely and without worrying about DDOS from the open Internet. <br> <p> NATs or statefull firewalls that amount to the same are needed to protect inbound connections.<br> <p> So nope, IPv6 support for Docker should basically mirror the IPv4. An ability to use delegated prefixes is awesome, but not always needed.<br> </div> Fri, 17 May 2019 15:33:24 +0000 The future of Docker containers https://lwn.net/Articles/788783/ https://lwn.net/Articles/788783/ zlynx <div class="FormattedComment"> NAT and overlay networks and all of that other "cloud" garbage needs to die and not infect IPv6. They only exist to handle the limitations of IPv4.<br> <p> Docker and Kubernetes and the like need to go back to basics and rewrite their networking from scratch for IPv6. Disable IPv4 entirely and only use it for gateways to the world.<br> <p> If AWS can't get IPv6 right then get Amazon to fix it.<br> </div> Fri, 17 May 2019 13:50:45 +0000 The future of Docker containers https://lwn.net/Articles/788723/ https://lwn.net/Articles/788723/ kfox1111 <div class="FormattedComment"> <font class="QuotedText">&gt; Another option: Just... running code on a server.</font><br> <p> That causes a whole set of other problems...<br> </div> Thu, 16 May 2019 21:23:25 +0000 The future of Docker containers https://lwn.net/Articles/788722/ https://lwn.net/Articles/788722/ kfox1111 <div class="FormattedComment"> Thats one of the pushes for containerd separate from docker. You can run Kubernetes backended with containerd and skip the rest of the swarm stuff.<br> </div> Thu, 16 May 2019 21:22:26 +0000 The future of Docker containers https://lwn.net/Articles/788720/ https://lwn.net/Articles/788720/ rahulsundaram <div class="FormattedComment"> <font class="QuotedText">&gt; Overall, the design of docker daemon result in less availability in production, we start looking at daemonless container solution.</font><br> <p> No reason not to do that right now. Podman for devs and cri-o for production (if you are using a Kubernetes based implementation) seems a good choice at this point.<br> </div> Thu, 16 May 2019 20:52:41 +0000 The future of Docker containers https://lwn.net/Articles/788716/ https://lwn.net/Articles/788716/ jccleaver <div class="FormattedComment"> <font class="QuotedText">&gt; Overall, the design of docker daemon result in less availability in production, we start looking at daemonless container solution.</font><br> <p> Another option: Just... running code on a server.<br> </div> Thu, 16 May 2019 19:30:11 +0000 The future of Docker containers https://lwn.net/Articles/788619/ https://lwn.net/Articles/788619/ jeremy <div class="FormattedComment"> 4) Turning IPv4 off should be possible. Currently (to my knowledge; happy to be corrected) containers can either be IPv4–only or dual–stack. Removing the IPv4 subnet options just causes Docker to auto–allocate an IPv4 subnet, even if that is undesired.<br> </div> Thu, 16 May 2019 10:38:07 +0000 The future of Docker containers https://lwn.net/Articles/788601/ https://lwn.net/Articles/788601/ hyuwang <div class="FormattedComment"> That's a lot feature planned, I hope they could make better stability while moving ahead.<br> <p> We have being suffer from docker bugs that affects production, some of them are very primitive and fundamental feature. <br> <p> Like container stuck in removing state, or deadlock in containerd-shim cause data not read from container's stdio pipe cause process hang.<br> <p> Many of these bugs didn't exists before docker swarm came in. <br> <p> Overall, the design of docker daemon result in less availability in production, we start looking at daemonless container solution.<br> </div> Thu, 16 May 2019 06:04:55 +0000 The future of Docker containers https://lwn.net/Articles/788593/ https://lwn.net/Articles/788593/ foom <div class="FormattedComment"> <font class="QuotedText">&gt; NAT support needs to be added to IPv6</font><br> <p> Blargh...I really hope not. That's so backwards...<br> <p> It seems like a bug in aws if you cannot easily assign multiple ipv6 addresses to a host.<br> </div> Thu, 16 May 2019 02:23:21 +0000 The future of Docker containers https://lwn.net/Articles/788539/ https://lwn.net/Articles/788539/ Cyberax <div class="FormattedComment"> How about fixing the IPv6 support?!?<br> <p> It's been a total disaster. There are community-made patches ready for merge and Docker developers have just given up on them.<br> <p> In particular:<br> 1) NAT support needs to be added to IPv6 to mirror the IPv4 functionality. This is needed for Docker on AWS instances that only get a /128 address.<br> 2) CNI needs to support IPv6.<br> 3) Port exposure needs to be consistent between IPv6 and IPv4. Right now enabling IPv6 exposes all the container ports unconditionally.<br> <p> </div> Wed, 15 May 2019 18:28:28 +0000