-
-
Notifications
You must be signed in to change notification settings - Fork 104
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[BUG] Latest update seems to break DNS when --dns parameter specified #211
Comments
Thanks for opening your first issue here! Be sure to follow the relevant issue templates, or risk having this issue marked as invalid. |
This issue has been automatically marked as stale because it has not had recent activity. This might be due to missing feedback from OP. It will be closed if no further activity occurs. Thank you for your contributions. |
I have the same issue. I didn't need to specify --dns before and it used to pickup local DNS server automatically and resolve domains. The container support team on Discord doesn't think this is an issue though. |
@awonglk as mentioned in the discord, it worked fine when you were using a normal bridged network (non macvlan) - which to us seems like your macvlan could be configured incorrectly. Was suggested to continue conversation in #other-support but I didn't see you continue it there. |
The result is the same on bridged network or macvlan (does not resolve domains from local DNS server) Similar to [tomrwaller] I think this issue here deserves to be looked at though. Something in the image is using a fixed external resolver. Happy to bring this up on #other-support if it helps. |
There is no evidence of any hardcoded dns, I also cannot repro the OP |
Happy to supply anything else you need to help reproduce the issue..
But it fails when I ping the same host above..
It seems to be happy with pinging any external domains, and nslookup (using "cnn.com" as an example)
That's the reason why I suspected it's somehow picked up some external DNS resolver. |
For op, the For the other reporter, random nslookup results aren't helpful without proper context. They're showing different dns servers, which suggests containers in different networks so not directly comparable. Please continue to ask for support on our discord in |
This issue has been automatically marked as stale because it has not had recent activity. This might be due to missing feedback from OP. It will be closed if no further activity occurs. Thank you for your contributions. |
I've been troubleshooting DNS all night and wanted to add some context here as this is the only GitHub issue I could find. I'm running the arr's and I've noticed this behavior in radar when it couldn't connect to prowlarr. (IPs and DNS changed) I'm coming to an initial conclusion that there is something hard coded in the arr containers that isn't a DNS server, but some type of logic to validate common internal DNS zones and use those otherwise ignore them for public DNS zones. I can validate this by creating stub zones everywhere in my stack and they still won't validate. Though what's odd is the Linuxserver plex container doesn't contain any of this logic. I hope this helps, I personally would love to get this resolved. Edit: Ok I have no idea what's going on now, my conclusion above is still correct. Though everything was configured and validated with the .land domain and days later it's broken with no container version change or network changes. I'm investigating that more but the above still stands. |
While I haven't solved this. In my k8s cluster forcing the following dns setting in the pod has worked around the issue: dnsConfig:
options:
- name: ndots
value: "1" |
@sethjones Ok so after much research this is a K8s specific option, I worked around it by creating
But my case has vered into different territory, I operate a separate VLAN that is restricted and I tried a bazarr container on both subnets and once I bring it internal it works. IDK what's up with this as the restricted VLAN can resolve my other internal zone. I wonder if there is a cool config on the router. So to add to this, ndots 0 is fine with my config and appears to be something different. I'm going to leave my comments here for the next person, maybe I can be the next DenverCoder9. Final Edit: Past me is an idiot, the restricted VLAN has a different DHCP config, and I never realized that ipvlan didn't use host based DNS since it's abstracted away to 127.0.0.11 which isn't a real IP I can easily validate against. I need to make a troubleshooting container. |
This issue has been automatically marked as stale because it has not had recent activity. This might be due to missing feedback from OP. It will be closed if no further activity occurs. Thank you for your contributions. |
I am having the same issue. From within the container I am able to nslookup and dig my DNS and resolve the host (local domain name) but using ping/curl/wget returns a "bad address". Seems others have this issue after searching for a while with the Alpine 3.13 - 3.18 image |
This issue has been automatically marked as stale because it has not had recent activity. This might be due to missing feedback from OP. It will be closed if no further activity occurs. Thank you for your contributions. |
Just mentioning this is still an issue for me. Also, it has now started happening on the Lidarr and Sonarr images too :( I switched to BinHex a few months ago and they worked fine up till last week and now exhibit the same issue. I'd like to switch back to LSIO with a fix but still can't get this working. |
If you're experiencing the same issue with a different container, it could be a problem with your host/setup? |
I had thought that but nothing has changed host/network side, and all other containers work just fine, such as LSIO Plex and Jackett. This is just affecting the *arr suite. As one of the comments above alluded to, I also point to internally resolvable DNS names, such as sonarr.domain.click. These do have an external registration with a provider but records only exist for my internal DNS service so they aren't resolvable externally. This all worked for years until I opened this issue when it just stopped working. I switched to BinHex for a few months as that didn't exhibit the issue, with the exact same config, but again, that broke last week. |
I was able to fix this by changing my network router More info here: |
I'd like to try and work this one but I can't figure out what you're all using now. There's some mentions of k8's above and then some unraid. I can only test with Debian hosts, but can replicate network segregation. |
Is there an existing issue for this?
Current Behavior
I use the extra arguement of --dns=x.x.x.x for all of my LSIO containers. This works well and is continuing to work well for all other services such as Sonarr, Transmission, HA etc. Radarr seems to have stopped accepting this parameter.
If I launch a console and do an nslookup address.domain.com, the result is the default Docker DNS entry of 172.0.0.11, as opposed to my custom specified DNS server.
As a result, I cannot resolve any of my custom addresses for indexers, download clients etc.
As a test, I swapped out to binhix Radarr and it works as expected.
Expected Behavior
DNS resolution should work with custom DNS server specified.
Steps To Reproduce
Launch container with --dns arguement present.
Open console.
Run nslookup against a domain.
Environment
- OS: UnRAID latest
CPU architecture
x86-64
Docker creation
Container logs
The text was updated successfully, but these errors were encountered: