Uploaded image for project: 'Container Tools'
  1. Container Tools
  2. RUN-2318

[containers/podman] podman ps: output unreadable with many exposed ports

XMLWordPrintable

    • 1
    • False
    • None
    • False
    • rhel-sst-container-tools
    • RUN 261

      [2415116811] Upstream Reporter: Jason Berry
      Upstream issue status: Closed
      Upstream description:

      Issue Description

      After a recent upgrade from 5.0.3 to 5.1.0, I noticed that podman ps is unreadable. This is due to my FreeSWITCH container, which uses a macvlan network and has many exposed ports (see here). Prior to 5.1, this and other containers using macvlan networks would not list any ports at all.

      This appears to be intended behaviour introduced by PR https://github.com/containers/podman/pull/22319 Is it possible to add a flag to mute port information for macvlan containers?

      Steps to reproduce the issue

      Steps to reproduce the issue...using adguardhome as an example:

      $ sudo podman network create -d macvlan adguard
      $ sudo podman run -d --network adguard docker.io/adguard/adguardhome:latest
      $ sudo podman ps
      CONTAINER ID  IMAGE                                 COMMAND               CREATED         STATUS         PORTS                                                                                                                         NAMES
      55463e58fa91  docker.io/adguard/adguardhome:latest  --no-check-update...  26 minutes ago  Up 26 minutes  53/udp, 53/tcp, 67/udp, 68/udp, 80/tcp, 443/tcp, 443/udp, 853/tcp, 853/udp, 3000/tcp, 3000/udp, 5443/udp, 5443/tcp, 6060/tcp  adguardhome
      

      Describe the results you received

      $ sudo podman ps
      CONTAINER ID  IMAGE                                 COMMAND               CREATED         STATUS         PORTS                                                                                                                         NAMES
      55463e58fa91  docker.io/adguard/adguardhome:latest  --no-check-update...  26 minutes ago  Up 26 minutes  53/udp, 53/tcp, 67/udp, 68/udp, 80/tcp, 443/tcp, 443/udp, 853/tcp, 853/udp, 3000/tcp, 3000/udp, 5443/udp, 5443/tcp, 6060/tcp  adguardhome
      

      Describe the results you expected

      $ sudo podman ps
      CONTAINER ID  IMAGE                                 COMMAND               CREATED         STATUS         PORTS         NAMES
      55463e58fa91  docker.io/adguard/adguardhome:latest  --no-check-update...  26 minutes ago  Up 26 minutes                adguardhome
      

      podman info output

      host:   arch: amd64
        buildahVersion: 1.36.0
        cgroupControllers:   - cpu
        - memory
        - pids
        cgroupManager: systemd
        cgroupVersion: v2
        conmon:     package: conmon-2.1.10-1.fc40.x86_64
          path: /usr/bin/conmon
          version: 'conmon version 2.1.10, commit: '
        cpuUtilization:     idlePercent: 98.77
          systemPercent: 0.61
          userPercent: 0.61
        cpus: 4
        databaseBackend: boltdb
        distribution:     distribution: fedora
          variant: coreos
          version: "40"
        eventLogger: journald
        freeLocks: 2045
        hostname: falcon
        idMappings:     gidmap:     - container_id: 0
            host_id: 1000
            size: 1
          - container_id: 1
            host_id: 100000
            size: 65536
          uidmap:     - container_id: 0
            host_id: 1000
            size: 1
          - container_id: 1
            host_id: 100000
            size: 65536
        kernel: 6.8.11-300.fc40.x86_64
        linkmode: dynamic
        logDriver: journald
        memFree: 9361956864
        memTotal: 12185284608
        networkBackend: netavark
        networkBackendInfo:     backend: netavark
          dns:       package: aardvark-dns-1.11.0-1.fc40.x86_64
            path: /usr/libexec/podman/aardvark-dns
            version: aardvark-dns 1.11.0
          package: netavark-1.11.0-1.fc40.x86_64
          path: /usr/libexec/podman/netavark
          version: netavark 1.11.0
        ociRuntime:     name: crun
          package: crun-1.15-1.fc40.x86_64
          path: /usr/bin/crun
          version: |-
            crun version 1.15
            commit: e6eacaf4034e84185fd8780ac9262bbf57082278
            rundir: /run/user/1000/crun
            spec: 1.0.0
            +SYSTEMD +SELINUX +APPARMOR +CAP +SECCOMP +EBPF +CRIU +LIBKRUN +WASM:wasmedge +YAJL
        os: linux
        pasta:     executable: /usr/bin/pasta
          package: passt-0^20240510.g7288448-1.fc40.x86_64
          version: |
            pasta 0^20240510.g7288448-1.fc40.x86_64
            Copyright Red Hat
            GNU General Public License, version 2 or later
              <https://www.gnu.org/licenses/old-licenses/gpl-2.0.html>
            This is free software: you are free to change and redistribute it.
            There is NO WARRANTY, to the extent permitted by law.
        remoteSocket:     exists: false
          path: /run/user/1000/podman/podman.sock
        rootlessNetworkCmd: pasta
        security:     apparmorEnabled: false
          capabilities: CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FOWNER,CAP_FSETID,CAP_KILL,CAP_NET_BIND_SERVICE,CAP_SETFCAP,CAP_SETGID,CAP_SETPCAP,CAP_SETUID,CAP_SYS_CHROOT
          rootless: true
          seccompEnabled: true
          seccompProfilePath: /usr/share/containers/seccomp.json
          selinuxEnabled: true
        serviceIsRemote: false
        slirp4netns:     executable: /usr/bin/slirp4netns
          package: slirp4netns-1.2.2-2.fc40.x86_64
          version: |-
            slirp4netns version 1.2.2
            commit: 0ee2d87523e906518d34a6b423271e4826f71faf
            libslirp: 4.7.0
            SLIRP_CONFIG_VERSION_MAX: 4
            libseccomp: 2.5.5
        swapFree: 0
        swapTotal: 0
        uptime: 22h 45m 49.00s (Approximately 0.92 days)
        variant: ""
      plugins:   authorization: null
        log:   - k8s-file
        - none
        - passthrough
        - journald
        network:   - bridge
        - macvlan
        - ipvlan
        volume:   - local
      registries:   search:   - registry.fedoraproject.org
        - registry.access.redhat.com
        - docker.io
      store:   configFile: /var/home/core/.config/containers/storage.conf
        containerStore:     number: 2
          paused: 0
          running: 2
          stopped: 0
        graphDriverName: overlay
        graphOptions: {}
        graphRoot: /var/home/core/.local/share/containers/storage
        graphRootAllocated: 511561764864
        graphRootUsed: 21785911296
        graphStatus:     Backing Filesystem: xfs
          Native Overlay Diff: "true"
          Supports d_type: "true"
          Supports shifting: "false"
          Supports volatile: "true"
          Using metacopy: "false"
        imageCopyTmpDir: /var/tmp
        imageStore:     number: 5
        runRoot: /run/user/1000/containers
        transientStore: false
        volumePath: /var/home/core/.local/share/containers/storage/volumes
      version:   APIVersion: 5.1.0
        Built: 1716940800
        BuiltTime: Wed May 29 00:00:00 2024
        GitCommit: ""
        GoVersion: go1.22.3
        Os: linux
        OsArch: linux/amd64
        Version: 5.1.0
      

      Podman in a container

      No

      Privileged Or Rootless

      Privileged

      Upstream Latest Release

      No

      Additional environment details

      Additional environment details

      Additional information

      Additional information like issue happens only occasionally or issue happens with a particular architecture or on a particular setting


      Upstream URL: https://github.com/containers/podman/issues/23317

              pholzing@redhat.com Paul Holzinger
              upstream-sync Upstream Sync
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

                Created:
                Updated:
                Resolved: