2548adde1f62 bridge bridge local
0c7cf2e84fae ec2-docker_esmero-net bridge local
9ed8106b22d9 ec2-docker_host-net bridge local
cb69b005c7ef host host local
4300556a0879 none null local
Then you can inspect each bridge and see which IP's its using (you can also do a "ip addr" to see which interfaces are using which IPs)e.g $ docker network inspect 0c7cf2e84fae
{
"Name": "ec2-docker_esmero-net",
"Id": "0c7cf2e84fae87ee3d9d0f81db5b27aaee5cfae722302cda37d052d8cb6cbca1",
"Created": "2021-06-01T20:20:08.796617637Z",
"Scope": "local",
"Driver": "bridge",
"EnableIPv6": false,
"IPAM": {
"Driver": "default",
"Options": null,
"Config": [
{
"Subnet": "172.19.0.0/16",
"Gateway": "172.19.0.1"
}
]
},
"Internal": true,
"Attachable": true,
"Ingress": false,
"ConfigFrom": {
"Network": ""
}....
So, the definitive solution (since the subnet/gateway may clash with your VPN) to this is to let the Docker Service know those address ranges are not be used (passing other)
$ nano /etc/docker/daemon.json
{
"default-address-pools" : [
{
"base" : "172.240.0.0/16",
"size" : 24
}
]
}