Windows inside a Docker container.
Find a file
2025-09-24 12:11:41 +05:30
.github build: Disable automatic builds (#1386) 2025-09-14 11:52:06 +02:00
assets fix: Disallow RDP login with blank password (#1202) 2025-04-14 12:46:21 +02:00
data_folder_2025_server Automation of AD/Dc and the client auto connection 2025-09-24 12:11:41 +05:30
data_folder_win11 Automation of AD/Dc and the client auto connection 2025-09-24 12:11:41 +05:30
src connection of docker AD AND client 2025-09-18 19:12:59 +05:30
.devcontainer.json feat: Add devcontainer (#1134) 2025-03-19 09:23:29 +01:00
.dockerignore fix: Delete ISO when extraction fails (#372) 2024-04-13 16:58:04 +02:00
.env Automation of AD/Dc and the client auto connection 2025-09-24 12:11:41 +05:30
.gitignore Automation of AD/Dc and the client auto connection 2025-09-24 12:11:41 +05:30
backup.ps1 Automation of AD/Dc and the client auto connection 2025-09-24 12:11:41 +05:30
compose.yml Automation of AD/Dc and the client auto connection 2025-09-24 12:11:41 +05:30
Dockerfile build: Remove netcat-openbsd package (#1389) 2025-09-15 01:00:17 +02:00
kubernetes.yml fix: Remove port 80 (#1124) 2025-03-18 05:19:44 +01:00
license.md Create license.md 2024-01-14 17:17:26 +01:00
README.md Automation of AD/Dc and the client auto connection 2025-09-24 12:11:41 +05:30
readme.md docs: Update image sizes (#1390) 2025-09-15 01:05:12 +02:00

Before doing the docker compose up always use the command

  1. Create a macvlan network for the containers

Pick a tiny slice of your LAN that you wont use for normal devices; well use .200.206.

stop your current containers first

docker compose down

create the macvlan network (parent is your NIC thats on 192.168.10.0/24)

\ here remember that you have to set the subnet gateway ip-range and the parent with your network configuration

docker network create -d macvlan \
--subnet=192.168.10.0/24
--gateway=192.168.10.1
--ip-range=192.168.10.200/29
-o parent=enp6s0
ad_vlan Why: macvlan lets each container appear as its own L2 host on your 192.168.10.0/24.

  1. Allow the host to talk to macvlan endpoints (host-access workaround)

macvlan blocks host↔container by design. Create a macvlan sub-interface on the host so Arch can reach them:

create a host-side macvlan interface that shares the same parent

sudo ip link add adhost link enp6s0 type macvlan mode bridge sudo ip addr add 192.168.10.9/24 dev adhost sudo ip link set adhost up

route the small pool via this host-side macvlan interface

sudo ip route add 192.168.10.200/29 dev adhost

Now your Arch host (192.168.10.10) can reach the macvlan IPs through adhost (192.168.10.9).