Book Image

Docker Networking Cookbook

Book Image

Docker Networking Cookbook

Overview of this book

Networking functionality in Docker has changed considerably since its first release, evolving to offer a rich set of built-in networking features, as well as an extensible plugin model allowing for a wide variety of networking functionality. This book explores Docker networking capabilities from end to end. Begin by examining the building blocks used by Docker to implement fundamental containing networking before learning how to consume built-in networking constructs as well as custom networks you create on your own. Next, explore common third-party networking plugins, including detailed information on how these plugins inter-operate with the Docker engine. Consider available options for securing container networks, as well as a process for troubleshooting container connectivity. Finally, examine advanced Docker networking functions and their relevant use cases, tying together everything you need to succeed with your own projects.
Table of Contents (18 chapters)
Docker Networking Cookbook
Credits
About the Author
About the Reviewer
www.PacktPub.com
Preface
Index

Using tcpdump to verify network paths


Although we glanced over its usage in previous chapters, anyone working with networking on a Linux-based system should be comfortable with tcpdump. tcpdump allows you to capture network traffic on one or more interfaces on the host. In this recipe, we'll walk through how we can use tcpdump to verify container network traffic in a couple of different Docker networking scenarios.

Getting ready

In this recipe, we'll be using a single Docker host. It is assumed that Docker is installed and in its default configuration. You'll also need root-level access in order to inspect and change the hosts networking and firewall configuration. You'll also need the tcpdump utility installed. If you don't have it on your system, you can install it with this command:

sudo apt-get install tcpdump

How to do it…

tcpdump is an amazing troubleshooting tool. When used properly, it can give you a detailed view of packets as they traverse interfaces on a Linux host. To demonstrate...