Book Image

Docker Networking Cookbook

Book Image

Docker Networking Cookbook

Overview of this book

Networking functionality in Docker has changed considerably since its first release, evolving to offer a rich set of built-in networking features, as well as an extensible plugin model allowing for a wide variety of networking functionality. This book explores Docker networking capabilities from end to end. Begin by examining the building blocks used by Docker to implement fundamental containing networking before learning how to consume built-in networking constructs as well as custom networks you create on your own. Next, explore common third-party networking plugins, including detailed information on how these plugins inter-operate with the Docker engine. Consider available options for securing container networks, as well as a process for troubleshooting container connectivity. Finally, examine advanced Docker networking functions and their relevant use cases, tying together everything you need to succeed with your own projects.
Table of Contents (18 chapters)
Docker Networking Cookbook
Credits
About the Author
About the Reviewer
www.PacktPub.com
Preface
Index

Working with the Docker IPVLAN network driver


As we've seen in the previous recipe, IPVLAN offers some interesting modes of operations that can be relevant to large-scale container deployments. As of now, Docker support IPVLAN in its experimental software channel. In this recipe, we'll review how you can consume IPVLAN attached containers with the Docker IPVLAN driver.

Getting ready

In this recipe, we'll be using two Linux hosts running Docker. Our lab topology will look like this:

It is assumed that each host is running the experimental channel of Docker in order to get access to the experimental IPVLAN network driver. Please see recipe 1 in regard to the use and consumption of the experimental software channel. The hosts should have a single IP interface and Docker should be in its default configuration. In some cases, the changes we make may require you to have root-level access to the system.

How to do it…

Once you have your hosts running the experimental code, verify that you are on the...