Docker Networking – Bridge Network

Round Robin DNS - Custom Bridge Network Docker

Default Bridge Network

Containers, that run on the same machine (share the same Docker daemon) and are not part of a swarm use the so-called bridge network (a virtual network) to communicate with each other.

Let us create two basic containers

docker container run -d --name nginx2 -p3001:80 nginx:alpine

docker container run -d --name nginx2 -p3002:80 nginx:alpine

You can inspect the bridge-network with

docker network inspect bridge

and you will see in the container section of this REST response, that the newly created docker-containers belong to this network.

"Containers": {
    "9b4e3e3ca279518708ed88a629ba5d40bd1e94d5ed316b74b026b12c1034b497": {
        "Name": "nginx2",
        "EndpointID": "5a65daa2976ff986e2a9b4aeb9df8e990b0bf0a45ac60dd05475af20f15cc5c9",
        "MacAddress": "02:42:ac:11:00:03",
        "IPv4Address": "172.17.0.3/16",
        "IPv6Address": ""
    },
    "c57ee29c8babf8ecf20e5c2a9a66b30c49cc6bb94b22cd4daad79b87f7a33358": {
        "Name": "nginx1",
        "EndpointID": "75dc77f5a8677485aaee91c33734e720ebbb61b94917eacba8f50bd4dc7a88e3",
        "MacAddress": "02:42:ac:11:00:02",
        "IPv4Address": "172.17.0.2/16",
        "IPv6Address": ""
    }
},

You also see the IP address of container nginx1 (172.17.0.2) and nginx2 (127.17.0.3). We can also see the IP address an subnet of the bridge:

"IPAM": {
    "Driver": "default",
    "Options": null,
    "Config": [
        {
            "Subnet": "172.17.0.0/16",
            "Gateway": "172.17.0.1"
        }
    ]
},

Now let us see if the nginx-containers can see each other, as well as the bridge.

docker container exec -it nginx1 ping 172.17.0.3

docker container exec -it nginx1 ping 172.17.0.1

docker container exec -it nginx2 ping 172.17.0.2

docker container exec -it nginx2 ping 172.17.0.1

In each case, you should be able to reach the destination

PING 172.17.0.1 (172.17.0.1): 56 data bytes
64 bytes from 172.17.0.1: seq=0 ttl=64 time=0.092 ms
64 bytes from 172.17.0.1: seq=1 ttl=64 time=0.167 ms
64 bytes from 172.17.0.1: seq=2 ttl=64 time=0.126 ms
Default Bridge Network Docker
Default Bridge Network Docker

However, what is not working with the default bridge network is name resolution, e.g.

docker container exec -it nginx1 ping nginx2

should not work and lead to a

ping: bad address 'nginx2'

Custom Bridge Networks (embedded DNS)

So to make this work, we have to create our own network

docker network create --driver bridge nginx-net

You can see the new network (and other networks) by using

docker network ls

NETWORK ID          NAME                DRIVER              SCOPE
1f3e6ded4f9a        bridge              bridge              local
20fe2ddb80e6        host                host                local
6d96ed99b06b        nginx-net           bridge              local
5866618435c1        none                null                local

Now let us connect our two containers to this network

docker network connect nginx-net nginx1

docker network connect nginx-net nginx2

If you now do a docker network inspect nginx-net you will see that both containers are connected to this network. You will notice, that the IP-addresses of these containers in this network have changed (the subnet is 172.19.0.0/16 compared to 172.17.0.0/16 as in the default-bridge network).

"Containers": {
     "a1ce9d1f383cf10b3a0cd27d6ef482719ae4e3ae48cb5b8402b2d3d8b897db03": {
         "Name": "nginx2",
         "EndpointID": "49fc6d33e57e909f0f0ea98e00c8d8f2f2db996d001a3359b1a6dcc968254f91",
         "MacAddress": "02:42:ac:13:00:03",
         "IPv4Address": "172.19.0.3/16",
         "IPv6Address": ""
     },
     "c57ee29c8babf8ecf20e5c2a9a66b30c49cc6bb94b22cd4daad79b87f7a33358": {
         "Name": "nginx1",
         "EndpointID": "fb7e9c28e6a5564e9bba182ada2ce8048d9ab5b8ec3620f7e03a2491b18219b2",
         "MacAddress": "02:42:ac:13:00:02",
         "IPv4Address": "172.19.0.2/16",
         "IPv6Address": ""
     }
 },

Now let run a ping against the other containers by name again

docker container exec -it nginx1 ping nginx2

PING nginx2 (172.19.0.3): 56 data bytes
64 bytes from 172.19.0.3: seq=0 ttl=64 time=0.139 ms
64 bytes from 172.19.0.3: seq=1 ttl=64 time=0.152 ms
c64 bytes from 172.19.0.3: seq=2 ttl=64 time=0.100 ms

The same should work for the other connections. So basically, the name of the container is its host-name.

Custom Bridge Network Docker
Custom Bridge Network Docker

So why is DNS inside of Docker networks so important? As we have especially seen in the tutorials about Docker Swarm, you can’t rely on the IP address of containers, as they may change, especially when a swarm manager has control over the containers. Hence it is much reliable and easier to reference containers by name than their IP address.

Round-Robin DNS

Let us take our dataService from the Swarm tutorial and create two Docker containers on the same host

docker container run --name dataservice1 -d -p4001:8080 vividbreeze/docker-tutorial:version1

docker container run --name dataservice2 -d -p4002:8080 vividbreeze/docker-tutorial:version1

So you call these services you should get a response with an id. This id should be different, depending on the port.

curl 127.0.0.1:4001

<?xml version="1.0" ?><result><name>hello</name><id>2128</id></result>

curl 127.0.0.1:4002

<?xml version="1.0" ?><result><name>hello</name><id>1976</id></result>

Now let us create a custom bridge-network and assign both containers to this network.

docker network create --driver bridge dataservice-net

docker network connect dataservice-net --alias dataservice dataservice1

docker network connect dataservice-net --alias dataservice dataservice2

We used a new parameter called --alias. This alias is an alias for the embedded DNS service, i.e. that when I call dataservice inside of the dataservice-net, the embedded DNS will return the IP address from either dataservice1 or dataservice2. Let us test this by running a new container inside this network and executing curl dataservice:8080 (because inside of dataservice-net both containers listen to port 8080 on different IP-addresses).

docker container run --rm -it --network dataservice-net centos curl dataservice:8080

This command runs a new Docker container with CentOS, executes a curl (-it) and deletes itself afterwards (–rm).

If you repeat this command a couple of time, you see that the either one of the containers returns a result (you can see this on the different ids they return).

$ docker container run --rm -it --network dataservice-net centos curl dataservice:8080
<?xml version="1.0" ?><result><name>hello</name><id>1976</id></result>
$ docker container run --rm -it --network dataservice-net centos curl dataservice:8080
<?xml version="1.0" ?><result><name>hello</name><id>1976</id></result>
$ docker container run --rm -it --network dataservice-net centos curl dataservice:8080
<?xml version="1.0" ?><result><name>hello</name><id>2128</id></result>
$ docker container run --rm -it --network dataservice-net centos curl dataservice:8080
<?xml version="1.0" ?><result><name>hello</name><id>2128</id></result>
$ docker container run --rm -it --network dataservice-net centos curl dataservice:8080
<?xml version="1.0" ?><result><name>hello</name><id>1976</id></result>
$ docker container run --rm -it --network dataservice-net centos curl dataservice:8080
<?xml version="1.0" ?><result><name>hello</name><id>2128</id></result>
Round Robin DNS - Custom Bridge Network Docker
Round Robin DNS – Custom Bridge Network Docker

What is the beauty here? The loads (requests) is balanced between the two containers. If you stop one of the containers, a request to dataservice will still return a result.

docker container stop dataservice1

docker container run --rm -it --network dataservice-net centos curl dataservice:8080

$ docker container run --rm -it --network dataservice-net centos curl dataservice:8080
<?xml version="1.0" ?><result><name>hello</name><id>1976</id></result>
$ docker container run --rm -it --network dataservice-net centos curl dataservice:8080
<?xml version="1.0" ?><result><name>hello</name><id>1976</id></result>
$ docker container run --rm -it --network dataservice-net centos curl dataservice:8080
<?xml version="1.0" ?><result><name>hello</name><id>1976</id></result>
$ docker container run --rm -it --network dataservice-net centos curl dataservice:8080
<?xml version="1.0" ?><result><name>hello</name><id>1976</id></result>

We will later discuss, how we can use this DNS balancing from outside of the network.

Further Remarks

A bridge network can be reached by its IP address from the Docker host, when you are working on Linux (or from inside the Docker VM if you are working on MacOSX or Windows), but not by its name.  The way you can access the containers from the host (also MacOSX and Windows) is by its ports on the local machine, e.g.  curl 127.0.0.1:3000 or curl 192.168.0.6:3001.

If you are not exposing a port when running the container, the container won’t be accessible from outside of the bridge network (which is fine). This makes sense if you e.g have a service that connects to a database. The service should be accessible from the host network, while the database should only be accessed by the service.

A container can belong to several networks. You can try this by creating more of our small containers and connect them to our nginx-net or newly created networks.

 

Chris