手把手帶你學Docker:Docker的網絡原理(五)

導語

運行容器是需要使用端口映射的,可是爲什麼呢?

答: 容器使用的ip是172.17.0.0/16網段的,外界的用戶只能訪問宿主機的10.0.0.0/24網段,無法訪問172.17.0.0/16網段。們運行容器的目的:是希望運行在容器中的服務,能夠被外界訪問,這裏就涉及到了外網10.0.0.0/24到容器內網172.17.0.0/16網段的轉換,所以需要做端口映射。

進入容器

現在我們進入容器,並且查看容器的ip地址:

[root@docker01 ~]# docker run -it centos:6.8
[root@8a89c3a541c4 /]# ifconfig
eth0      Link encap:Ethernet  HWaddr 02:42:AC:11:00:02  
          inet addr:172.17.0.2  Bcast:172.17.255.255  Mask:255.255.0.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:12 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0 
          RX bytes:1016 (1016.0 b)  TX bytes:0 (0.0 b)

lo        Link encap:Local Loopback  
          inet addr:127.0.0.1  Mask:255.0.0.0
          UP LOOPBACK RUNNING  MTU:65536  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1 
          RX bytes:0 (0.0 b)  TX bytes:0 (0.0 b)

[root@8a89c3a541c4 /]# 

注意: 這個時候我們在外網肯定是訪問不了ip爲 172.17.0.2,在自己電腦上ping一下可以發現:

XXX@localhost ~ % ping 172.17.0.2
PING 172.17.0.2 (172.17.0.2): 56 data bytes
Request timeout for icmp_seq 0
Request timeout for icmp_seq 1
Request timeout for icmp_seq 2
Request timeout for icmp_seq 3
Request timeout for icmp_seq 4
Request timeout for icmp_seq 5
^Z
zsh: suspended  ping 172.17.0.2
XXX@localhost ~ % 

端口映射

爲了使外網能夠訪問宿主機中的容器,就要使用到容器端口映射的方法,指定映射(docker 自動添加一條iptables規則實現端口映射):

-p hostPort:containerPort #一個ip的情況下映射
-p ip:hostPort:containerPort #綁定多個ip時,指定ip和port映射到容器的端口
-p ip::containerPort(隨機端口) #多個ip時,指定ip隨機端口映射到容器的端口
-p hostPort:containerPort:udp #指定端口映射協議
-p 81:80 -p 443:443 #可以指定多個-p 隨機映射
docker run -P #(隨機端口)

這裏我啓動一個Nginx容器,宿主機的端口80映射到容器端口80:

[root@docker01 ~]# docker run -d -p 80:80 nginx:latest
86a8b65b92386f0e42aeb5375c5173b366be9da9641f16dffd86121cf39268ea
[root@docker01 ~]# netstat -lntup
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address           Foreign Address         State       PID/Program name    
tcp        0      0 10.0.0.11:11211         0.0.0.0:*               LISTEN      1075/memcached      
tcp        0      0 0.0.0.0:4369            0.0.0.0:*               LISTEN      1/systemd           
tcp        0      0 0.0.0.0:22              0.0.0.0:*               LISTEN      1082/sshd           
tcp        0      0 0.0.0.0:15672           0.0.0.0:*               LISTEN      1083/beam.smp       
tcp        0      0 127.0.0.1:25            0.0.0.0:*               LISTEN      1423/master         
tcp        0      0 0.0.0.0:25672           0.0.0.0:*               LISTEN      1083/beam.smp       
tcp        0      0 10.0.0.11:3306          0.0.0.0:*               LISTEN      1292/mysqld         
tcp6       0      0 ::1:11211               :::*                    LISTEN      1075/memcached      
tcp6       0      0 :::80                   :::*                    LISTEN      2205/docker-proxy   
tcp6       0      0 :::22                   :::*                    LISTEN      1082/sshd           
tcp6       0      0 ::1:25                  :::*                    LISTEN      1423/master         
tcp6       0      0 :::5672                 :::*                    LISTEN      1083/beam.smp       
udp        0      0 10.0.0.11:11211         0.0.0.0:*                           1075/memcached      
udp        0      0 0.0.0.0:123             0.0.0.0:*                           771/chronyd         
udp        0      0 127.0.0.1:323           0.0.0.0:*                           771/chronyd         
udp6       0      0 ::1:11211               :::*                                1075/memcached      
udp6       0      0 ::1:323                 :::*                                771/chronyd         
[root@docker01 ~]# 

同時在iptables中進行查看(最後一條),tcp dpt:80 to:172.17.0.2:80,在宿主機防火牆中所有從80端口進來的請求都會映射到容器172.17.0.2:80:

[root@docker01 ~]# iptables -t nat -L -n
Chain PREROUTING (policy ACCEPT)
target     prot opt source               destination         
DOCKER     all  --  0.0.0.0/0            0.0.0.0/0            ADDRTYPE match dst-type LOCAL

Chain INPUT (policy ACCEPT)
target     prot opt source               destination         

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination         
DOCKER     all  --  0.0.0.0/0           !127.0.0.0/8          ADDRTYPE match dst-type LOCAL

Chain POSTROUTING (policy ACCEPT)
target     prot opt source               destination         
MASQUERADE  all  --  172.17.0.0/16        0.0.0.0/0           
MASQUERADE  tcp  --  172.17.0.2           172.17.0.2           tcp dpt:80

Chain DOCKER (2 references)
target     prot opt source               destination         
RETURN     all  --  0.0.0.0/0            0.0.0.0/0           
DNAT       tcp  --  0.0.0.0/0            0.0.0.0/0            tcp dpt:80 to:172.17.0.2:80
[root@docker01 ~]# 

同時可通過docker inspect containerName查看容器的詳細信息

[root@docker01 ~]# docker inspect 86a8b65b9238
[
    {
        "Id": "86a8b65b92386f0e42aeb5375c5173b366be9da9641f16dffd86121cf39268ea",
        "Created": "2019-07-24T01:07:54.419925553Z",
        "Path": "nginx",
        "Args": [
            "-g",
            "daemon off;"
        ],
    .
    .
    .
  省略部分
    .
    .
"Networks": {
                "bridge": {
                    "IPAMConfig": null,
                    "Links": null,
                    "Aliases": null,
                    "NetworkID": "4b698436944d7da202d81fcd7275bdbc073f07e852813c6052d956a78d58d389",
                    "EndpointID": "565e396bc726166c4a7e797e1f5872800250c7d61ede7fb9c60d437682b637d5",
                    "Gateway": "172.17.0.1",
                    "IPAddress": "172.17.0.2",
                    "IPPrefixLen": 16,
                    "IPv6Gateway": "",
                    "GlobalIPv6Address": "",
                    "GlobalIPv6PrefixLen": 0,
                    "MacAddress": "02:42:ac:11:00:02",
                    "DriverOpts": null
                }
            }
[root@docker01 ~]# curl -I 172.17.0.2
HTTP/1.1 200 OK
Server: nginx/1.17.1
Date: Wed, 24 Jul 2019 01:17:48 GMT
Content-Type: text/html
Content-Length: 612
Last-Modified: Tue, 25 Jun 2019 12:19:45 GMT
Connection: keep-alive
ETag: "5d121161-264"
Accept-Ranges: bytes

[root@docker01 ~]# 

在windows(外網)訪問宿主機ip:10.0.0.11,即可訪問到容器中的nginx:

在這裏插入圖片描述

網絡原理

通過上面的一系列操作之後,發現可以成功映射到Docker容器上了,下面我們一起看下網絡原理。

在這裏插入圖片描述

宿主機上有兩塊網卡:eth0(外網),docker0(內網),當docker服務啓動時,會自動創建一個橋接網卡docker0(172.17.0.1),同時也會出現一個網橋docker0(通過brctl show查看,若出現-bash: brctl: command not found,則先安裝bridge-utils,yum install bridge-utils),將所有docker的虛擬網卡(docker自動創建虛擬網卡)連接到docker0網橋上,docker容器啓動時會按照順序分配ip,如:172.17.0.2,172.17.0.3,172.17.0.4,172.17.0.5,…

爲什麼docker容器能與外網互通呢?

[root@docker01 ~]# docker run -it centos:6.8 /bin/bash
[root@c1288955af2a /]# curl -I www.baidu.com
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: private, no-cache, no-store, proxy-revalidate, no-transform
Connection: Keep-Alive
Content-Length: 277
Content-Type: text/html
Date: Wed, 24 Jul 2019 02:15:38 GMT
Etag: "575e1f60-115"
Last-Modified: Mon, 13 Jun 2016 02:50:08 GMT
Pragma: no-cache
Server: bfe/1.0.8.18

[root@c1288955af2a /]# 

答: linux內核起關鍵性的作用,內核將容器的橋接網卡信號轉發到eth0上,然後eth0與外網互通,其中net.ipv4.ip_forward=1用來配置轉發。

[root@docker01 ~]# sysctl -a|grep ipv4|grep ip_forward
net.ipv4.ip_forward = 1
net.ipv4.ip_forward_use_pmtu = 0
sysctl: reading key "net.ipv6.conf.all.stable_secret"
sysctl: reading key "net.ipv6.conf.default.stable_secret"
sysctl: reading key "net.ipv6.conf.docker0.stable_secret"
sysctl: reading key "net.ipv6.conf.eth0.stable_secret"
sysctl: reading key "net.ipv6.conf.eth1.stable_secret"
sysctl: reading key "net.ipv6.conf.lo.stable_secret"
sysctl: reading key "net.ipv6.conf.veth1faf6fe.stable_secret"
sysctl: reading key "net.ipv6.conf.veth388cccb.stable_secret"
sysctl: reading key "net.ipv6.conf.vethc734548.stable_secret"

systemctl restart docker,當重啓docker時內核將net.ipv4.ip_forward 臨時調整爲1,爲了讓這個內核參數永久生效,可將該配置放到內核配置文件中:

[root@docker01 ~]# vim /etc/sysctl.conf

net.ipv4.ip_forward = 1    

然後重新生效內核參數:

[root@docker01 ~]# sysctl -p
net.ipv4.ip_forward = 1
[root@docker01 ~]# 

總結

本篇文章講述了Docker容器的網絡原理,由於純手打,難免會有紕漏,如果發現錯誤的地方,請第一時間告訴我,這將是我進步的一個很重要的環節。

發表評論
所有評論
還沒有人評論,想成為第一個評論的人麼? 請在上方評論欄輸入並且點擊發布.
相關文章