How to add Vxlan Tag to isolation different group of Docker Containers

First, I am aware of creating a VXLAN interface with tag based on ip command:

ip link add vxlan-br0 type vxlan id <tag-id> group <multicast-ip> local <host-ip> dstport 0

  • docker push to dockerhub private repo sometimes pushes existing layer again (ubuntu base layer)
  • dpkg: docker-ce: dependency problems, but removing anyway as you requested: nvidia-docker
  • Docker Detached Mode
  • How do you find volumes configured into the docker *image* itself?
  • docker-ce 17.06.0-ce failed to pull from private registry mirror
  • Debug docker script more efficiently
  • But it is useless for my actual demand, and my demand is to isolate multiple docker containers using different tags, something like:

    brctl addif br1 veth111111 tag=10 # veth111111 is the netdev used by docker container 1
    brctl addif br1 veth222222 tag=20 # veth222222 is the netdev used by docker container 2
    brctl addif br1 veth333333 tag=10 # veth111111 is the netdev used by docker container 3

    I want to isolate container 2 from container 1 and 3, and don’t isolate communication bewteen container 1 and 3. How to achieve this?

  • Wrap origin public Dockerfile to manage build args, etc
  • Adding a directory from the host filesystem to the docker filesystem (not in a dockerfile)
  • Spring MVC - String Parameter with '-' resolved as '?'
  • Docker error in Linux mint 17
  • Can I use logspout for global syslog logging on Docker swarm?
  • docker-compose.yml invalid: contains an invalid type, it should be a string
  • One Solution collect form web for “How to add Vxlan Tag to isolation different group of Docker Containers”

    Adding two bridge networks will provide isolation.

    docker create network net1
    docker create network net2

    Then start some containers

    docker run -d --name one --net net1 busybox sleep 600
    docker run -d --name two --net net2 busybox sleep 600
    docker run -d --name three --net net1 busybox sleep 600

    one and three will communicate as they are attached to the same bridge

    docker exec one ping three
    docker exec three ping one

    Others will fail as they cross networks/bridges

    docker exec one ping two
    docker exec two ping one
    docker exec three ping two

    You’ll notice docker provides host/name resolution inside a network so it’s actually the host name resolution that is failing above. IP’s are not routed between bridges either.

    $ docker exec three ip ad sh dev eth0
    17: eth0@if18: <BROADCAST,MULTICAST,UP,LOWER_UP,M-DOWN> mtu 1500 qdisc noqueue 
        link/ether 02:42:ac:14:00:03 brd ff:ff:ff:ff:ff:ff
        inet scope global eth0
           valid_lft forever preferred_lft forever
        inet6 fe80::42:acff:fe14:3/64 scope link 
           valid_lft forever preferred_lft forever

    Ping two

    $ docker exec three ping -c 1 -w 1
    PING ( 56 data bytes
    --- ping statistics ---
    1 packets transmitted, 0 packets received, 100% packet loss

    Ping one

    docker exec three ping -c 1 -w 1
    PING ( 56 data bytes
    64 bytes from seq=0 ttl=64 time=0.044 ms

    This setup will work with the overlay networking driver as well but that is more complex to setup.

    Docker will be the best open platform for developers and sysadmins to build, ship, and run distributed applications.