Docker Certified Associate Exam Course

Docker Swarm

Docker Overlay Network

Docker overlay networks provide a single, seamless virtual network across multiple Docker nodes, enabling containers on different hosts to communicate securely. This guide covers Docker’s built-in network drivers, the purpose of overlays, Swarm’s default networks, and how to create custom overlay networks.

Revisiting Docker’s Built-In Networks

Below is a quick reference for Docker’s default network drivers:

DriverUse CaseExample Command
bridgeContainer isolation on a single hostdocker run -p 8080:80 my-web-app
hostShares host network namespacedocker run --network=host my-web-app
noneNo networking (full isolation)docker run --network=none ubuntu

bridge

Docker’s default network driver. It creates a private bridge (usually 172.17.x.x) on the host and connects containers to it:

docker run -d --name web \
  -p 8080:80 \
  nginx

host

Containers share the host’s network namespace—ports inside the container map directly to the host without -p:

docker run -d --network=host \
  --name api-server \
  my-api-image

none

Disables all networking for full isolation. Use this when you don’t need external access:

docker run --network=none \
  --name isolated-container \
  ubuntu

Why Overlay Networks?

Each Docker host has its own bridge, so containers on different machines can’t talk by default. Overlay networks use VXLAN to create a virtual layer 2 network across hosts, making them essential for:

  • Multi-host container communication
  • Docker Swarm service discovery
  • Secure, encrypted traffic between containers

Ingress Network in Docker Swarm

When you run docker swarm init, Swarm creates an ingress overlay network with a built-in load balancer and routing mesh:

docker network ls
NETWORK ID     NAME        DRIVER    SCOPE
68abeefb1f2e   bridge      bridge    local
5bab4adc7d02   host        host      local
e43bd489dd57   none        null      local
mevcdh5b40zz   ingress     overlay   swarm

Single Node Service Publishing

Without Swarm, you’d expose a container port like this:

docker run -p 80:5000 my-web-server

With Swarm and two replicas, use --publish:

docker service create \
  --replicas 2 \
  --publish 80:5000 \
  my-web-server

Ingress’s load balancer listens on port 80 and routes traffic to port 5000 on both replicas.

Multi-Node Routing Mesh

In a multi-node Swarm, every node advertises the published port (80). Incoming requests on any node are automatically forwarded to an active replica, regardless of where it’s running.

The image illustrates an ingress network setup for a Docker Swarm, showing load balancers, a routing mesh, and web containers distributed across multiple Docker hosts.

Default Swarm Networks

Swarm init creates two essential networks:

NameDriverPurpose
ingressoverlayPublishes service ports cluster-wide via routing mesh
docker_gwbridgebridgeConnects each node’s Docker daemon to the Swarm’s gateway port
docker network ls
NETWORK ID     NAME             DRIVER    SCOPE
68abeefb1f2e   bridge           bridge    local
5bab4adc7d02   host             host      local
e43bd489dd57   none             null      local
mevcdh5b40zz   ingress          overlay   swarm
c8fb2c361202   docker_gwbridge  bridge    local

The image illustrates a diagram of Docker's default networks, showing web containers connected through an ingress network and a bridge network across multiple Docker hosts in a Docker Swarm setup.

Creating Custom Overlay Networks

Create your own overlay network for services or standalone containers:

docker network create \
  --driver overlay \
  my-overlay-network
  • --attachable: Allows standalone containers to join the overlay.
  • --opt encrypted: Enables AES-encrypted VXLAN for secure application traffic.

Remove an overlay network or prune unused ones:

docker network rm my-overlay-network
docker network prune

Warning

Ensure all Swarm nodes can communicate on the required ports (2377, 7946, 4789) to avoid network disruptions.

Required Swarm Ports

The image shows a table listing network ports and their descriptions, including TCP 2377 for cluster management communications, TCP and UDP 7946 for communication among nodes and network discovery, and UDP 4789 for overlay network traffic.

Port Publishing Formats

SyntaxDescription
-p 80:5000Legacy short form
--publish published=80,target=5000Explicit new form
-p 80:5000/udpLegacy with protocol
--publish published=80,target=5000,protocol=udpNew form with protocol
# Legacy
docker service create -p 80:5000 my-web-server

# New explicit
docker service create \
  --publish published=80,target=5000 \
  my-web-server

# With UDP protocol
docker service create \
  --publish published=80,target=5000,protocol=udp \
  my-web-server

Watch Video

Watch video content

Previous
Docker Config Objects