Docker is a very popular open source containerization engine. It is widely used in development and production environments because it can be quickly built, easy to manage, and ensures the portability of applications. However, when using Docker to build a web application, it is not uncommon for ports to be unable to communicate. Today we will analyze the reasons and solutions for the blocked web port built by Docker.
1. Cause analysis
- Firewall reasons
The iptables firewall service is enabled by default in the Linux system. If you have not configured it, the firewall may block it. Your docker container communicates with the external network. Therefore, you can turn off the firewall or add rules so that Docker can communicate with the external network smoothly. The following is a reference command:
Close the firewall: $ sudo service iptables stop
Open the port: $ sudo iptables -A INPUT -p tcp --dport 80 -j ACCEPT
- The reason for port mapping
After Docker starts the container, it maps the port in the container to a port on the host through port mapping to achieve communication between the container and the external network. By default, the container's network is independent and only communicates internally. Therefore, if you do not map the ports inside the container, it may cause the port to be unable to communicate. The following is the default way to map ports:
$ docker run -p 80:80 image-name
- Container network issues
There are three types in Docker Network drivers are bridge, host and none. When using Docker containers, the bridge network driver is used by default, forming a virtual network based on the NAT network. If your container cannot access the external network, you may need to check whether your network driver is selected correctly. You can use the following command to check the network driver:
$ docker network ls
- Container IP address problem
After Docker starts the container, it will be based on the network driver. It assigns a unique IP address. If your container IP address cannot access the external network, you need to check whether the network card connected to it is configured correctly. In the following example, we can see that the IP address of the container is 172.17.0.2:
$ docker inspect container-name | grep IPAddress
2. Solution
- Confirm whether the port mapping is correct
You can use the following method to check the port mapping relationship:
$ docker port container-name
The output content should be:
80/tcp -> 0.0.0.0:80
The above command can view the port mapping inside the container to the port on the host.
- Confirm whether the network driver is selected correctly
You can use the following method to check the network type used by the container:
$ docker inspect container-name | grep NetworkMode
If the output is bridge, it means that the network driver has been selected correctly. If the output is host or none, you can change it as follows:
Change the network type to bridge:
$ docker run --network bridge image-name
- Confirm whether the firewall is turned off or the rules are set correctly
When running the Docker command, you can add a --privileged parameter so that the Docker container has relatively high permissions:
$ docker run --privileged image-name
- Confirm whether the container IP address is correct
You can use the following command to view the container IP address:
$ docker inspect container -name | grep IPAddress
If your container IP address changes, you can use the following command to reassign a unique IP address:
$ docker run --ip 172.17.0.10 image-name
In short, when the web application port started by your Docker cannot communicate, you should first investigate what is causing this situation, and then solve the problem in the corresponding way. Hope this article can help everyone.
The above is the detailed content of What should I do if the web port built by docker is blocked?. For more information, please follow other related articles on the PHP Chinese website!

Docker and Kubernetes improve application deployment and management efficiency through container orchestration. 1.Docker builds images through Dockerfile and runs containers to ensure application consistency. 2. Kubernetes manages containers through Pod, Deployment and Service to achieve automated deployment and expansion.

Docker and Kubernetes are leaders in containerization and orchestration. Docker focuses on container lifecycle management and is suitable for small projects; Kubernetes is good at container orchestration and is suitable for large-scale production environments. The combination of the two can improve development and deployment efficiency.

Docker and Linux are perfect matches because they can simplify the development and deployment of applications. 1) Docker uses Linux's namespaces and cgroups to implement container isolation and resource management. 2) Docker containers are more efficient than virtual machines, have faster startup speeds, and the mirrored hierarchical structure is easy to build and distribute. 3) On Linux, the installation and use of Docker is very simple, with only a few commands. 4) Through DockerCompose, you can easily manage and deploy multi-container applications.

The difference between Docker and Kubernetes is that Docker is a containerized platform suitable for small projects and development environments; Kubernetes is a container orchestration system suitable for large projects and production environments. 1.Docker simplifies application deployment and is suitable for small projects with limited resources. 2. Kubernetes provides automation and scalability capabilities, suitable for large projects that require efficient management.

Use Docker and Kubernetes to build scalable applications. 1) Create container images using Dockerfile, 2) Deployment and Service of Kubernetes through kubectl command, 3) Use HorizontalPodAutoscaler to achieve automatic scaling, thereby building an efficient and scalable application architecture.

The main difference between Docker and Kubernetes is that Docker is used for containerization, while Kubernetes is used for container orchestration. 1.Docker provides a consistent environment to develop, test and deploy applications, and implement isolation and resource limitation through containers. 2. Kubernetes manages containerized applications, provides automated deployment, expansion and management functions, and supports load balancing and automatic scaling. The combination of the two can improve application deployment and management efficiency.

Installing and configuring Docker on Linux requires ensuring that the system is 64-bit and kernel version 3.10 and above, use the command "sudoapt-getupdate" and install it with the command "sudoapt-getupdate" and verify it with "sudoapt-getupdate" and. Docker uses the namespace and control groups of the Linux kernel to achieve container isolation and resource limitation. The image is a read-only template, and the container can be modified. Examples of usage include running an Nginx server and creating images with custom Dockerfiles. common

The reason for using Docker is that it provides an efficient, portable and consistent environment to package, distribute, and run applications. 1) Docker is a containerized platform that allows developers to package applications and their dependencies into lightweight, portable containers. 2) It is based on Linux container technology and joint file system to ensure fast startup and efficient operation. 3) Docker supports multi-stage construction, optimizes image size and deployment speed. 4) Using Docker can simplify development and deployment processes, improve efficiency and ensure consistency across environments.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

Atom editor mac version download
The most popular open source editor

EditPlus Chinese cracked version
Small size, syntax highlighting, does not support code prompt function

PhpStorm Mac version
The latest (2018.2.1) professional PHP integrated development tool

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software
