Skip to content

Commit fed1846

Browse files
author
Mano Marks
authored
Merge pull request docker#191 from ManoMarks/master
updating a few references to 1.12
2 parents 14021d6 + f175458 commit fed1846

File tree

10 files changed

+31
-32
lines changed

10 files changed

+31
-32
lines changed

networking/A1-network-basics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ NETWORK ID NAME DRIVER SCOPE
6262
ef4896538cc7 none null local
6363
```
6464

65-
The output above shows the container networks that are created as part of a standard installation of Docker 1.12.
65+
The output above shows the container networks that are created as part of a standard installation of Docker.
6666

6767
New networks that you create will also show up in the output of the `docker network ls` command.
6868

networking/concepts/06-overlay-networks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,6 +89,6 @@ Two interfaces have been created inside the container that correspond to two bri
8989

9090

9191

92-
> The Docker Overlay driver has existed since Docker Engine 1.9, and an external K/V store was required to manage state for the network. Docker Engine 1.12 integrated the control plane state into Docker Engine so that an external store is no longer required. 1.12 also introduced several new features including encryption and service load balancing. Networking features that are introduced require a Docker Engine version that supports them, and using these features with older versions of Docker Engine is not supported.
92+
> The Docker Overlay driver has existed since Docker Engine 1.9, and an external K/V store was required to manage state for the network. Docker 1.12 integrated the control plane state into Docker Engine so that an external store is no longer required. 1.12 also introduced several new features including encryption and service load balancing. Networking features that are introduced require a Docker Engine version that supports them, and using these features with older versions of Docker Engine is not supported.
9393
9494
Next: **[MACVLAN](07-macvlan.md)**

networking/concepts/10-load-balancing.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
##<a name="lb"></a>Load Balancing Design Considerations
22

3-
Load balancing is a major requirement in modern, distributed applications. The new Docker Swarm mode introduced in 1.12 comes with a native internal and external load balancing functionalities that utilize both `iptables` and `ipvs`, a transport-layer load balancing inside the Linux kernel.
3+
Load balancing is a major requirement in modern, distributed applications. Docker Swarm mode introduced in 1.12 comes with a native internal and external load balancing functionalities that utilize both `iptables` and `ipvs`, a transport-layer load balancing inside the Linux kernel.
44

55
###Internal Load Balancing
66
When services are created in a Docker Swarm cluster, they are automatically assigned a Virtual IP (VIP) that is part of the service's network. The VIP is returned when resolving the service's name. Traffic to that VIP will be automatically sent to all healthy tasks of that service across the overlay network. This approach avoids any client-side load balancing because only a single IP is returned to the client. Docker takes care of routing and equally distributing the traffic across the healthy service tasks.
@@ -38,7 +38,7 @@ $ docker service inspect myservice
3838
###External Load Balancing (Docker Routing Mesh)
3939
You can expose services externally by using the `--publish` flag when creating or updating the service. Publishing ports in Docker Swarm mode means that every node in your cluster will be listening on that port. But what happens if the service's task isn't on the node that is listening on that port?
4040

41-
This is where routing mesh comes into play. Routing mesh is a new feature in Docker 1.12 that combines `ipvs` and `iptables` to create a powerful cluster-wide transport-layer (L4) load balancer. It allows all the Swarm nodes to accept connections on the services' published ports. When any Swarm node receives traffic destined to the published TCP/UDP port of a running `service`, it forwards it to service's VIP using a pre-defined overlay network called `ingress`. The `ingress` network behaves similarly to other overlay networks but its sole purpose is to transport mesh routing traffic from external clients to cluster services. It uses the same VIP-based internal load balancing as described in the previous section.
41+
This is where routing mesh comes into play. Routing mesh is a feature introduced in Docker 1.12 that combines `ipvs` and `iptables` to create a powerful cluster-wide transport-layer (L4) load balancer. It allows all the Swarm nodes to accept connections on the services' published ports. When any Swarm node receives traffic destined to the published TCP/UDP port of a running `service`, it forwards it to service's VIP using a pre-defined overlay network called `ingress`. The `ingress` network behaves similarly to other overlay networks but its sole purpose is to transport mesh routing traffic from external clients to cluster services. It uses the same VIP-based internal load balancing as described in the previous section.
4242

4343
Once you launch services, you can create an external DNS record for your applications and map it to any or all Docker Swarm nodes. You do not need to worry about where your container is running as all nodes in your cluster look as one with the routing mesh routing feature.
4444

networking/concepts/11-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Docker Swarm comes with integrated PKI. All managers and nodes in the Swarm have
1212

1313
###Securing the Data Plane
1414

15-
In Docker Engine 1.12 Swarm mode the data path (e.g. application traffic) can be encrypted out-of-the-box. This feature uses IPSec tunnels to encrypt network traffic as it leaves the source container and decrypts it as it enters the destination container. This ensure that your application traffic is highly secure when it's in transit regardless of the underlying networks. In a hybrid, multi-tenant, or multi-cloud environment, it is crucial to ensure data is secure as it traverses networks you might not have control over.
15+
In Docker Swarm mode the data path (e.g. application traffic) can be encrypted out-of-the-box. This feature uses IPSec tunnels to encrypt network traffic as it leaves the source container and decrypts it as it enters the destination container. This ensure that your application traffic is highly secure when it's in transit regardless of the underlying networks. In a hybrid, multi-tenant, or multi-cloud environment, it is crucial to ensure data is secure as it traverses networks you might not have control over.
1616

1717
This diagram illustrates how to secure communication between two containers running on different hosts in a Docker Swarm.
1818

networking/img/servicediscovery.png

52.7 KB
Loading

networking/scratch.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ When a new service (container) is created it should be able register itself with
1111
</p>
1212

1313

14-
The mechanisms that provide service discovery and load balancing can take many forms. They can be external service or provided natively within Docker without extra infrastructure. In Docker 1.12 automatic service discovery and load balancing is provided right out of the box by the Docker Engine. A service can be defined and traffic is load balanced via DNS to containers. DNS load balancing is covered later in this guide.
14+
The mechanisms that provide service discovery and load balancing can take many forms. They can be external service or provided natively within Docker without extra infrastructure. In Docker Swarm Mode automatic service discovery and load balancing is provided right out of the box. A service can be defined and traffic is load balanced via DNS to containers. DNS load balancing is covered later in this guide.
1515

1616
External solutions for service discovery and/or load balancing is also possible and may be desired to levarage existing infrastructure or to take advantage of special features. Common external service discovery mechanisms include Consul, etcd, and Zookeeper. Common external load balancers include HAproxy, Nginx, F5, and many more.
1717
<br>

swarm-mode/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Docker Swarm Mode Tutorials
22

3-
[Docker Swarm Mode](https://docs.docker.com/engine/swarm/) is a feature included with Docker Engine 1.12. These tutorials are designed to help you quickly get started testing these new features.
3+
[Docker Swarm Mode](https://docs.docker.com/engine/swarm/) is a feature Docker introduced in 1.12. These tutorials are designed to help you quickly get started testing these new features.
44

55
* [Docker Swarm Mode full tutorial](beginner-tutorial/README.md)
66
* [Service deployment on a swarm in the Cloud](cloud-quick-start/README.md)

swarm-mode/beginner-tutorial/README.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -116,13 +116,13 @@ bxn1iivy8w7faeugpep76w50j worker3 Ready Active
116116
You can also find all your machines by running
117117
```
118118
$ docker-machine ls
119-
NAME ACTIVE DRIVER STATE URL SWARM DOCKER ERRORS
120-
manager1 - virtualbox Running tcp://192.168.99.100:2376 v1.12.1
121-
manager2 - virtualbox Running tcp://192.168.99.101:2376 v1.12.1
122-
manager3 - virtualbox Running tcp://192.168.99.102:2376 v1.12.1
123-
worker1 - virtualbox Running tcp://192.168.99.103:2376 v1.12.1
124-
worker2 - virtualbox Running tcp://192.168.99.104:2376 v1.12.1
125-
worker3 - virtualbox Running tcp://192.168.99.105:2376 v1.12.1
119+
NAME ACTIVE DRIVER STATE URL SWARM DOCKER ERRORS
120+
manager1 - virtualbox Running tcp://192.168.99.100:2376 v17.03.0-ce
121+
manager2 - virtualbox Running tcp://192.168.99.101:2376 v17.03.0-ce
122+
manager3 - virtualbox Running tcp://192.168.99.102:2376 v17.03.0-ce
123+
worker1 - virtualbox Running tcp://192.168.99.103:2376 v17.03.0-ce
124+
worker2 - virtualbox Running tcp://192.168.99.104:2376 v17.03.0-ce
125+
worker3 - virtualbox Running tcp://192.168.99.105:2376 v17.03.0-ce
126126
```
127127

128128
The next step is to create a service and list out the services. This creates a single service called `web` that runs the latest nginx:
@@ -331,7 +331,7 @@ Resources:
331331
Plugins:
332332
Network: bridge, host, null, overlay
333333
Volume: local
334-
Engine Version: 1.12.1
334+
Engine Version: 17.03.0-ce
335335
Engine Labels:
336336
- provider = virtualbox
337337
```

swarm-mode/cloud-quick-start/README.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,6 @@
11
# Service deployment on a swarm in the Cloud
22

3-
Script that create a swarm cluster and deploy a simple service.
4-
Swarm is created with Swarm mode of Engine 1.12. Can be created on
3+
Script that create a swarm cluster and deploy a simple service. The Swarm is created with Swarm mode using Docker 1.12 or higher. Can be created on
54
* Virtualbox
65
* Microsoft Azure
76
* Digitalocean
@@ -86,10 +85,10 @@ List all Docker host created
8685
```
8786
$ docker-machine ls
8887
NAME ACTIVE DRIVER STATE URL SWARM DOCKER ERRORS
89-
manager1 - virtualbox Running tcp://192.168.99.100:2376 v1.12.0-rc2
90-
manager2 - virtualbox Running tcp://192.168.99.101:2376 v1.12.0-rc2
91-
worker1 - virtualbox Running tcp://192.168.99.102:2376 v1.12.0-rc2
92-
worker2 - virtualbox Running tcp://192.168.99.103:2376 v1.12.0-rc2
88+
manager1 - virtualbox Running tcp://192.168.99.100:2376 v17.03.0-ce
89+
manager2 - virtualbox Running tcp://192.168.99.101:2376 v17.03.0-ce
90+
worker1 - virtualbox Running tcp://192.168.99.102:2376 v17.03.0-ce
91+
worker2 - virtualbox Running tcp://192.168.99.103:2376 v17.03.0-ce
9392
```
9493

9594
# Service details

windows/windows-containers/WindowsContainers.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -9,21 +9,21 @@ First, make sure the Docker installation is working:
99
```
1010
> docker version
1111
Client:
12-
Version: 1.12.2
13-
API version: 1.24
14-
Go version: go1.6.3
15-
Git commit: bb80604
16-
Built: Tue Oct 11 05:27:08 2016
12+
Version: 17.03.0-ce
13+
API version: 1.26
14+
Go version: go1.7.5
15+
Git commit: 60ccb22
16+
Built: Thu Feb 23 10:40:59 2017
1717
OS/Arch: windows/amd64
18-
Experimental: true
1918
2019
Server:
21-
Version: 1.12.2-cs2-ws-beta
22-
API version: 1.25
23-
Go version: go1.7.1
24-
Git commit: 050b611
25-
Built: Tue Oct 11 02:35:40 2016
20+
Version: 17.03.0-ce
21+
API version: 1.26 (minimum version 1.24)
22+
Go version: go1.7.5
23+
Git commit: 60ccb22
24+
Built: Thu Feb 23 10:40:59 2017
2625
OS/Arch: windows/amd64
26+
Experimental: true
2727
```
2828

2929
Next, pull a base image that’s compatible with the evaluation build, re-tag it and do a test-run:

0 commit comments

Comments
 (0)