moby--moby/libnetwork
Flavio Crisciani f585f33042 Node failure timeout fix
The time to keep a node failed into the failed node list
was originally supposed to be 24h.

If a node leaves explicitly it will be removed from the list of nodes
and put into the leftNodes list. This way the NotifyLeave event won't
insert it into the retry list.
NOTE: if the event is lost instead the behavior will be the same as a failed node.

If a node fails, the NotifyLeave will insert it into the failedNodes
list with a reapTime of 24h. This means that the node will be checked
for 24h before being completely forgot. The current check time is every
1 second and is done by the reconnectNode function.
The failed node list is updated every 2h instead.

Signed-off-by: Flavio Crisciani <flavio.crisciani@docker.com>
2017-05-22 17:19:31 -07:00
..
api
bitseq
client
cluster
cmd
config
datastore
discoverapi
docs
driverapi
drivers Merge pull request #1675 from wenjianhn/forward-top 2017-05-16 22:47:59 -07:00
drvregistry
etchosts
hostdiscovery
idm
ipam
ipamapi
ipams
ipamutils
iptables Add a filter chain to allow persistent rules 2017-05-16 10:24:56 +08:00
ipvs
netlabel
netutils
networkdb Node failure timeout fix 2017-05-22 17:19:31 -07:00
ns
options
osl
portallocator
portmapper
resolvconf
test/integration
testutils
types
vendor
.dockerignore
.gitignore
CHANGELOG.md
Dockerfile.build
LICENSE
MAINTAINERS
Makefile
README.md
ROADMAP.md
Vagrantfile
agent.go
agent.pb.go
agent.proto
circle.yml
controller.go Merge pull request #1762 from aboch/nlo2 2017-05-18 13:09:19 -07:00
default_gateway.go
default_gateway_freebsd.go
default_gateway_linux.go
default_gateway_solaris.go
default_gateway_windows.go
drivers_experimental_linux.go
drivers_freebsd.go
drivers_ipam.go
drivers_linux.go
drivers_solaris.go
drivers_windows.go
endpoint.go
endpoint_cnt.go
endpoint_info.go
endpoint_info_unix.go
endpoint_info_windows.go
error.go
errors_test.go
firewall_linux.go Add a filter chain to allow persistent rules 2017-05-16 10:24:56 +08:00
firewall_others.go Add a filter chain to allow persistent rules 2017-05-16 10:24:56 +08:00
libnetwork_internal_test.go
libnetwork_linux_test.go
libnetwork_test.go
machines
network.go Simplify network scope setting logic 2017-05-18 15:16:48 -07:00
network_unix.go
network_windows.go
resolver.go
resolver_unix.go
resolver_windows.go
sandbox.go
sandbox_dns_unix.go
sandbox_dns_windows.go
sandbox_externalkey.go
sandbox_externalkey_solaris.go
sandbox_externalkey_unix.go
sandbox_externalkey_windows.go
sandbox_store.go
sandbox_test.go
service.go
service_common.go
service_linux.go
service_unsupported.go
service_windows.go
store.go
store_linux_test.go
store_test.go
support.sh
vendor.conf
wrapmake.sh

README.md

libnetwork - networking for containers

Circle CI Coverage Status GoDoc

Libnetwork provides a native Go implementation for connecting containers

The goal of libnetwork is to deliver a robust Container Network Model that provides a consistent programming interface and the required network abstractions for applications.

Design

Please refer to the design for more information.

Using libnetwork

There are many networking solutions available to suit a broad range of use-cases. libnetwork uses a driver / plugin model to support all of these solutions while abstracting the complexity of the driver implementations by exposing a simple and consistent Network Model to users.

func main() {
	if reexec.Init() {
		return
	}

	// Select and configure the network driver
	networkType := "bridge"

	// Create a new controller instance
	driverOptions := options.Generic{}
	genericOption := make(map[string]interface{})
	genericOption[netlabel.GenericData] = driverOptions
	controller, err := libnetwork.New(config.OptionDriverConfig(networkType, genericOption))
	if err != nil {
		log.Fatalf("libnetwork.New: %s", err)
	}

	// Create a network for containers to join.
	// NewNetwork accepts Variadic optional arguments that libnetwork and Drivers can use.
	network, err := controller.NewNetwork(networkType, "network1", "")
	if err != nil {
		log.Fatalf("controller.NewNetwork: %s", err)
	}

	// For each new container: allocate IP and interfaces. The returned network
	// settings will be used for container infos (inspect and such), as well as
	// iptables rules for port publishing. This info is contained or accessible
	// from the returned endpoint.
	ep, err := network.CreateEndpoint("Endpoint1")
	if err != nil {
		log.Fatalf("network.CreateEndpoint: %s", err)
	}

	// Create the sandbox for the container.
	// NewSandbox accepts Variadic optional arguments which libnetwork can use.
	sbx, err := controller.NewSandbox("container1",
		libnetwork.OptionHostname("test"),
		libnetwork.OptionDomainname("docker.io"))
	if err != nil {
		log.Fatalf("controller.NewSandbox: %s", err)
	}

	// A sandbox can join the endpoint via the join api.
	err = ep.Join(sbx)
	if err != nil {
		log.Fatalf("ep.Join: %s", err)
	}

	// libnetwork client can check the endpoint's operational data via the Info() API
	epInfo, err := ep.DriverInfo()
	if err != nil {
		log.Fatalf("ep.DriverInfo: %s", err)
	}

	macAddress, ok := epInfo[netlabel.MacAddress]
	if !ok {
		log.Fatalf("failed to get mac address from endpoint info")
	}

	fmt.Printf("Joined endpoint %s (%s) to sandbox %s (%s)\n", ep.Name(), macAddress, sbx.ContainerID(), sbx.Key())
}

Future

Please refer to roadmap for more information.

Contributing

Want to hack on libnetwork? Docker's contributions guidelines apply.

Code and documentation copyright 2015 Docker, inc. Code released under the Apache 2.0 license. Docs released under Creative commons.