Docker-DCO-1.1-Signed-off-by: John Gardiner Myers <jgmyers@proofpoint.com> (github: johngmyers)
| ... | ... |
@@ -8,7 +8,7 @@ Configure Networking |
| 8 | 8 |
|
| 9 | 9 |
Docker uses Linux bridge capabilities to provide network connectivity |
| 10 | 10 |
to containers. The ``docker0`` bridge interface is managed by Docker |
| 11 |
-itself for this purpose. Thus, when the Docker daemon starts it : |
|
| 11 |
+for this purpose. When the Docker daemon starts it : |
|
| 12 | 12 |
|
| 13 | 13 |
- creates the ``docker0`` bridge if not present |
| 14 | 14 |
- searches for an IP address range which doesn't overlap with an existing route |
| ... | ... |
@@ -34,7 +34,7 @@ At runtime, a :ref:`specific kind of virtual |
| 34 | 34 |
interface<vethxxxx-device>` is given to each container which is then |
| 35 | 35 |
bonded to the ``docker0`` bridge. Each container also receives a |
| 36 | 36 |
dedicated IP address from the same range as ``docker0``. The |
| 37 |
-``docker0`` IP address is then used as the default gateway for the |
|
| 37 |
+``docker0`` IP address is used as the default gateway for the |
|
| 38 | 38 |
container. |
| 39 | 39 |
|
| 40 | 40 |
.. code-block:: bash |
| ... | ... |
@@ -55,8 +55,8 @@ which is dedicated to the 52f811c5d3d6 container. |
| 55 | 55 |
How to use a specific IP address range |
| 56 | 56 |
--------------------------------------- |
| 57 | 57 |
|
| 58 |
-Docker will try hard to find an IP range which is not used by the |
|
| 59 |
-host. Even if it works for most cases, it's not bullet-proof and |
|
| 58 |
+Docker will try hard to find an IP range that is not used by the |
|
| 59 |
+host. Even though it works for most cases, it's not bullet-proof and |
|
| 60 | 60 |
sometimes you need to have more control over the IP addressing scheme. |
| 61 | 61 |
|
| 62 | 62 |
For this purpose, Docker allows you to manage the ``docker0`` bridge |
| ... | ... |
@@ -118,25 +118,25 @@ In this scenario: |
| 118 | 118 |
Container intercommunication |
| 119 | 119 |
------------------------------- |
| 120 | 120 |
|
| 121 |
-Containers can communicate with each other according to the ``icc`` |
|
| 122 |
-parameter value of the Docker daemon. |
|
| 121 |
+The value of the Docker daemon's ``icc`` parameter determines whether |
|
| 122 |
+containers can communicate with each other over the bridge network. |
|
| 123 | 123 |
|
| 124 | 124 |
- The default, ``-icc=true`` allows containers to communicate with each other. |
| 125 | 125 |
- ``-icc=false`` means containers are isolated from each other. |
| 126 | 126 |
|
| 127 |
-Under the hood, ``iptables`` is used by Docker to either accept or |
|
| 127 |
+Docker uses ``iptables`` under the hood to either accept or |
|
| 128 | 128 |
drop communication between containers. |
| 129 | 129 |
|
| 130 | 130 |
|
| 131 | 131 |
.. _vethxxxx-device: |
| 132 | 132 |
|
| 133 |
-What's about the vethXXXX device? |
|
| 133 |
+What is the vethXXXX device? |
|
| 134 | 134 |
----------------------------------- |
| 135 | 135 |
Well. Things get complicated here. |
| 136 | 136 |
|
| 137 | 137 |
The ``vethXXXX`` interface is the host side of a point-to-point link |
| 138 | 138 |
between the host and the corresponding container; the other side of |
| 139 |
-the link being materialized by the container's ``eth0`` |
|
| 139 |
+the link is the container's ``eth0`` |
|
| 140 | 140 |
interface. This pair (host ``vethXXX`` and container ``eth0``) are |
| 141 | 141 |
connected like a tube. Everything that comes in one side will come out |
| 142 | 142 |
the other side. |