Have you tried restarting docker daemon afterwards?









Best regards,

Radek Gruchalski

ra...@gruchalski.com (mailto:ra...@gruchalski.com)
 
(mailto:ra...@gruchalski.com)
de.linkedin.com/in/radgruchalski/ (http://de.linkedin.com/in/radgruchalski/)

Confidentiality:
This communication is intended for the above-named person and may be 
confidential and/or legally privileged.
If it has come to you in error you must take no action based on it, nor must 
you copy or show it to anyone; please delete/destroy and inform the sender 
immediately.



On Wednesday, 13 April 2016 at 21:53, Alfredo Carneiro wrote:

> Hey Rad,
>  
> Thanks for your answer! I have added theses lines and now looks very similar 
> before.
>  
> iptables -N DOCKER
> iptables -A FORWARD -o docker0 -j DOCKER
> iptables -A FORWARD -o docker0 -m conntrack --ctstate RELATED,ESTABLISHED -j 
> ACCEPT
> iptables -A FORWARD -i docker0 ! -o docker0 -j ACCEPT
> iptables -A FORWARD -i docker0 -o docker0 -j ACCEPT
>  
>  
> However, I am still getting errors.
>  
> docker: Error response from daemon: failed to create endpoint cranky_kilby on 
> network bridge: iptables failed: iptables --wait -t nat -A DOCKER -p tcp -d 
> 0/0 --dport 8080 -j DNAT --to-destination 172.17.0.2:8080 
> (http://172.17.0.2:8080) ! -i docker0: iptables: No chain/target/match by 
> that name.
>  (exit status 1).
>  
>  
> This is my iptables -L output:
>  
> Chain FORWARD (policy DROP)
> target     prot opt source               destination          
> DOCKER     all  --  anywhere             anywhere             
> ACCEPT     all  --  anywhere             anywhere             ctstate 
> RELATED,ESTABLISHED
> ACCEPT     all  --  anywhere             anywhere             
> ACCEPT     all  --  anywhere             anywhere             
>  
> Chain OUTPUT (policy ACCEPT)
> target     prot opt source               destination          
> ACCEPT     all  --  anywhere             anywhere             
>  
> Chain DOCKER (1 references)
> target     prot opt source               destination
>  
>  
> I hid the INPUT chain because is very big!
>  
> Best Regards,
>  
> On Wed, Apr 13, 2016 at 4:29 PM, Rad Gruchalski <ra...@gruchalski.com 
> (mailto:ra...@gruchalski.com)> wrote:
> > Hi Alfredo,  
> >  
> > The only thing you need is:
> >  
> > -A FORWARD -o docker0 -j DOCKER
> > -A FORWARD -o docker0 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
> > -A FORWARD -i docker0 ! -o docker0 -j ACCEPT
> > -A FORWARD -i docker0 -o docker0 -j ACCEPT
> >  
> >  
> >  
> >  
> >  
> >  
> >  
> >  
> >  
> >  
> >  
> > Best regards,

> > Radek Gruchalski
> > 
ra...@gruchalski.com (mailto:ra...@gruchalski.com)
 
> > (mailto:ra...@gruchalski.com)
> > de.linkedin.com/in/radgruchalski/ (http://de.linkedin.com/in/radgruchalski/)
> >  
> > Confidentiality:
> > This communication is intended for the above-named person and may be 
> > confidential and/or legally privileged.
> > If it has come to you in error you must take no action based on it, nor 
> > must you copy or show it to anyone; please delete/destroy and inform the 
> > sender immediately.
> >  
> >  
> >  
> > On Wednesday, 13 April 2016 at 21:27, Alfredo Carneiro wrote:
> >  
> > > Hello guys,
> > >  
> > > I don't know if that is the right place to ask. So, since we use public 
> > > cloud, we are trying to hardening our servers allowing traffic just from 
> > > our subnetworks. However, when I tried to implement some iptables rules I 
> > > got problems with Docker, which couldn't find its chain anymore.
> > >  
> > > Then, I am wondering if anyone has ever implemented any iptables rule in 
> > > this scenario.
> > >  
> > > I've seen this[1] "tip", however, I think that it is not apply to this 
> > > case, because it is very "static".
> > >  
> > > [1] - https://fralef.me/docker-and-iptables.html
> > >  
> > > Best Regards,
> > >  
> > > --  
> > > Alfredo Miranda  
> >  
>  
>  
>  
> --  
> Alfredo Miranda  

Reply via email to