JIYIK CN >

Current Location:Home > Learning > OPERATING SYSTEM >

Hosting Docker Internal in Linux

Author:JIYIK Last Updated:2025/03/23 Views:

Docker allows developers to efficiently build, test, and deploy applications by packaging them in standardized units called containers. When working with Docker containers, you may encounter scenarios where you need to connect a container to a host machine.


Linux equivalent to the host.docker.internal command

Docker versions before 18.03 only support the command on Mac and Windows systems host.docker.internal. However, in December 2020, Docker released version 20.10.0, and subsequent versions support using the host.docker.internal command to connect to the host on Linux machines.

According to the Docker documentation, if the host's IP address keeps changing, we can host.docker.internalconnect to the host using , which resolves to the host's internal IP address. However, this should only be used in a development environment.

In Windows and Mac, host.docker.internalit is much easier to connect to the host using . Let's say we want to connect to the MySQL service running on the default port 3606 on the host.

We can use the following command to let the Docker container connect to this service.

Code:

host.docker.internal:3306

On Linux systems, on the other hand, we need to add an extra flag to successfully connect to the host. This is done by docker runadding the --add-host flag next to the command. This only works with Docker versions after 20.10.0.

Code:

$ docker run -d --add-host host.docker.internal:host-gateway new_container

This command adds a new entry to the etc/hosts directory, host.docker.internalmapping to the host gateway. Alternatively, we could have used 172.17.0.1, also known as localhost, which is the gateway address for the default bridge network in Docker.

Docker networking is a broad topic and the commands or methods above can be used in different ways depending on what you want to accomplish.

For reprinting, please send an email to 1244347461@qq.com for approval. After obtaining the author's consent, kindly include the source as a link.

Article URL:

Related Articles

How to decompress x.tar.xz format files under Linux

Publish Date:2025/04/08 Views:186 Category:OPERATING SYSTEM

A lot of software found today is in the tar.xz format, which is a lossless data compression file format that uses the LZMA compression algorithm. Like gzip and bzip2, it supports multiple file compression, but the convention is not to compr

Summary of vim common commands

Publish Date:2025/04/08 Views:115 Category:OPERATING SYSTEM

In Linux, the best editor should be vim. However, the complex commands behind vim's powerful functions also make us daunted. Of course, these commands do not need to be memorized by rote. As long as you practice using vim more, you can reme

Detailed explanation of command return value $? in Linux

Publish Date:2025/04/08 Views:58 Category:OPERATING SYSTEM

? is a special variable. This variable represents the return value of the previous command. That is to say, when we run certain commands, these commands will return a code after running. Generally, if the command is successfully run, the re

Common judgment formulas for Linux script shell

Publish Date:2025/04/08 Views:159 Category:OPERATING SYSTEM

In shell script programming, predicates are often used. There are two ways to use predicates, one is to use test, and the other is to use []. Let's take a look at how to use these two methods through two simple examples. Example 1 # test –

How to use the Linux file remote copy command scp

Publish Date:2025/04/08 Views:151 Category:OPERATING SYSTEM

Scp copies files between two hosts over the network, and the data is encrypted during transmission. Its underlying layer uses ssh for data transmission. And it has the same authentication mechanism and the same security level as ssh. When u

Scan to Read All Tech Tutorials

Social Media
  • https://www.github.com/onmpw
  • qq:1244347461

Recommended

Tags

Scan the Code
Easier Access Tutorial