Activate Cloud Shell
Cloud Shell is a virtual machine that is loaded with development tools. It offers a persistent 5GB home directory and runs on the Google Cloud. Cloud Shell provides command-line access to your Google Cloud resources.
Click Activate Cloud Shell
at the top of the Google Cloud console.
When you are connected, you are already authenticated, and the project is set to your PROJECT_ID. The output contains a line that declares the PROJECT_ID for this session:
Your Cloud Platform project in this session is set to YOUR_PROJECT_ID
gcloud is the command-line tool for Google Cloud. It comes pre-installed on Cloud Shell and supports tab-completion.
- (Optional) You can list the active account name with this command:
gcloud auth list
Click Authorize.
Your output should now look like this:
Output:
ACTIVE: *
ACCOUNT: student-01-xxxxxxxxxxxx@qwiklabs.net
To set the active account, run:
$ gcloud config set account `ACCOUNT`
- (Optional) You can list the project ID with this command:
gcloud config list project
Output:
[core]
project = <project_ID>
Example output:
[core]
project = qwiklabs-gcp-44776a13dea667a6
Note: For full documentation of gcloud, in Google Cloud, refer to the gcloud CLI overview guide.
Overview
This lab provides a practical exploration of Docker networking. You will learn how containers communicate with each other and the outside world using various networking modes. You'll also learn how to create custom networks and control container communication. We will use Artifact Registry to host the container images used in this lab.
Task 1. Setting up the Environment
In this task, you will configure your environment and pull the necessary images from Artifact Registry.
- Set your Project ID is:
qwiklabs-gcp-00-192ff2ed31f3
gcloud config set project qwiklabs-gcp-00-192ff2ed31f3
Note:
This command sets your active project identity.
- Set your default region to
us-west1
gcloud config set compute/region us-west1
Note:
This command sets your active compute region.
- Enable the Artifact Registry API.
gcloud services enable artifactregistry.googleapis.com
Note:
Enables the Artifact Registry service.
- Create a Docker repository in Artifact Registry. Replace
lab-registrywith a name for your repository. It must be unique within the specified region.
gcloud artifacts repositories create lab-registry --repository-format=docker --location=us-west1 --description="Docker repository"
Note:
Creates a Docker repository in Artifact Registry.
- Configure Docker to authenticate with Artifact Registry.
gcloud auth configure-docker us-west1-docker.pkg.dev
Note:
This command configures Docker to use your Google Cloud credentials for authentication with Artifact Registry.
- Pull the
alpine/curlimage from Docker Hub and tag it for your Artifact Registry.
docker pull alpine/curl && docker tag alpine/curl us-west1-docker.pkg.dev/qwiklabs-gcp-00-192ff2ed31f3/lab-registry/alpine-curl:latest
Note:
This will pull the image from docker hub and tag it for Artifact Registry.
- Push the
alpine/curlimage to Artifact Registry.
docker push us-west1-docker.pkg.dev/qwiklabs-gcp-00-192ff2ed31f3/lab-registry/alpine-curl:latest
strong>Note:
This command pushes the tagged image to your Artifact Registry repository.
- Pull the
nginx:latestimage from Docker Hub and tag it for your Artifact Registry.
docker pull nginx:latest && docker tag nginx:latest us-west1-docker.pkg.dev/qwiklabs-gcp-00-192ff2ed31f3/lab-registry/nginx:latest
Note:
This will pull the image from docker hub and tag it for Artifact Registry.
- Push the
nginx:latestimage to Artifact Registry.
docker push us-west1-docker.pkg.dev/qwiklabs-gcp-00-192ff2ed31f3/lab-registry/nginx:latest
Note:
This command pushes the tagged image to your Artifact Registry repository.
Task 2. Exploring Default Bridge Network
This task explores the default bridge network Docker creates. You will run containers and observe their communication within this network.
- Run container1 using the
alpine/curlimage.
docker run -d --name container1 us-west1-docker.pkg.dev/qwiklabs-gcp-00-192ff2ed31f3/lab-registry/alpine-curl:latest sleep infinity
- Run container2 using the
alpine/curlimage.
docker run -d --name container2 us-west1-docker.pkg.dev/qwiklabs-gcp-00-192ff2ed31f3/lab-registry/alpine-curl:latest sleep infinity
Note:
This starts two containers in detached mode. The sleep infinity command keeps the containers running.
- Inspect the default bridge network.
docker network inspect bridge
Note:
This shows details of the bridge network, including connected containers and IP addresses.
- From
container1, pingcontainer2using its name. Note that Docker uses embedded DNS for name resolution within the default bridge network.
docker exec -it container1 ping container2
Note:
This executes the ping command within container1, targeting container2. The standard bridge network does not provide DNS resolution, so ping command cannot use the container name.
- Stop container2 from runnning.
docker stop container2 && docker rm container2
- Restart
container2running as an HTTP server.
docker run -d --name container2 -p 8080:80 us-west1-docker.pkg.dev/qwiklabs-gcp-00-192ff2ed31f3/lab-registry/nginx:latest
Note:
Start a new container2 running nginx and exposing port 8080.
- From
container1, usecurlto make an HTTP request tocontainer2.
docker exec -it container1 curl container2:8080
Note:
Send a curl request from container1 to container2 on port 8080. The standard bridge network does not provide DNS resolution, so curl command cannot use the container name.
Task 3. Creating and Using Custom Networks
This task demonstrates how to create a custom network which supports DNS and connect containers to it, providing more control over network configuration.
- Create a new network named
my-net.
docker network create my-net
Note:
Creates a new Docker network named my-net.
- Run container 3 connecting it to the
my-netnetwork.
docker run -d --name container3 --network my-net us-west1-docker.pkg.dev/qwiklabs-gcp-00-192ff2ed31f3/lab-registry/alpine-curl:latest sleep infinity
- Run container 4 connecting it to the
my-netnetwork.
docker run -d --name container4 --network my-net us-west1-docker.pkg.dev/qwiklabs-gcp-00-192ff2ed31f3/lab-registry/alpine-curl:latest sleep infinity
Note:
Starts two containers connected to the my-net network.
- Inspect the
my-netnetwork to see the connected containers and their IP addresses.
docker network inspect my-net
Note:
Displays details about the my-net network.
- From
container3, pingcontainer4using its name. Name resolution works within custom networks as well.
docker exec -it container3 ping container4
Note:
Tests connectivity between containers within my-net.
- Stop the active container 4 from running.
docker stop container4 && docker rm container4
- Restart container 4.
docker run -d --name container4 --network my-net -p 8081:80 us-west1-docker.pkg.dev/qwiklabs-gcp-00-192ff2ed31f3/lab-registry/nginx:latest
- Run an
nginxcontainer onmy-netand test connectivity.
docker exec -it container3 curl container4:80
Note:
Starts an nginx container on my-net.
- Stop the active container 4 from running.
docker stop container4 && docker rm container4
Task 4. Publishing Ports and Accessing Containers from the Host
Learn how to publish container ports and access containerized services from the host machine.
- Run an
nginxcontainer, publishing port 80 to the host's port 8080.
docker run -d --name container4 -p 8080:80 us-west1-docker.pkg.dev/qwiklabs-gcp-00-192ff2ed31f3/lab-registry/nginx:latest
Note:
Publishes port 80 of the container to port 8080 on the host.
- Access the
nginxservice from the host machine usingcurl.
curl localhost:8080
Note:
This command sends an HTTP request to the published port on the host machine.
- Use
docker portto check the port mapping.
docker port container4 80
Note:
This command shows the mapping for port 80 of the container.
Task 5. Cleaning Up
Remove the created containers and networks.
- Stop all containers.
docker stop container1 container2 container3 container4
- Remove all containers.
docker rm container1 container2 container3 container4
Note:
This stops and removes the containers created in the previous steps.
- Remove the
my-netnetwork.
docker network rm my-net
Note:
This removes the custom network.
Solution of Lab


