Estimated reading time: 17 minutesYou are viewing docs for legacy standalone Swarm. These topics describe standalone Docker Swarm. If you use Docker 1.12 or higher, Swarm mode is integrated with Docker Engine. Most users should use integrated Swarm mode — a good place to start is Getting started with swarm mode and Swarm mode CLI commands. Standalone Docker Swarm is not integrated into the Docker Engine API and CLI commands.
In this procedure you create a two-node Swarm cluster, a Docker Engine CLI, a
Swarm Manager, and a Certificate Authority as shown below. All the Docker Engine
hosts (client, swarm, node1, and node2) have a copy of the
CA’s certificate as well as their own key-pair signed by the CA.

You will complete the following steps in this procedure:
The article includes steps to create your own CA using OpenSSL. This is similar
to operating your own internal corporate CA and PKI. However, this must not
be used as a guide to building a production-worthy internal CA and PKI. These
steps are included for demonstration purposes only - so that readers without
access to an existing CA and set of certificates can follow along and configure
Docker Swarm to use TLS.
To complete this procedure you must stand up 5 (five) Linux servers. These servers can be any mix of physical and virtual servers; they may be on premises or in the public cloud. The following table lists each server name and its purpose.
| Server name | Description | 
|---|---|
ca | 
      Acts as the Certificate Authority (CA) server. | 
swarm | 
      Acts as the Swarm Manager. | 
node1 | 
      Act as a Swarm node. | 
node2 | 
      Act as a Swarm node. | 
client | 
      Acts as a remote Docker Engine client | 
Make sure that you have SSH access to all 5 servers and that they can communicate with each other using DNS name resolution. In particular:
You can choose different ports if these are already in use. This example assumes you use these ports though.
Each server must run an operating system compatible with Docker Engine. For simplicity, the steps that follow assume all servers are running Ubuntu 14.04 LTS.
Note:If you already have access to a CA and certificates, and are comfortable working with them, you should skip this step and go to the next.
In this step, you configure a Linux server as a CA. You use this CA to create
and sign keys. This step included so that readers without access to an existing
CA (external or corporate) and certificates can follow along and complete the
later steps that require installing and using certificates. It is not
intended as a model for how to deploy production-worthy CA.
Logon to the terminal of your CA server and elevate to root.
$ sudo su
    Create a private key called ca-priv-key.pem for the CA:
# openssl genrsa -out ca-priv-key.pem 2048
Generating RSA private key, 2048 bit long modulus
...........................................................+++
.....+++
e is 65537 (0x10001)
    Create a public key called ca.pem for the CA.
The public key is based on the private key created in the previous step.
# openssl req -config /usr/lib/ssl/openssl.cnf -new -key ca-priv-key.pem -x509 -days 1825 -out ca.pem
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:US
<output truncated>
    You have now configured a CA server with a public and private keypair. You can inspect the contents of each key. To inspect the private key:
# openssl rsa -in ca-priv-key.pem -noout -text
To inspect the public key (cert):
# openssl x509 -in ca.pem -noout -text
The following command shows the partial contents of the CA’s public key.
# openssl x509 -in ca.pem -noout -text
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number: 17432010264024107661 (0xf1eaf0f9f41eca8d)
    Signature Algorithm: sha256WithRSAEncryption
        Issuer: C=US, ST=CA, L=Sanfrancisco, O=Docker Inc
        Validity
            Not Before: Jan 16 18:28:12 2016 GMT
            Not After : Jan 13 18:28:12 2026 GMT
        Subject: C=US, ST=CA, L=San Francisco, O=Docker Inc
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
                Public-Key: (2048 bit)
                Modulus:
                    00:d1:fe:6e:55:d4:93:fc:c9:8a:04:07:2d:ba:f0:
                    55:97:c5:2c:f5:d7:1d:6a:9b:f0:f0:55:6c:5d:90:
<output truncated>
Later, you’ll use this to certificate to sign keys for other servers in the infrastructure.
Now that you have a working CA, you need to create key pairs for the Swarm Manager, Swarm nodes, and remote Docker Engine client. The commands and process to create key pairs is identical for all servers. You’ll create the following keys:
| Key | Description | 
|---|---|
ca-priv-key.pem | 
      The CA’s private key and must be kept secure. It is used later to sign new keys for the other nodes in the environment. Together with the ca.pem file, this makes up the CA’s key pair. | 
    
ca.pem | 
      The CA’s public key (also called certificate). This is installed on all nodes in the environment so that all nodes trust certificates signed by the CA. Together with the ca-priv-key.pem file, this makes up the CA’s key pair. | 
    
NODE_NAME.csr | 
      A certificate signing request (CSR). A CSR is effectively an application to the CA to create a new key pair for a particular node. The CA takes the information provided in the CSR and generates the public and private key pair for that node. | 
NODE_NAME-priv-key.pem | 
      A private key signed by the CA. The node uses this key to authenticate itself with remote Docker Engines. Together with the NODE_NAME-cert.pem file, this makes up a node’s key pair. | 
    
NODE_NAME-cert.pem | 
      A certificate signed by the CA. This is not used in this example. Together with the NODE_NAME-priv-key.pem file, this makes up a node’s key pair. | 
    
The commands below show how to create keys for all of your nodes. You perform this procedure in a working directory located on your CA server.
Logon to the terminal of your CA server and elevate to root.
$ sudo su
    Create a private key swarm-priv-key.pem for your Swarm Manager
# openssl genrsa -out swarm-priv-key.pem 2048
Generating RSA private key, 2048 bit long modulus
............................................................+++
........+++
e is 65537 (0x10001)
    Generate a certificate signing request (CSR) swarm.csr using the private key you create in the previous step.
# openssl req -subj "/CN=swarm" -new -key swarm-priv-key.pem -out swarm.csr
    Remember, this is only for demonstration purposes. The process to create a CSR will be slightly different in real-world production environments.
Create the certificate swarm-cert.pem based on the CSR created in the previous step.
# openssl x509 -req -days 1825 -in swarm.csr -CA ca.pem -CAkey ca-priv-key.pem -CAcreateserial -out swarm-cert.pem -extensions v3_req -extfile /usr/lib/ssl/openssl.cnf
<snip>
# openssl rsa -in swarm-priv-key.pem -out swarm-priv-key.pem
    You now have a keypair for the Swarm Manager.
Repeat the steps above for the remaining nodes in your infrastructure (node1, node2, and client).
Remember to replace the swarm specific values with the values relevant to the node you are creating the key pair for.
| Server name | Private key | CSR | Certificate | 
|---|---|---|---|
node1 | 
          node1-priv-key.pem | 
          node1.csr | 
          node1-cert.pem | 
        
node2 | 
          node2-priv-key.pem | 
          node2.csr | 
          node2-cert.pem | 
        
client | 
          client-priv-key.pem | 
          client.csr | 
          client-cert.pem | 
        
Verify that your working directory contains the following files:
# ls -l
total 64
-rw-r--r-- 1 root   root   1679 Jan 16 18:27 ca-priv-key.pem
-rw-r--r-- 1 root   root   1229 Jan 16 18:28 ca.pem
-rw-r--r-- 1 root   root     17 Jan 18 09:56 ca.srl
-rw-r--r-- 1 root   root   1086 Jan 18 09:56 client-cert.pem
-rw-r--r-- 1 root   root    887 Jan 18 09:55 client.csr
-rw-r--r-- 1 root   root   1679 Jan 18 09:56 client-priv-key.pem
-rw-r--r-- 1 root   root   1082 Jan 18 09:44 node1-cert.pem
-rw-r--r-- 1 root   root    887 Jan 18 09:43 node1.csr
-rw-r--r-- 1 root   root   1675 Jan 18 09:44 node1-priv-key.pem
-rw-r--r-- 1 root   root   1082 Jan 18 09:49 node2-cert.pem
-rw-r--r-- 1 root   root    887 Jan 18 09:49 node2.csr
-rw-r--r-- 1 root   root   1675 Jan 18 09:49 node2-priv-key.pem
-rw-r--r-- 1 root   root   1082 Jan 18 09:42 swarm-cert.pem
-rw-r--r-- 1 root   root    887 Jan 18 09:41 swarm.csr
-rw-r--r-- 1 root   root   1679 Jan 18 09:42 swarm-priv-key.pem
    You can inspect the contents of each of the keys. To inspect a private key:
openssl rsa -in <key-name> -noout -text
To inspect a public key (cert):
openssl x509 -in <key-name> -noout -text
The following commands shows the partial contents of the Swarm Manager’s public
 swarm-cert.pem key.
# openssl x509 -in ca.pem -noout -text
Certificate:
Data:
    Version: 3 (0x2)
    Serial Number: 9590646456311914051 (0x8518d2237ad49e43)
Signature Algorithm: sha256WithRSAEncryption
    Issuer: C=US, ST=CA, L=Sanfrancisco, O=Docker Inc
    Validity
        Not Before: Jan 18 09:42:16 2016 GMT
        Not After : Jan 15 09:42:16 2026 GMT
    Subject: CN=swarm
<output truncated>
In this step, you install the keys on the relevant servers in the infrastructure. Each server needs three files:
ca.pem)The procedure below shows you how to copy these files from the CA server to each
server using scp. As part of the copy procedure, you’ll rename each file as
follows on each node:
| Original name | Copied name | 
|---|---|
ca.pem | 
      ca.pem | 
    
<server>-cert.pem | 
      cert.pem | 
    
<server>-priv-key.pem | 
      key.pem | 
    
Logon to the terminal of your CA server and elevate to root.
$ sudo su
    Create a ~/.certs directory on the Swarm manager. Here we assume user account is ubuntu.
$ ssh ubuntu@swarm 'mkdir -p /home/ubuntu/.certs'
    Copy the keys from the CA to the Swarm Manager server.
$ scp ./ca.pem ubuntu@swarm:/home/ubuntu/.certs/ca.pem
$ scp ./swarm-cert.pem ubuntu@swarm:/home/ubuntu/.certs/cert.pem
$ scp ./swarm-priv-key.pem ubuntu@swarm:/home/ubuntu/.certs/key.pem
    Note: You may need to provide authentication for the
scpcommands to work. For example, AWS EC2 instances use certificate-based authentication. To copy the files to an EC2 instance associated with a public key callednigel.pem, modify thescpcommand as follows:scp -i /path/to/nigel.pem ./ca.pem ubuntu@swarm:/home/ubuntu/.certs/ca.pem.
Repeat step 2 for each remaining server in the infrastructure.
node1node2clientVerify your work.
When the copying is complete, each machine should have the following keys.

Each node in your infrastructure should have the following files in the
/home/ubuntu/.certs/ directory:
# ls -l /home/ubuntu/.certs/
total 16
-rw-r--r-- 1 ubuntu ubuntu 1229 Jan 18 10:03 ca.pem
-rw-r--r-- 1 ubuntu ubuntu 1082 Jan 18 10:06 cert.pem
-rw-r--r-- 1 ubuntu ubuntu 1679 Jan 18 10:06 key.pem
    In the last step, you created and installed the necessary keys on each of your Swarm nodes. In this step, you configure them to listen on the network and only accept connections using TLS. Once you complete this step, your Swarm nodes will listen on TCP port 2376, and only accept connections using TLS.
On node1 and node2 (your Swarm nodes), do the following:
Open a terminal on node1 and elevate to root.
$ sudo su
    Edit Docker Engine configuration file.
If you are following along with these instructions and using Ubuntu 14.04
 LTS, the configuration file is /etc/default/docker. The Docker Engine
 configuration file may be different depending on the Linux distribution you
 are using.
Add the following options to the DOCKER_OPTS line.
  -H tcp://0.0.0.0:2376 --tlsverify --tlscacert=/home/ubuntu/.certs/ca.pem --tlscert=/home/ubuntu/.certs/cert.pem --tlskey=/home/ubuntu/.certs/key.pem
    Restart the Docker Engine daemon.
  $ service docker restart
    Repeat the procedure on node2 as well.
Next create a Swarm cluster. In this procedure you create a two-node Swarm cluster using the default hosted discovery backend. The default hosted discovery backend uses Docker Hub and is not recommended for production use.
Logon to the terminal of your Swarm manager node.
Create the cluster and export it’s unique ID to the TOKEN environment variable.
 $ sudo export TOKEN=$(docker run --rm swarm create)
 Unable to find image 'swarm:latest' locally
 latest: Pulling from library/swarm
 d681c900c6e3: Pulling fs layer
 <snip>
 986340ab62f0: Pull complete
 a9975e2cc0a3: Pull complete
 Digest: sha256:c21fd414b0488637b1f05f13a59b032a3f9da5d818d31da1a4ca98a84c0c781b
 Status: Downloaded newer image for swarm:latest
    Join node1 to the cluster.
Be sure to specify TCP port 2376 and not 2375.
 $ sudo docker run -d swarm join --addr=node1:2376 token://$TOKEN
 7bacc98536ed6b4200825ff6f4004940eb2cec891e1df71c6bbf20157c5f9761
    Join node2 to the cluster.
 $ sudo docker run -d swarm join --addr=node2:2376 token://$TOKEN
 db3f49d397bad957202e91f0679ff84f526e74d6c5bf1b6734d834f5edcbca6c
    Launch a new container with TLS enables
 $ docker run -d -p 3376:3376 -v /home/ubuntu/.certs:/certs:ro swarm manage --tlsverify --tlscacert=/certs/ca.pem --tlscert=/certs/cert.pem --tlskey=/certs/key.pem --host=0.0.0.0:3376 token://$TOKEN
    The command above launches a new container based on the swarm image
 and it maps port 3376 on the server to port 3376 inside the
 container. This mapping ensures that Docker Engine commands sent to the host
 on port 3376 are passed on to port 3376 inside the container. The
 container runs the Swarm manage process with the --tlsverify,
 --tlscacert, --tlscert and --tlskey options specified. These options
 force TLS verification and specify the location of the Swarm manager’s TLS
 keys.
Run a docker ps command to verify that your Swarm manager container is up
and running.
 $ docker ps
 CONTAINER ID   IMAGE               COMMAND                  CREATED          STATUS          PORTS                              NAMES
 035dbf57b26e   swarm               "/swarm manage --tlsv"   7 seconds ago    Up 7 seconds    2375/tcp, 0.0.0.0:3376->3376/tcp   compassionate_lovelace
    Your Swarm cluster is now configured to use TLS.
Now that you have a Swarm cluster built and configured to use TLS, you’ll test that it works with a Docker Engine CLI.
Open a terminal onto your client server.
Issue the docker version command.
When issuing the command, you must pass it the location of the clients certifications.
 $ sudo docker --tlsverify --tlscacert=/home/ubuntu/.certs/ca.pem --tlscert=/home/ubuntu/.certs/cert.pem --tlskey=/home/ubuntu/.certs/key.pem -H swarm:3376 version
 Client:
  Version:      1.9.1
  API version:  1.21
  Go version:   go1.4.2
  Git commit:   a34a1d5
  Built:        Fri Nov 20 13:12:04 UTC 2015
  OS/Arch:      linux/amd64
 Server:
  Version:      swarm/1.0.1
  API version:  1.21
  Go version:   go1.5.2
  Git commit:   744e3a3
  Built:
  OS/Arch:      linux/amd64
    The output above shows the Server version as “swarm/1.0.1”. This means
 that the command was successfully issued against the Swarm manager.
Verify that the same command does not work without TLS.
This time, do not pass your certs to the Swarm manager.
$ sudo docker -H swarm:3376 version
:
 Version:      1.9.1
 API version:  1.21
 Go version:   go1.4.2
 Git commit:   a34a1d5
 Built:        Fri Nov 20 13:12:04 UTC 2015
 OS/Arch:      linux/amd64
Get http://swarm:3376/v1.21/version: malformed HTTP response "\x15\x03\x01\x00\x02\x02".
* Are you trying to connect to a TLS-enabled daemon without TLS?
    The output above shows that the command was rejected by the server. This is because the server (Swarm manager) is configured to only accept connections from authenticated clients using TLS.
You can configure the Engine so that you don’t have to pass the TLS options when
you issue a command. To do this, you’ll configure the Docker Engine host and
TLS settings as defaults on your Docker Engine client.
To do this, you place the client’s keys in your ~/.docker configuration folder. If you have other users on your system using the Engine command line, you’ll need to configure their account’s ~/.docker as well. The procedure below shows how to do this for the ubuntu user on
your Docker Engine client.
Open a terminal onto your client server.
If it doesn’t exist, create a .docker directory in the ubuntu user’s home directory.
$ mkdir /home/ubuntu/.docker
    Copy the Docker Engine client’s keys from /home/ubuntu/.certs to
/home/ubuntu/.docker
$ cp /home/ubuntu/.certs/{ca,cert,key}.pem /home/ubuntu/.docker
    Edit the account’s ~/.bash_profile.
Set the following variables:
| Variable | Description | 
DOCKER_HOST | 
          Sets the Docker host and TCP port to send all Engine commands to. | 
DOCKER_TLS_VERIFY | 
          Tells Engine to use TLS. | 
DOCKER_CERT_PATH | 
          Specifies the location of TLS keys. | 
For example:
export DOCKER_HOST=tcp://swarm:3376
export DOCKER_TLS_VERIFY=1
export DOCKER_CERT_PATH=/home/ubuntu/.docker/
    Save and close the file.
Source the file to pick up the new variables.
$ source ~/.bash_profile
    Verify that the procedure worked by issuing a docker version command
$ docker version
Client:
 Version:      1.9.1
 API version:  1.21
 Go version:   go1.4.2
 Git commit:   a34a1d5
 Built:        Fri Nov 20 13:12:04 UTC 2015
 OS/Arch:      linux/amd64
Server:
 Version:      swarm/1.0.1
 API version:  1.21
 Go version:   go1.5.2
 Git commit:   744e3a3
 Built:
 OS/Arch:      linux/amd64
    The server portion of the output above command shows that your Docker client is issuing commands to the Swarm Manager and using TLS.
Congratulations! You have configured a Docker Swarm cluster to use TLS.
								Feedback? Suggestions? Can't find something in the docs?