Troubleshooting Docker Container Connections to AWS RDS
Problem Description
Some users may encounter connection timeouts when Docker containers try to connect to AWS RDS instances. This typically manifests as timeout errors in application logs:
psql: error: connection to server at "[rds-endpoint]" ([ip-address]), port 5432 failed: Connection timed out
Is the server running on that host and accepting TCP/IP connections?
This issue commonly occurs when Docker's network configuration prevents containers from properly establishing connections to external services.
Root Cause
The issue is related to IP masquerading (NAT) not being properly enabled for Docker containers, preventing them from connecting to external services like RDS databases.
Why IP Masquerading Is Necessary
Docker containers on a bridge network receive private IP addresses (typically in ranges like 192.168.0.0/24). For these containers to communicate with external services:
IP masquerading is required to modify the source IP address of outgoing packets
When a container sends traffic to an external service, the packet's source address must be changed from the container's private IP to the host's IP
When the external service responds, the host receives the response and forwards it to the appropriate container
Without IP masquerading:
Packets from containers maintain their private source IP addresses when leaving the host
External services cannot route responses back to these private IPs
Connection attempts timeout because response packets never reach the container
Diagnosis Steps
Verify that your host machine can connect to the RDS instance:
telnet your-rds-endpoint.region.rds.amazonaws.com 5432
If you see "Connected to...", then your host has network connectivity to RDS.
Check your Docker daemon configuration:
cat /etc/docker/daemon.json
Inspect your Docker bridge network settings:
sudo docker network inspect bridge
Check if
"com.docker.network.bridge.enable_ip_masquerade"
is set to"false"
.
Solution
Enable IP masquerading in Docker by updating the daemon configuration:
Edit the Docker daemon configuration:
sudo nano /etc/docker/daemon.json
Modify the configuration to enable IP masquerading:
{ "iptables": true, "ip-masq": true, "default-address-pools": [ { "base": "192.168.0.0/16", "size": 24 } ] }
Save the file and restart Docker:
sudo systemctl restart docker
Restart your containers:
sudo docker restart your-container-id
Verification
After implementing the solution, verify the connection:
Restart your container
Check the container logs for successful database connections
For direct testing, you can exec into the container and try connecting to RDS:
sudo docker exec -it your-container-id bash psql -h your-rds-endpoint.region.rds.amazonaws.com -U username -d dbname
Security Considerations
The
"ip-masq": true
setting is generally safe and ensures proper NAT for container trafficThis setting only affects how container traffic appears to external services and doesn't compromise container isolation