Today in the start of a Docker run Nginx instance, when the directory is mounted, access to the static directory, insufficient permissions
The commands executed are:
Docker run
--name my-nginx
-d-p 80:80
--restart=always
-v/cloud/nginx/webroot:/usr/share/nginx/ HTML:RW
-v/cloud/nginx/log:/var/log/nginx
-v/cloud/nginx/config/nginx.conf:/etc/nginx/nginx.conf:ro -
D Nginx
Description
1. Where/cloud
Reproduced in the process, the picture is missing, the code shows confusion.
For better learning content, please visit the original version:
https://www.missshi.cn/api/view/blog/5a6328110a745f6335000006
Ps: Initial access due to the large JS file, please wait patiently (5s or so)
in the previous article, we briefly introduced some simple practices of the Docker. Next, we'll talk about similar content in this article, but the services deployed with
Why serve something port mapping.
When you start the container, if you do not configure port mappings between the host machine and the virtual machine, the external program cannot access the virtual machine because there is no port.
What is the directive for port mapping.
Docker command: Docker run-p ip:hostPort:containerPort Redis
Use the-p parameter to map the host's port to the virtual machine.IP rep
Execute Docker PS command, appear
"Cannot connect to the Docker daemon at Unix:///var/run/docker.sock. Is the Docker daemon running?
Error
It is now determined that the Docker itself is installed properly.
The problem is because the Docker service did not start, so the
Dockerfike quickly create a custom Docker mirrorA, Table of contents1.docker Typical structure2. Instruction Introduction3. Create Docker Mirrors
Second, the structureThe Dockerfile is divided into four parts: the underlying mirror letter, the maintainer information, the mirroring operation instructions, and the execution instructions when the container starts. F
Docker deployment Environment: CentOS release 6.5 (Final)1. Edit the Docker configuration file because the registry service we started is not secure and trustworthy. So we need to modify the Docker configuration file,[Email protected]]# vim/etc/sysconfig/Dockerother_args="--insecure-registry= 192.168.1.243:5000-h tcp://0.0.0.0:235-h unix:///var/run/docker.sock"2.
The bottom of Docker is a boot file system, Bootfs.The second layer is the root filesystem rootfs, located on the boot file system.In the traditional Linux boot process, the root filesystem is first read-only and is switched to read-write mode when the boot finishes and the integrity check is completed. But in Docker, the root filesystem is always read-only, and Docker
When we set up the Docker cluster, we will solve the problem of how to collect the log Elk provides a complete solution this article mainly introduces the use of Docker to build Elk collect Docker cluster log
Elk Introduction
Elk is made up of three open source tools , Elasticsearch, Logstash and kiabana
Elasticsearch is an open source distributed search eng
1. Docker Container Restart policy
The restart policy for Docker containers is a start-up strategy for production environments that can be ignored during the development process.
Docker container restarts are done by the Docker daemon and are therefore closely related to the daemon process.
The
Docker ~ Docker-compose and dockercompose
Back to directory
Docker-compose is a tool used to define and run complex applications in Docker. For example, to define multiple containers in a yum file, you can use only one line of command to make everything ready and run.
Use dockerComposeWe can solve many practical proble
Tags: ati mys Docker command Nat Col Test Ice requested DockerFirst, the installation of Docker: Check if your own amount is above 3.10, or Centos7 1. Uname-r 2. Install Docker command: Yum -y install docker-io 3. Start the Docker command: Service
Docker container data management and operation tutorial, docker container Data Management
Docker data volumes
What is a data volume?
Features of data volumes
Relationship between data volumes and containers
Add volumes for containers
Add permissions for data volumes
Data Volume container
What is a data volume container?
Structure of the data
Install vim In the docker container, and install vim In the docker container
When using docker containers, sometimes vim is not installed. When you press the vim command, the system prompts vim: command not found. At this time, you need to install vim, however, when you press the apt-get install vim command, the prompt is:
Reading package lists... DoneBuilding
1. Use Ststemctl command
Systemctl Enable Docker
2, move the Docker Docker.service service to the system service
# cp/usr/lib/systemd/system/docker.service/etc/systemd/system/#
systemctl daemon-reload #
Systemctl Restart DockerAfter restarting the Docker, the symbolic link is automatically generated under/etc/systemd/system/multi-user.target.wants
[ro
This is a creation in
Article, where the information may have evolved or changed.
Installing and deploying a private Docker registry is one of the only necessary technologies for introducing, learning and using Docker. Especially when Docker is accepted by the organization and more people, projects and products begin to touch and use
The author briefly introduces Docker machine and its basic usage in the article "Introduction to Docker Machine", but the details are too much to ignore. Like the difference between Docker and Docker machine? And what are the important things that Docker machine does when we
First, Docker introduction
Docker two main components: Docker: Open source container virtualization platform Docker Hub: Docker hub for sharing and managing Docker containers
Docker us
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.