Because the service needs to be containerized at work, you have recently started to learn Docker-related knowledge, and the commands commonly used for Docker are summarized as follows:1. Running the container
$ sudo docker run-i-T Ubuntu/bin/bash
The-I flag guarantees that the stdin in the container is an on-
T flag that tells
is copied to the inside of the container, and the MVC container is set up in entrypoint waiting for MySQL to start.Simply explained, because after using the Docker-compose boot container, we cannot ensure that the MySQL container service has started properly, and if MySQL does not start, then the site is not available. So the container must be executed after the MySQL container is started, and here is the
1 Background 1.1 Docker introductionDocker is a container engine project based on lightweight virtualization technology from Docker, the entire project is based on the go language and complies with the Apache 2.0 protocol. Today, Docker can quickly automate deployment of applications within the container, and can provide container resource isolation and security
NamespaceWe can see the same process, the PID inside and outside the container is different:
Inside the container the PID is 1,ppid is 0.
Outside of the container PID is 2198, PPID is 2179 that is docker-containerd-shim process.
[Email protected]:/home/sammy# ps-ef | grep pythonRoot 2198 2179 0 00:06? 00:00:00 python app.py[Email protected]:/home/sammy# ps-ef | grep 2179Root 2179 765 0 00:06? 00:00:00
Docker installation and sharing of common commands and sharing of common docker commands
Basic commands
1. To install docker in yum, the root permission is required.
Yum install docker
2. Start docker
Systemctl start docker. servi
Docker Quick Start-common docker commands 1. Introduction to docker commands 1. Introduction to docker commands
You can run the sudo docker or sudo docker HELP command to view the docker
in his spare time and is currently preparing for AWS Certification and promotion of Docker-related technologies.
This time the protagonist finally turn to the big whale Docker. I don't know how many people are because Docker knows CoreOS, at least its popularity in the community is actually higher than the COREOS project itself.
Hu bojun explained the reasons for invalid comments in CSS and Hu bojun explained the failure of css.In a webpage automatically generated by Dreamweaver, style sheets in the head are usually in the following format:
An html annotation is automatically added at the beginning and end of the style sheet:
When
This is a low-level error that is easily overlooked. The reason is simple. The comments Syntax of CS
, Docker application scenario is to be played incisively and vividly, if you do not catch up with the ugly and huge enterprise-class applications, Now you can enjoy the short and short service times.Docker noun explanation
Docker is officially explained as a Docker engine, a container technology that combines
1 PrefaceSince its inception, Docker has led the technology boom in lightweight virtualization containers. In this trend, Google, IBM, Redhat and other industry leaders have joined the Docker camp. While Docker is still primarily based on the Linux platform, Microsoft has repeatedly announced support for Docker, from p
compare the files on the host Drdevdb, Find them to be the same!Let's take a look at this picture:In addition to the docker_host we have focused on, there are three additional environment variables. The docker_tls_verify tells the DOCKER client that it needs to enable TLS authentication. DOCKER_CERT_PATH Specifies the directory where TLS validates the dependent files, which is the/HOME/NICK/.DOCKER/MACHINE
123456789Ten - to + - the * $Stroke-width= ' 3 ' rx= ' 5 ' ry= ' 5 'Panax Notoginseng> - the + A [JavaScript svg fill stroke stroke-width x y rect rx ry Property explained] svg fill stroke stroke-width rect draw with rounded rectangle property explained
123456789Ten - to + - the * $Stroke-width= ' 3 ' stroke-opacity = '. 3 ' fill-opacity = '. 9 'Panax Notoginseng>Transparent) Although none is the same as the transparent effect but the mechanism is completely different none is not populated transparent -Is transparent, outlines the stroke as no style = "fill: #09F3C7; stroke: #C7F309;" stroke-opacity = '. 3 ' fill-opacity = '. 9 '-- the + A the[JavaScript svg fill stroke stroke-width points polyline Property
123456789Ten - to + - the * $Stroke-width= ' 3 ' stroke-opacity = '. 3 ' fill-opacity = '. 9 'Panax Notoginseng>Transparent) Although none is the same as the transparent effect but the mechanism is completely different none is not populated transparent -Is transparent, outlines the stroke as no style = "fill: #09F3C7; stroke: #C7F309;" stroke-opacity = '. 3 ' fill-opacity = '. 9 '-- the + a the[javascript svg fill stroke stroke-width x1 y1 x2 y2 line stroke-opacity fill-opacity properties
PID PPID C stime TTY time CMDRoot 1 0 0 16:06? 00:00:00 python app.pyWith regard to the relationship between Containerd,containerd-shim and container, it can be explained in the article:Simply put, it is the Containerd (Docker daemon) that starts Containerd-shim, which then starts Runc,runc and then launches the container, Runc exits after the container is created, and shim as the container's parent proces
collection is still in accordance with the Syslog or other old way, the mirror capacity is very large, the base image can reach 80M, which and Docker The idea was completely different, and the Alpine Linux distribution, as a lightweight Linux environment, was well suited as a docker base image, and Docker also recommended using Alpine instead of Debian as the ba
authentication. DOCKER_CERT_PATH Specifies the directory where TLS validates the dependent files, which is the/HOME/NICK/.DOCKER/MACHINES/KRDEVDB directory that we looked at earlier.At this point, the security issues that beset us are finally explained: Docker machine generates a series of key and digital certificate (*.PEM) files that guarantee security during
authentication. DOCKER_CERT_PATH Specifies the directory where TLS validates the dependent files, which is the/HOME/NICK/.DOCKER/MACHINES/KRDEVDB directory that we looked at earlier.At this point, the security issues that beset us are finally explained: Docker machine generates a series of key and digital certificate (*.PEM) files that guarantee security during
achieving this goal is a running environment called the Docker container, which is actually a LXC (Linux Containers) with a security attribute. Containers are created using Docker images, Docker images can be created manually by tapping commands, or they can be automated through dockerfiles.Note: The basics of Docker
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.