docker-03.docker container management

1. Details of docker common commands 1.1 docker info Containers: 3 Number of containers Running: 2 Number of containers running Paused: 0 Suspended docker Number Stopped: 1 Stopped docker Number Images: 15 Mirror number Server Version: 17.03.3-ce docker Edition Storage Driver: overlay Storage drive ...

Posted by adslworld.net on Sun, 23 Feb 2020 03:48:41 -0800

Ingress-nginx deployment use for Kubernetes

Blog Outline:Introduction to Ingress1) Ingress Composition2) How Ingress works3) What can Ingress solve?Configuring Ingress-nginx1) Build registry private warehouse2) Create a Pod for testing2) Create tomcat services and their services3) Ensure that the above resource objects are successfully created4) Create Ingress-controller resource objec ...

Posted by phertzog on Sat, 22 Feb 2020 09:47:47 -0800

Windows play Kubernetes series 4-build K8S Dashboard

Download official yaml file The latest configuration file v2.0.0-beta 8, recommended.yaml, UI address wget https://raw.githubusercontent.com/kubernetes/dashboard/v2.0.0-beta8/aio/deploy/recommended.yaml Original document: kind: Service apiVersion: v1 metadata: labels: k8s-app: kubernetes-dashboard name: kubernetes-dashboard namespace: ...

Posted by and1c on Fri, 21 Feb 2020 06:56:51 -0800

alpine of Docker customizes alicloud image

Article directory Introduction to alpine Linux Making JDK8 image based on alpine 1. Making jdk image by alpine 2. Create and edit dockerfile 3. Execute dockerfile to create image 4. Create and start the container 5. Enter the container 6. test jdk 2. Alpine makes jre image (slimming) Minimum JRE b ...

Posted by angrytuna on Fri, 21 Feb 2020 03:34:39 -0800

Docker installs Logstash and connects to Elasticsearch

1. Pull the Logstash image (keep consistent with ES version) docker pull logstash:7.5.1 2. Start the container docker run --name logstash -d -p 5044:5044 --net esnet 8b94897b4254 The network set by -- net in the command should be consistent with ES and kibana 3. Modify Logstash configuration file // 0.0.0.0: allow any IP access http.host: "0.0 ...

Posted by olivarespablo on Wed, 19 Feb 2020 08:42:59 -0800

CentOS7 installation and operation Docker

1. Confirm kernel version CentOS7 kernel is generally 3.10, which meets the installation conditions (> = 3.8) uname -r //perhaps uname -a 2. update pack yum unpdate -y This process may be a little slow. If there is a higher version of kernel, it will update back to 3.10 View the current default kernel grub2-editenv list Changed to newer k ...

Posted by jameslloyd on Wed, 19 Feb 2020 06:38:38 -0800

Notes: Docker, Dockerfile Foundation

Article directory Basic concepts of Docker Docker installation Frequently used commands Container operation example Docker mirror image Docker container data volume Dockerfile Dockerfile architecture (reserved word instruction) Example of Docker installing mysql Push the local image to alicloud ...

Posted by kanenas.net on Wed, 19 Feb 2020 02:27:08 -0800

6, spring boot tutorial -- integrating swagger

spring boot tutorial -- integrating swagger 1, About swagger 2. How to use swagger 1. Introduce the jar package of swagger 2. Write swagger configuration class 3. Code in controller 3, Operation effect 1, About swagger Swagger is a standardized and complete framework for generating, describing ...

Posted by geetakhurana on Wed, 19 Feb 2020 02:04:24 -0800

docker builds the front and back end separation project to deploy https to the Internet server through Nginx

1: Project preparation: 1. Install docker and docker compose (the project is deployed through docker) 2. The project can be deployed successfully in the Intranet 3. Write docker compose file and log in docker Two: Implementation 1. Docker compose create; docker compose start start project 2. P ...

Posted by jdiver on Wed, 19 Feb 2020 00:07:55 -0800

Secret and ConfigMap for Kubernetes Data Persistence

ConfigMap and Secret are two special types of storage volumes in Kubernetes. ConfigMap is a resource object mainly used to provide configuration data to customize program behavior. However, some sensitive configuration information, such as user name, password, key and so on, are usually configured by a resource object such as Secret, which sto ...

Posted by mattlatos on Fri, 14 Feb 2020 13:11:59 -0800