您好,欢迎来到聚文网。 登录 免费注册
Docker使用手册(影印版)(英文版)

Docker使用手册(影印版)(英文版)

  • 字数: 441
  • 出版社: 东南大学
  • 作者: (英)艾德里安·莫阿特
  • 商品条码: 9787564169015
  • 版次: 1
  • 开本: 16开
  • 页数: 337
  • 出版年份: 2017
  • 印次: 1
定价:¥78 销售价:登录后查看价格  ¥{{selectedSku?.salePrice}} 
库存: {{selectedSku?.stock}} 库存充足
{{item.title}}:
{{its.name}}
精选
内容简介
Docker容器提供了简单、快速和强大的方法来开 发、分发和运行软件,特别是在动态和分布式环境中 。通过这本实用指南,你将了解到为什么容器是如此 重要,你将通过使用Docker。获得什么,以及如何使 它成为你的开发流程中的一部分。 非常适合开发人员、运维工程师和系统管理员— —特别是那些热衷于采用DevOps方法的人员。艾德里 安·莫阿特著的《Docker使用手册(影印版)(英文版) 》将带你从基础开始,到在多主机系统上通过网络和 系统调度运行数十个容器。本书的核心部分将指导你 完成使用Docker开发、测试和部署网络应用程序所需 的步骤。
作者简介
Adrian Mouat是Contalner Solutions的首席科学家。他从事从小型网络应用程序到大规模数据分析软件等各种软件项目的开发工作。
目录
Pretace Part Ⅰ. Background and Basics 1. The What and Why of Containers Containers Versus VMs Docker and Containers Docker: A History Plugins and Plumbing 64-Bit Linux 2. Installation Installing Docker on Linux Run SELinux in Permissive Mode Running Without sudo Installing Docker on Mac OS or Windows A Quick Check 3. First Steps Running Your First Image The Basic Commands Building Images from Dockerfiles Working with Registries Private Repositories Using the Redis Official Image Conclusion 4. Docker Fundamentals The Docker Architecture Underlying Technologies Surrounding Technologies Docker Hosting How Images Get Built The Build Context Image Layers Caching Base Images Dockerfile Instructions Connecting Containers to the World Linking Containers Managing Data with Volumes and Data Containers Sharing Data Data Containers Common Docker Commands The run Command Managing Containers Docker Info Container Info Dealing with Images Using the Registry Conclusion Part Ⅱ. The Software Lifecycle with Docker 5. Using Docker in Development Say "Hello World!" Automating with Compose The Compose Workflow Conclusion 6. Creating a Simple Web App Creating a Basic Web Page Taking Advantage of Existing Images Add Some Caching Microservices Conclusion 7. Image Distribution Image and Repository Naming The Docker Hub Automated Builds Private Distribution Running Your Own Registry Commerical Registries Reducing Image Size Image Provenance Conclusion 8. Continuous Integration and Testing with Docker Adding Unit Tests to Identidock Creating a Jenkins Container Triggering Builds Pushing the Image Responsible Tagging Staging and Production Image Sprawl Using Docker to Provision Jenkins Slaves Backing Up Jenkins Hosted CI Solutions Testing and Microservices Testing in Production Conclusion 9. Deploying Containers Provisioning Resources with Docker Machine Using a Proxy Execution Options Shell Scripts Using a Process Manager (or systemd to Rule Them All) Using a Configuration Management Tool Host Configuration Choosing an OS Choosing a Storage Driver Specialist Hosting Options Triton Google Container Engine Amazon EC2 Container Service Giant Swarm Persistent Data and Production Containers Sharing Secrets Saving Secrets in the Image Passing Secrets in Environment Variables Passing Secrets in Volumes Using a Key-Value Store Networking Production Registry Continuous Deployment/Delivery Conclusion 10. Logging and Monitoring Logging The Default Docker Logging Aggregating Logs Logging with ELK Docker Logging with syslog Grabbing Logs from File Monitoring and Alerting Monitoring with Docker Tools cAdvisor Cluster Solutions Commercial Monitoring and Logging Solutions Conclusion Part Ⅲ. Tools and Techniques 11. Networking and Service Discovery Ambassadors Service Discovery etcd SkyDNS Consul Registration Other Solutions Networking Options Bridge Host Container None New Docker Networking Network Types and Plugins Networking Solutions Overlay Weave Flannel Project Calico Conclusion 12. Orchestration, Clustering, and Management Clustering and Orchestration Tools Swarm Fleet Kubernetes Mesos and Marathon Container Management Platforms Rancher Clocker Tutum Conclusion 13. Security and Limiting Containers Things to Worry About Defense-in-Depth Least Privilege Securing Identidock Segregate Containers by Host Applying Updates Avoid Unsupported Drivers Image Provenance Docker Digests Docker Content Trust Reproducible and Trustworthy Dockerfiles Security Tips Set a User Limit Container Networking Remove Setuid/Setgid Binaries Limit Memory Limit CPU Limit Restarts Limit Filesystems Limit Capabilities Apply Resource Limits (ulimits) Run a Hardened Kernel Linux Security Modules SELinux AppArmor Auditing Incident Response Future Features Conclusion Index

蜀ICP备2024047804号

Copyright 版权所有 © jvwen.com 聚文网