Generic

Generic Create machines using an existing VM/Host with SSH. This is useful if you are using a provider that Machine does not support directly or if you would like to import an existing host to allow Docker Machine to manage. The driver will perform a list of tasks on create: If docker is not running on the host, it will be installed automatically. It will update the host packages (apt-get update, yum update…). It will generate certificates to secure the docker daemon. The docker daemon will be

Amazon Web Services

Amazon Web Services Create machines on Amazon Web Services. To create machines on Amazon Web Services, you must supply two parameters: the AWS Access Key ID and the AWS Secret Access Key. Configuring credentials Before using the amazonec2 driver, ensure that you’ve configured credentials. AWS credential file One way to configure credentials is to use the standard credential file for Amazon AWS ~/.aws/credentials file, which might look like: [default] aws_access_key_id = AKID1234567890 aws_secre

Configuring and running Docker

Configuring and running Docker on various distributions After successfully installing Docker, the docker daemon runs with its default configuration. In a production environment, system administrators typically configure the docker daemon to start and stop according to an organization’s requirements. In most cases, the system administrator configures a process manager such as SysVinit, Upstart, or systemd to manage the docker daemon’s start and stop. Running the docker daemon directly The docker

docker pull

pull Usage: docker pull [OPTIONS] NAME[:TAG] | [REGISTRY_HOST[:REGISTRY_PORT]/]NAME[:TAG] Pull an image or a repository from the registry -a, --all-tags Download all tagged images in the repository --disable-content-trust=true Skip image verification --help Print usage Most of your images will be created on top of a base image from the Docker Hub registry. Docker Hub contains many pre-built images that you can pull and try without needing to defin

docker-machine create

create Create a machine. Requires the --driver flag to indicate which provider (VirtualBox, DigitalOcean, AWS, etc.) the machine should be created on, and an argument to indicate the name of the created machine. $ docker-machine create --driver virtualbox dev Creating CA: /home/username/.docker/machine/certs/ca.pem Creating client certificate: /home/username/.docker/machine/certs/cert.pem Image cache does not exist, creating it at /home/username/.docker/machine/cache... No default boot2docker i

Work with network commands

Work with network commands This article provides examples of the network subcommands you can use to interact with Docker networks and the containers in them. The commands are available through the Docker Engine CLI. These commands are: docker network create docker network connect docker network ls docker network rm docker network disconnect docker network inspect While not required, it is a good idea to read Understanding Docker network before trying the examples in this section. The examples

Remote API

Docker Remote API Docker’s Remote API uses an open schema model. In this model, unknown properties in incoming messages are ignored. Client applications need to take this behavior into account to ensure they do not break when talking to newer Docker daemons. The API tends to be REST, but for some complex commands, like attach or pull, the HTTP connection is hijacked to transport STDOUT, STDIN, and STDERR. By default the Docker daemon listens on unix:///var/run/docker.sock and the client must ha

Networking in Compose

Networking in Compose Note: This document only applies if you’re using version 2 of the Compose file format. Networking features are not supported for version 1 (legacy) Compose files. By default Compose sets up a single network for your app. Each container for a service joins the default network and is both reachable by other containers on that network, and discoverable by them at a hostname identical to the container name. Note: Your app’s network is given a name based on the “project name

Docker security

Docker security There are three major areas to consider when reviewing Docker security: the intrinsic security of the kernel and its support for namespaces and cgroups; the attack surface of the Docker daemon itself; loopholes in the container configuration profile, either by default, or when customized by users. the “hardening” security features of the kernel and how they interact with containers. Kernel namespaces Docker containers are very similar to LXC containers, and they have similar s

Plan for Swarm in production

Plan for Swarm in production This article provides guidance to help you plan, deploy, and manage Docker Swarm clusters in business critical production environments. The following high level topics are covered: Security High Availability Performance Cluster ownership Security There are many aspects to securing a Docker Swarm cluster. This section covers: Authentication using TLS Network access control These topics are not exhaustive. They form part of a wider security architecture that inclu