½Òµ{Àu´f¡I²{¤Z¦P®É³øÅª¥H¤U¨âÓ½Òµ{¡G
§Y´î $340¡I
|
±À¤¶ªA°È¡G½Ò°ó¿ý¼vÀH®ÉÚ» (¦b®aÆ[¬Ý = 0%¡A¦b®ÕÆ[¬Ý = 100%)
¾Çû¨Ï¥Î¹q¸Ü©Î¥»ºô¶³ø¦W¡A«Ý¥»¤¤¤ß½T»{¤w¬°¾Çû¯d¦ì«á¡A§Y¥i¨Ï¥Î
ú¥I¾Ç¶O¡A¹Lµ{²«K¡I
* ¦U¬F©²³¡ªù¥i¨Ï¥Î P Card ¥I´Ú
¦p¨Ï¥Î P Card ú¥I¦Ò¸Õ¶O¡A¦Ò¸Õ¶O»Ý¥t¥[ 1.3% ªþ¥[¶O
ª`·N¡I «È¤á¥²¶·¬d°Ý³øÅª¾Ç®Õªº±Ð¨|§½µù¥U½s¸¹¡A¥H½T»{¸Ó®Õ¬°µù¥U¾Ç®Õ¡A¥H§K»X¨ü¤£¥²nªº·l¥¢¡I

·í§Aªì¨B¾Ç²ß¤F Docker ªº¥\¯à«á¡A³q¹L¶i¤@¨B¤F¸Ñ Docker I«áªº§Þ³N¡A¥i¥H¥O§A§ó©ö´x´¤Ãö©ó Docker ªºÀ³¥Î§Þ¥©¡C¥»½Òµ{°£¤F±´°Q¤@¨Ç Docker I«á§Þ³N¤§¥~¡A¤]·|¤¶²ÐºÞ²z¦h¹L¤@Ó¹B¦æ Docker ªº¥D¾÷®É¡A¥i¥HÀ³¥Îªº§Þ³N¡C
¥»½Òµ{·|¯A¤Îªº§Þ³N¥]¬A¡G
- Ãö©óÀɮרt²Î¤è±¡ADocker ¦p¦ó¥Î ¡§layers¡¨ ¥h«Ø¥ß container ¤Î image ªºÀɮרt²Î¡C³o¼ËªºÀɮרt²Î¦³¬Æ»ò¦n³B¡A¥H¦ÜÀ³¥Î®É¦pªG¹B¥Î³o¨Ç¦n³B¡C

- Ãö©ó±¾¸üÀɮפ象ABind Mount ¤Î Volume ªº¤À§O¡C¦ó®ÉÀ³¹B¥Î¥¦Ì¤Î¦p¦ó¿ï¾Ü¨º¤@Ó¥hÀ³¥Î¡C¥t¥~¤]·|²³æ¤¶²Ð¦p Docker ¶}±Ò¤F¹B¥Î SELinux ®É¡A¹ï±¾¸üÀɮצ³¬Æ»ò¼vÅT¡C

- Ãö©ó°O¿ý (logging) ¤è±¡ADocker ¦p¦ó¨ú±o¨C¤@Ó Container ªº°O¿ý¸ê®Æ¡C°O¿ýÀɦs©ñ¦b¨ºùØ¡A¦³¬Æ»ò®æ¦¡¥i¿ï¾Ü¥H¤Î¦p¦óÁ×§K²Ö¿n¤Ó¦h°O¿ý¦Ó¦û¥Î¤Ó¦hÀx¦sªÅ¶¡¡C

- Ãö©óºôµ¸¤è±¡ADocker ¦p¦ó¬° Container «Ø¥ß¤º³¡µêÀÀºôµ¸¡C¦p¦ó«È¨î§A»Ýnªººôµ¸Àô¹Ò (¦p«ü©w IP address, DNS settings ¡K. µ¥µ¥) ¥h´£¨Ñµ¹ Containers ¨Ï¥Î¡C¥t¥~¤]·|²³æ¤¶²Ð·í Docker ¥D¾÷¤º«Ø¨¾¤õÀð®É¡A¦³¨º¨ÇµêÀÀºôµ¸·|¨ü¼vÅT¤Î¦p¦ó¸Ñ¨M¡C

- Ãö©ó¸ê·½ºÞ²z¤è±¡ADocker ¦p¦óºÞ²z¨C¤@Ó Container ªº¥i¥Î¸ê·½ (¦p CPU, °O¾ÐÅé ¡K µ¥µ¥)¡C¦p¦ó¥i¥H³]©w³o¨Ç¨î¡C

- Ãö©ó«Ø¥ß Container ¤è±¡A·í¦b¤¬Ápºô¤W§ä¤£¨ì§A»Ýn¦b Container ¹B¦æªºµ{§Ç (Process) Ãè¹³ÀÉ (image) ®É¡A¦p¦ó¦Û¤v«È¨î¤@ÓÃè¹³ÀÉ¡C½Òµ{¤¤ªº¨Ò¤l·|¥Ü½d¥Ñ³Ìªì¤H¤â«Ø¥ß Container ¥Î§@´ú¸Õ¡Aª½¦Ü´ú¸Õ¦¨¥\«á¡A¨Ï¥Î Docker Compose ¥h¦Û°Ê¤Æ«Ø¥ß Container ¥H¤Î¦³»Ýn®É§@¥X§ó§ïªº¾ãÓ¹Lµ{¡C¥t¥~¡A¦p¦]¯S§O»Ýn¦Ón¦b¤@Ó Container ¤¤°õ¦æ¦h©ó¤@Óµ{§Ç®É¡A³oÓ Container ¥i¥H¦p¦ó«Ø¥ß¡C¥H¤Î¡A¦p¦ó¥i¥H¥O¨ä¤¤¤@Ó¦]·N¥~°h¥X¤Fªºµ{§Ç¥i¥H¦Û°Ê«±Ò¡C

- Ãö©ó«Ø¥ß¦hÓ°õ¦æ¬Û¦Pµ{§Çªº Containers ¤è±¡A¦p¦ó¥i¥H²³æ¦a«ü¥O Docker ¥h¼W¥[©Î´î¤Ö³o¨Ç Container ªº¼Æ¶q¡C½Òµ{¤¤·|¥Hºô¶¦øªA¾¹ªº Container §@¨Ò¤l¡A¦P®É¤]·|¥Ü½d¦p¦ó«Ø¥ß¤@Ó²³æªººô¶t¸ü¥¿Å¾¹ (Load Balancer) ªº container ¥h¦Û°Ê¤À°tºô¶n¨D (web request) ¦Ü¥¿¦b¹B¦æ¤¤ªº Containers¡CµL½×¼W¥[©Î´î¤Öºô¶¦øªA¾¹¡Acontainer ¤]¤£¥Î«·s³]©w¹B¦æ¤¤ªºt¸ü¥¿Å¾¹¡C

- Ãö©óºÞ²z¦h©ó¤@³¡¹B¦æ Docker ªº¥D¾÷¤è±¡A¦p¦ó¥i¥H¦b¤@³¡ Docker ¥D¾÷³q¹L°õ¦æ ¡§docker¡¨ «ü¥O¡A¥hºÞ²z¦Û¤v©Î¥ô¦ó¤@³¡§A«ü©wªº Docker ¥D¾÷¡C³Ì«á¡A¥»½Òµ{¤]·|²³æ¤¶²Ð Docker Swarm (¸s) ªº¥\¯à¡A³oÓ¥\¯à¯S§O¤§³B¬O¥i¥H¥Î³æ¤@Ó«ü¥O¥h¥O¦h³¡ Docker ¥D¾÷¦P®É«Ø¥ß©ÎºÞ²z°õ¦æ¬Û¦Pµ{§Çªº Containers¡C

¦]¬°¥»½Òµ{¯A¤Î¨¾¤õÀð©M SELinux¡A¦]¦¹·|¨Ï¥Î¹w³]¤w±Ò°Ê¨¾¤õÀð©M SELinuxªº CentOS ¤W¹B¦æªº Docker§@¬°¥Ü½d¨Ò¤l¡C
|
½Òµ{¦WºÙ¡G |
¶i¶¥ Linux Docker ³nÅé®e¾¹ (Container) ½Òµ{ - ²ºÙ¡GAdvanced Linux Docker Training Course |
½Òµ{®É¼Æ¡G |
18 ¤p®É (¦@ 6 °ó) |
¾A¦X¤H¤h¡G |
¦³¾Ç²ß©Î¨Ï¥Î¹L Docker Container ¦Ó¥B¦³¿³½ì¹ï¦¹§Þ³N¤ÎÀ³¥Î§@¶i¤@¨B»{ÃѪº¤H¤h |
±Â½Ò»y¨¥¡G |
¥H¼sªF¸Ü¬°¥D¡A»²¥H^»y |
½Òµ{µ§°O¡G |
¥»¤¤¤ß¾É®v¿Ë¦Û½s¼g^¤å¬°¥Dµ§°O¡A¦Ó³¡¥÷^¤å¦rªþ¦³¤¤¤å¹ï·Ó¡C |
½Òµ{¦WºÙ¡G¶i¶¥ Linux Docker ³nÅé®e¾¹ (Container) ½Òµ{ - ²ºÙ¡GAdvanced Linux Docker Training Course |
Filesystem in Container and Images
- Container Layers
- How It Works and What is the Benefits
- Use a Container for Illustration
- Image Layers
- How It Works and What is the Benefits
- Building Custom Images for Illustration
- Advantage and Disadvantage of Storing Data in Container Layer
- Advantage and Disadvantage of Storing Data in Volumes
- Options for Using Volumes
- Creating Containers with Different Options for Illustration
- Advantage and Disadvantage of Storing Data in Bind Mount
- Options for Bind Mount
- Creating Containers with Different Options for Illustration
- Brief Notes about Enabling SELinux in Container
- Setting Up Docker to use SELinux
- SELinux Labels / Contexts about Processes and Files for Container.
- Problems for Using SELinux
Logging
- Ways to Handle Logging Generated By Container
- Handling by Container
- Handling by Docker
- Options for Handling Logging by Docker
- How Logging is Handled and Stored in each Option
- Accessing Logging Handled by each Option
Networking
- Types of Networking for Container
- How to Setup the use of Each Network Type
- How Data Traffic is Handled for each type
- Hosts Firewall
- How Data Traffic for Each Network Type may be affected by Host¡¦s Firewall
- Firewall Settings setup by Docker for Allowing Data Traffic
- When Manual Firewall Settings are Required
Resources
- How Docker provide Resources to Container
- Namespace and cgroups in Linux
- How Docker uses them to provide Containers
- Ways to setup Limits on Resources for each Container
Setting up a Custom Image / Container
- Building a Custom Image / Container manually for Testing
- Steps to Install / Build / Create your Testing Container
- How to Test your Testing Container
- How to Make Modification for your Testing Container.
- Setup a Docker Compose file for Building
- Create the Docker file and Compose file based on the Steps performed in Testing.
- Create the Custom Container through Docker Compose
- Testing your Custom Container
- Modifying your Custom Container.
- Running and Monitoring multiple processes in a Container
- Trying supervisord in your Testing Container
- Adding supervisord in Docker file and Compose file for your Custom Container
Scaling
- Increasing and Decreasing the number of containers with same settings through Scaling
- Setup and commands for Scaling
- Problems in Networking for containers created through Scaling
- Ways provided by Docker to Access these Containers through Networking
- Illustrate by setting up Containers in Each Way
- How these Containers can be accessed by Host and other Containers.
- How to setup a Load Balancer Container to Provide Web Service from these Containers
Multiple Hosts
- How to control Docker in another Host computer
- Setup Required for Remote Control
- Examples of using Remote Control
- Examples of moving a Container from one Host to another
- Having data in Container layer
- Having data in Volume
- Having data in Bind Mount
- Brief Introduction to Docker Swarm
- Setting up Docker Swarm
- Examples of Using Docker Swam to provide Scaling among Multiple Hosts
|