GeekCoding101

  • Home
  • GenAI
    • Daily AI Insights
    • Machine Learning
    • Transformer
    • Azure AI
  • DevOps
    • Kubernetes
    • Terraform
  • Tech
    • CyberSec
    • System Design
    • Coding Notes
  • About
  • Contact
docker
Coding Notes

Docker Notes

Hi there! This is yet another note from me ^^ This is for my notes about Docker. I've been dealing with container technologies for years, it's a good habit to dump all of my notes here. I hope you find this useful as well. Build Docker Image Method 1: Docker build Using dockerfile is the formal way to build a docker image. We can define the base image to pull from, copy files inside it, run configuration, specify what process to start with. You know I like using Django for projects, here comes a dockerfile from Cookiecutter: Method 2: Docker commit Another way is to use docker commit <container_id> <new_image_name>, it will create a new image based on your existing image in you docker local storage. Export/Import After we have docker images, we usually want to share it with other or transfer to another places, that's where export/import are used: Docker Registry Environment: CentOS 7.2 Setup Docker repository Install and enable docker-registry Verify docker-registry service Configure storage_path Update local storage path to your specific location in /etc/docker-registry.yml: Then restart: systemctl restart docker-registry.service Setup client to use the registry Update /etc/sysconfig/docker to add --insecure-registry your_ip_or_hostname:5000 as below: Push to the registry In order to have some images to push to the registry, let's pull from docker.io firstly: docker pull centos Please write down the IMAGE ID for the centos image If you push it to your own registry now, you will get error as blow: So you need to create a repo on your private registry then try to push again. To do that, you can tag a repo on your private…

March 8, 2018 0comments 797hotness 0likes Geekcoding101 Read all
Newest Hotest Random
Newest Hotest Random
Secure by Design Part 1: STRIDE Threat Modeling Explained Kubernetes Control Plane Components Explained A 12 Factor Crash Course in Python: Build Clean, Scalable FastAPI Apps the Right Way Golang Range Loop Reference - Why Your Loop Keeps Giving You the Same Pointer (and How to Fix It) Terraform Associate Exam: A Powerful Guide about How to Prepare It Terraform Meta Arguments Unlocked: Practical Patterns for Clean Infrastructure Code
Kubernetes Control Plane Components ExplainedSecure by Design Part 1: STRIDE Threat Modeling Explained
What Is an Embedding? The Bridge From Text to the World of Numbers Password Authentication in Node.js: A Step-by-Step Guide Why is the Transformer Model Called an "AI Revolution"? Fine-Tuning Models: Unlocking the Extraordinary Potential of AI Terms Used in "Attention is All You Need" Crafting A Bash Script with Tmux
Newest comment
Tag aggregation
security notes AI Transformer Supervised Machine Learning cybersecurity Daily.AI.Insight Machine Learning

COPYRIGHT © 2024 GeekCoding101. ALL RIGHTS RESERVED.

Theme Kratos Made By Seaton Jiang