注冊 | 登錄讀書好,好讀書,讀好書!
讀書網(wǎng)-DuShu.com
當(dāng)前位置: 首頁出版圖書科學(xué)技術(shù)計算機/網(wǎng)絡(luò)操作系統(tǒng)Docker使用手冊(影印版 英文版)

Docker使用手冊(影印版 英文版)

Docker使用手冊(影印版 英文版)

定 價:¥78.00

作 者: Adrian,Mouat 著
出版社: 東南大學(xué)出版社
叢編項:
標 簽: 暫缺

ISBN: 9787564169015 出版時間: 2017-01-01 包裝: 平裝
開本: 16開 頁數(shù): 337 字數(shù):  

內(nèi)容簡介

  Docker容器提供了簡單、快速和強大的方法來開發(fā)、分發(fā)和運行軟件,特別是在動態(tài)和分布式環(huán)境中。通過這本實用指南,你將了解到為什么容器是如此重要,你將通過使用Docker。獲得什么,以及如何使它成為你的開發(fā)流程中的一部分。非常適合開發(fā)人員、運維工程師和系統(tǒng)管理員——特別是那些熱衷于采用DevOps方法的人員。《Docker使用手冊(影印版 英文版)》將帶你從基礎(chǔ)開始,到在多主機系統(tǒng)上通過網(wǎng)絡(luò)和系統(tǒng)調(diào)度運行數(shù)十個容器?!禗ocker使用手冊(影印版 英文版)》的核心部分將指導(dǎo)你完成使用Docker開發(fā)、測試和部署網(wǎng)絡(luò)應(yīng)用程序所需的步驟。

作者簡介

暫缺《Docker使用手冊(影印版 英文版)》作者簡介

圖書目錄

Pretace
Part Ⅰ. Background and Basics
1. The What and Why of Containers
Containers Versus VMs
Docker and Containers
Docker: A History
Plugins and Plumbing
64-Bit Linux
2. Installation
Installing Docker on Linux
Run SELinux in Permissive Mode
Running Without sudo
Installing Docker on Mac OS or Windows
A Quick Check
3. First Steps
Running Your First Image
The Basic Commands
Building Images from Dockerfiles
Working with Registries
Private Repositories
Using the Redis Official Image
Conclusion
4. Docker Fundamentals
The Docker Architecture
Underlying Technologies
Surrounding Technologies
Docker Hosting
How Images Get Built
The Build Context
Image Layers
Caching
Base Images
Dockerfile Instructions
Connecting Containers to the World
Linking Containers
Managing Data with Volumes and Data Containers
Sharing Data
Data Containers
Common Docker Commands
The run Command
Managing Containers
Docker Info
Container Info
Dealing with Images
Using the Registry
Conclusion
Part Ⅱ. The Software Lifecycle with Docker
5. Using Docker in Development
Say Hello World!
Automating with Compose
The Compose Workflow
Conclusion
6. Creating a Simple Web App
Creating a Basic Web Page
Taking Advantage of Existing Images
Add Some Caching
Microservices
Conclusion
7. Image Distribution
Image and Repository Naming
The Docker Hub
Automated Builds
Private Distribution
Running Your Own Registry
Commerical Registries
Reducing Image Size
Image Provenance
Conclusion
8. Continuous Integration and Testing with Docker
Adding Unit Tests to Identidock
Creating a Jenkins Container
Triggering Builds
Pushing the Image
Responsible Tagging
Staging and Production
Image Sprawl
Using Docker to Provision Jenkins Slaves
Backing Up Jenkins
Hosted CI Solutions
Testing and Microservices
Testing in Production
Conclusion
9. Deploying Containers
Prvisioning Resources with Docker Machine
Using a Proxy
Execution Options
Shell Scripts
Using a Process Manager (or systemd to Rule Them All)
Using a Configuration Management Tool
Host Configuration
Choosing an OS
Choosing a Storage Driver
Specialist Hosting Options
Triton
Google Container Engine
Amazon EC2 Container Service
Giant Swarm
Persistent Data and Production Containers
Sharing Secrets
Saving Secrets in the Image
Passing Secrets in Environment Variables
Passing Secrets in Volumes
Using a Key-Value Store
Networking
Production Registry
Continuous Deployment/Delivery
Conclusion
10. Logging and Monitoring
Logging
The Default Docker Logging
Aggregating Logs
Logging with ELK
Docker Logging with syslog
Grabbing Logs from File
Monitoring and Alerting
Monitoring with Docker Tools
cAdvisor
Cluster Solutions
Commercial Monitoring and Logging Solutions
Conclusion
Part Ⅲ. Tools and Techniques
11. Networking and Service Discovery
Ambassadors
Service Discovery
etcd
SkyDNS
Consul
Registration
Other Solutions
Networking Options
Bridge
Host
Container
None
New Docker Networking
Network Types and Plugins
Networking Solutions
Overlay
Weave
Flannel
Project Calico
Conclusion
12. Orchestration, Clustering, and Management
Clustering and Orchestration Tools
Swarm
Fleet
Kubernetes
Mesos and Marathon
Container Management Platforms
Rancher
Clocker
Tutum
Conclusion
13. Security and Limiting Containers
Things to Worry About
Defense-in-Depth
Least Privilege
Securing Identidock
Segregate Containers by Host
Applying Updates
Avoid Unsupported Drivers
Image Provenance
Docker Digests
Docker Content Trust
Reproducible and Trustworthy Dockerfiles
Security Tips
Set a User
Limit Container Networking
Remove Setuid/Setgid Binaries
Limit Memory
Limit CPU
Limit Restarts
Limit Filesystems
Limit Capabilities
Apply Resource Limits (ulimits)
Run a Hardened Kernel
Linux Security Modules
SELinux
AppArmor
Auditing
Incident Response
Future Features
Conclusion
Index

本目錄推薦

掃描二維碼
Copyright ? 讀書網(wǎng) ranfinancial.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號 鄂公網(wǎng)安備 42010302001612號