Use of docker storage volume

Docker storage volume of docker COW mechanism Docker image is composed of multiple read-only layers. When the container is started, docker will load the read-only image layer and add a read-write layer at the top of the image stack. If the running container modifies an existing file, the file will be copied from the read-only layer below the ...

Posted on Mon, 06 Dec 2021 22:45:55 -0500 by The Bat

docker storage volume management

COW mechanism Docker image is composed of multiple read-only layers. When the container is started, docker will load the read-only image layer and add a read-write layer at the top of the image stack. If the running container modifies an existing file, the file will be copied from the read-only layer below the read-write layer to the read ...

Posted on Mon, 06 Dec 2021 14:43:05 -0500 by satal keto

SpringBoot -- container function

SpringBoot -- container function 1. Component addition First, create two bean s, one called User and the other called Food. Previously, in SSM, component and attribute injection needed to be set in the Configuration file. The whole process can now be implemented in full code using SpringBoot. Create a Configuration class, mark it with @ Conf ...

Posted on Mon, 06 Dec 2021 13:46:14 -0500 by graphic3

Analysis of the Source+Expansion Mechanism of the Saintest Array List

1. Introduction to ArrayList At the bottom of the ArrayList is an array queue, which is equivalent to a dynamic array. Compared to arrays in Java, its capacity can grow dynamically. Applications can use the ensureCapacity operation to increase the capacity of ArrayList instances before adding a large number of elements. This reduces the number ...

Posted on Mon, 06 Dec 2021 12:20:50 -0500 by Nikos7

Getting started with cloud native -k8s-service

Kubernetes Pod is ordinary. Its doors will be created and will die (birth, death, old age), and they cannot be resurrected. Replication controllers dynamically create and destroy Pods (such as expanding or shrinking the scale, or performing dynamic updates). Each pod consists of its own IP, and these IP can not be continuously dependent over ti ...

Posted on Sun, 05 Dec 2021 14:33:46 -0500 by cuvaibhav

Docker installation and use tutorial

Docker Docker installation 1. Uninstall old sudo yum remove docker \ docker-client \ docker-client-latest \ docker-common \ docker-latest \ docker-latest-logrotate \ docker-logrotate \ docker-engine 2. Install the r ...

Posted on Sun, 05 Dec 2021 06:38:39 -0500 by zohab

docker container Harbor warehouse

catalogue 1, Harbor 1. Harbor introduction 2. Characteristics of Harbor 3. Harbor composition 2, Deploy 1. Deploy docker compose service 2. Client upload image 3, Maintenance management Harbor 1. Create a project from Harbor Web 2. Create Harbor user summary There are rolling, blue-green, Canary / grayscale methods for online publi ...

Posted on Sat, 04 Dec 2021 19:14:08 -0500 by R0bb0b

docker container virtualization

Container virtualization of Docker Virtualized network Network Namespace is a function provided by Linux kernel and an important function to realize network virtualization. It can create multiple isolated network spaces with independent network stack information. Whether it is a virtual machine or a container, it seems as if it is running in ...

Posted on Sat, 04 Dec 2021 01:47:52 -0500 by keystroke

docker container network

docker container network docker container network Docker automatically provides three networks after installation and can be viewed using the docker network ls command [root@localhost ~]# docker network ls NETWORK ID NAME DRIVER SCOPE 6cf45e2c0e7d bridge bridge local b11e58ca673a host host local f023a89f7f92 ...

Posted on Fri, 03 Dec 2021 22:52:05 -0500 by grga

kubernetes(k8s) note authentication, authorization and admission control RBAC access control

RBAC access control Users Accountspreface:ServiceAccount and Users Account authentication have been introduced and created earlier, but the final test found that Users Account does not have access rights. This section describes RBAC authorization for ServiceAccount and Users Account authenticationWhat is RBAC?RBAC is Role-Based Access Control. ...

Posted on Fri, 03 Dec 2021 19:22:23 -0500 by nodehopper