In Linux systems, offline installation of Docker usually occurs in the following situations:
In some deployment environments, network restrictions or firewall settings may affect the ability to install Docker online directly through Docker's official warehouse.
For security reasons, some environments do not allow direct connection to external networks, so offline methods are required to install and update software.
Stability requirements: For systems with higher stability requirements, offline installation can ensure that Docker is compatible with other system components and avoid potential risks that may be caused by online updates.
Let’s take a look at the specific operation methods.
1. Download the installation package
Docker all offline package paths
http://get.daocloud.io/docker/builds/
linux stable version:
https://download.docker.com/linux/static/stable/
2. Unzip
Take tar -zxvf docker-20.10.20.tgz as an example
Copy docker-20.10.20.tgz to the server and decompress:
tar -zxvf docker-20.10.20.tgz
3. Copy to the specified directory
Copy all the files in the unzipped docker directory to the /usr/bin directory. The destination /user/bin is the environment variable directory
mv docker/* /usr/bin/
4. Edit configuration file
vim /etc/systemd/system/docker.service
Add file content:
[Unit] Description=Docker Application Container Engine Documentation=https://docs.docker.com After=network-online.target firewalld.service Wants=network-online.target [Service] Type=notify ExecStart=/usr/bin/dockerd ExecReload=/bin/kill -s HUP $MAINPID LimitNOFILE=infinity LimitNPROC=infinity TimeoutStartSec=0 Delegate=yes KillMode=process Restart=on-failure StartLimitBurst=3 StartLimitInterval=60s [Install] WantedBy=multi-user.target
5. Modify execution permissions
chmod +x /etc/systemd/system/docker.service systemctl daemon-reload
6. Set startup
systemctl enable docker.service
7.Start docker
systemctl start docker
8.Verification
docker -v Docker version 20.10.20, build 370c289
In addition, the specific installation steps may vary depending on the Linux distribution and version. Therefore, before proceeding with offline installation, it is recommended to consult the documentation or community support of the target Linux system for more detailed installation guides and system-specific guidance.
Online installation: Automatically install using the official installation script
The installation command is as follows:
curl -fsSL https://get.docker.com | bash -s docker --mirror Aliyun
You can also use the domestic daocloud one-click installation command:
curl -sSL https://get.daocloud.io/docker | sh
The above is the detailed content of Install Docker offline on Linux system. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

As a pioneer in the digital world, Bitcoin’s unique code name and underlying technology have always been the focus of people’s attention. Its standard code is BTC, also known as XBT on certain platforms that meet international standards. From a technical point of view, Bitcoin is not a single code style, but a huge and sophisticated open source software project. Its core code is mainly written in C and incorporates cryptography, distributed systems and economics principles, so that anyone can view, review and contribute its code.

Linuxcanrunonmodesthardwarewithspecificminimumrequirements.A1GHzprocessor(x86orx86_64)isneeded,withadual-coreCPUrecommended.RAMshouldbeatleast512MBforcommand-lineuseor2GBfordesktopenvironments.Diskspacerequiresaminimumof5–10GB,though25GBisbetterforad

There are three main ways to set environment variables in PHP: 1. Global configuration through php.ini; 2. Passed through a web server (such as SetEnv of Apache or fastcgi_param of Nginx); 3. Use putenv() function in PHP scripts. Among them, php.ini is suitable for global and infrequently changing configurations, web server configuration is suitable for scenarios that need to be isolated, and putenv() is suitable for temporary variables. Persistence policies include configuration files (such as php.ini or web server configuration), .env files are loaded with dotenv library, and dynamic injection of variables in CI/CD processes. Security management sensitive information should be avoided hard-coded, and it is recommended to use.en

To enable PHP containers to support automatic construction, the core lies in configuring the continuous integration (CI) process. 1. Use Dockerfile to define the PHP environment, including basic image, extension installation, dependency management and permission settings; 2. Configure CI/CD tools such as GitLabCI, and define the build, test and deployment stages through the .gitlab-ci.yml file to achieve automatic construction, testing and deployment; 3. Integrate test frameworks such as PHPUnit to ensure that tests are automatically run after code changes; 4. Use automated deployment strategies such as Kubernetes to define deployment configuration through the deployment.yaml file; 5. Optimize Dockerfile and adopt multi-stage construction

Using the correct PHP basic image and configuring a secure, performance-optimized Docker environment is the key to achieving production ready. 1. Select php:8.3-fpm-alpine as the basic image to reduce the attack surface and improve performance; 2. Disable dangerous functions through custom php.ini, turn off error display, and enable Opcache and JIT to enhance security and performance; 3. Use Nginx as the reverse proxy to restrict access to sensitive files and correctly forward PHP requests to PHP-FPM; 4. Use multi-stage optimization images to remove development dependencies, and set up non-root users to run containers; 5. Optional Supervisord to manage multiple processes such as cron; 6. Verify that no sensitive information leakage before deployment

There are four ways to obtain command help in Linux: First, use --help to view basic usage, which is suitable for quickly understanding common options and parameters of commands; second, use man to view the complete man page, providing detailed command descriptions and examples; third, use info to view structured help, which is suitable for information navigation of complex commands such as gcc and make; fourth, refer to network resources and communities, such as Linux China, StackOverflow and other platforms to obtain Chinese materials or solve specific problems. It is recommended for beginners to master it step by step from --help and man.

Building an independent PHP task container environment can be implemented through Docker. The specific steps are as follows: 1. Install Docker and DockerCompose as the basis; 2. Create an independent directory to store Dockerfile and crontab files; 3. Write Dockerfile to define the PHPCLI environment and install cron and necessary extensions; 4. Write a crontab file to define timing tasks; 5. Write a docker-compose.yml mount script directory and configure environment variables; 6. Start the container and verify the log. Compared with performing timing tasks in web containers, independent containers have the advantages of resource isolation, pure environment, strong stability, and easy expansion. To ensure logging and error capture

Add useradd or adduser commands commonly used by users in Linux. 1. When using useradd, you need to manually set the password and home directory. Add the -m parameter to create the home directory; 2. You can specify the shell, group and UID through parameters such as -s, -G, and -u; 3. Adduser is an interactive command, suitable for novices to automatically complete the configuration; 4. Pay attention to permissions, username uniqueness and home directory permissions; 5. Userdel can be used to delete users and home directory by mistake. Mastering these key points allows you to manage users efficiently and securely.
