亚洲国产日韩欧美一区二区三区,精品亚洲国产成人av在线,国产99视频精品免视看7,99国产精品久久久久久久成人热,欧美日韩亚洲国产综合乱

directory search
Compose About versions and upgrading (Compose) ASP.NET Core + SQL Server on Linux (Compose) CLI environment variables (Compose) Command-line completion (Compose) Compose(組成) Compose command-line reference(組合命令行參考) Control startup order (Compose) Django and PostgreSQL (Compose) Docker stacks and distributed application bundles (Compose) docker-compose build(docker-compose構(gòu)建) docker-compose bundle docker-compose config docker-compose create docker-compose down docker-compose events docker-compose exec docker-compose help docker-compose images docker-compose kill docker-compose logs docker-compose pause docker-compose port docker-compose ps docker-compose pull docker-compose push docker-compose restart docker-compose rm docker-compose run docker-compose scale docker-compose start docker-compose stop docker-compose top docker-compose unpause docker-compose up Environment file (Compose) Environment variables in Compose Extend services in Compose Frequently asked questions (Compose) Getting started (Compose) Install Compose Link environment variables (deprecated) (Compose) Networking in Compose Overview of Docker Compose Overview of docker-compose CLI Quickstart: Compose and WordPress Rails and PostgreSQL (Compose) Sample apps with Compose Using Compose in production Using Compose with Swarm Engine .NET Core application (Engine) About images, containers, and storage drivers (Engine) Add nodes to the swarm (Engine) Apply custom metadata (Engine) Apply rolling updates (Engine) apt-cacher-ng Best practices for writing Dockerfiles (Engine) Binaries (Engine) Bind container ports to the host (Engine) Breaking changes (Engine) Build your own bridge (Engine) Configure container DNS (Engine) Configure container DNS in user-defined networks (Engine) CouchDB (Engine) Create a base image (Engine) Create a swarm (Engine) Customize the docker0 bridge (Engine) Debian (Engine) Default bridge network Delete the service (Engine) Deploy a service (Engine) Deploy services to a swarm (Engine) Deprecated Engine features Docker container networking (Engine) Docker overview (Engine) Docker run reference (Engine) Dockerfile reference (Engine) Dockerize an application Drain a node (Engine) Engine FAQ (Engine) Fedora (Engine) Get started (Engine) Get started with macvlan network driver (Engine) Get started with multi-host networking (Engine) How nodes work (Engine) How services work (Engine) Image management (Engine) Inspect the service (Engine) Install Docker (Engine) IPv6 with Docker (Engine) Join nodes to a swarm (Engine) Legacy container links (Engine) Lock your swarm (Engine) Manage nodes in a swarm (Engine) Manage sensitive data with Docker secrets (Engine) Manage swarm security with PKI (Engine) Manage swarm service networks (Engine) Migrate to Engine 1.10 Optional Linux post-installation steps (Engine) Overview (Engine) PostgreSQL (Engine) Raft consensus in swarm mode (Engine) Riak (Engine) Run Docker Engine in swarm mode Scale the service (Engine) SDKs (Engine) Select a storage driver (Engine) Set up for the tutorial (Engine) SSHd (Engine) Storage driver overview (Engine) Store service configuration data (Engine) Swarm administration guide (Engine) Swarm mode key concepts (Engine) Swarm mode overlay network security model (Engine) Swarm mode overview (Engine) Understand container communication (Engine) Use multi-stage builds (Engine) Use swarm mode routing mesh (Engine) Use the AUFS storage driver (Engine) Use the Btrfs storage driver (Engine) Use the Device mapper storage driver (Engine) Use the OverlayFS storage driver (Engine) Use the VFS storage driver (Engine) Use the ZFS storage driver (Engine) Engine: Admin Guide Amazon CloudWatch logs logging driver (Engine) Bind mounts (Engine) Collect Docker metrics with Prometheus (Engine) Configuring and running Docker (Engine) Configuring logging drivers (Engine) Control and configure Docker with systemd (Engine) ETW logging driver (Engine) Fluentd logging driver (Engine) Format command and log output (Engine) Google Cloud logging driver (Engine) Graylog Extended Format (GELF) logging driver (Engine) Journald logging driver (Engine) JSON File logging driver (Engine) Keep containers alive during daemon downtime (Engine) Limit a container's resources (Engine) Link via an ambassador container (Engine) Log tags for logging driver (Engine) Logentries logging driver (Engine) PowerShell DSC usage (Engine) Prune unused Docker objects (Engine) Run multiple services in a container (Engine) Runtime metrics (Engine) Splunk logging driver (Engine) Start containers automatically (Engine) Storage overview (Engine) Syslog logging driver (Engine) tmpfs mounts Troubleshoot volume problems (Engine) Use a logging driver plugin (Engine) Using Ansible (Engine) Using Chef (Engine) Using Puppet (Engine) View a container's logs (Engine) Volumes (Engine) Engine: CLI Daemon CLI reference (dockerd) (Engine) docker docker attach docker build docker checkpoint docker checkpoint create docker checkpoint ls docker checkpoint rm docker commit docker config docker config create docker config inspect docker config ls docker config rm docker container docker container attach docker container commit docker container cp docker container create docker container diff docker container exec docker container export docker container inspect docker container kill docker container logs docker container ls docker container pause docker container port docker container prune docker container rename docker container restart docker container rm docker container run docker container start docker container stats docker container stop docker container top docker container unpause docker container update docker container wait docker cp docker create docker deploy docker diff docker events docker exec docker export docker history docker image docker image build docker image history docker image import docker image inspect docker image load docker image ls docker image prune docker image pull docker image push docker image rm docker image save docker image tag docker images docker import docker info docker inspect docker kill docker load docker login docker logout docker logs docker network docker network connect docker network create docker network disconnect docker network inspect docker network ls docker network prune docker network rm docker node docker node demote docker node inspect docker node ls docker node promote docker node ps docker node rm docker node update docker pause docker plugin docker plugin create docker plugin disable docker plugin enable docker plugin inspect docker plugin install docker plugin ls docker plugin push docker plugin rm docker plugin set docker plugin upgrade docker port docker ps docker pull docker push docker rename docker restart docker rm docker rmi docker run docker save docker search docker secret docker secret create docker secret inspect docker secret ls docker secret rm docker service docker service create docker service inspect docker service logs docker service ls docker service ps docker service rm docker service scale docker service update docker stack docker stack deploy docker stack ls docker stack ps docker stack rm docker stack services docker start docker stats docker stop docker swarm docker swarm ca docker swarm init docker swarm join docker swarm join-token docker swarm leave docker swarm unlock docker swarm unlock-key docker swarm update docker system docker system df docker system events docker system info docker system prune docker tag docker top docker unpause docker update docker version docker volume docker volume create docker volume inspect docker volume ls docker volume prune docker volume rm docker wait Use the Docker command line (Engine) Engine: Extend Access authorization plugin (Engine) Docker log driver plugins Docker network driver plugins (Engine) Extending Engine with plugins Managed plugin system (Engine) Plugin configuration (Engine) Plugins API (Engine) Volume plugins (Engine) Engine: Security AppArmor security profiles for Docker (Engine) Automation with content trust (Engine) Content trust in Docker (Engine) Delegations for content trust (Engine) Deploying Notary (Engine) Docker security (Engine) Docker security non-events (Engine) Isolate containers with a user namespace (Engine) Manage keys for content trust (Engine) Play in a content trust sandbox (Engine) Protect the Docker daemon socket (Engine) Seccomp security profiles for Docker (Engine) Secure Engine Use trusted images Using certificates for repository client verification (Engine) Engine: Tutorials Engine tutorials Network containers (Engine) Get Started Part 1: Orientation Part 2: Containers Part 3: Services Part 4: Swarms Part 5: Stacks Part 6: Deploy your app Machine Amazon Web Services (Machine) Digital Ocean (Machine) docker-machine active docker-machine config docker-machine create docker-machine env docker-machine help docker-machine inspect docker-machine ip docker-machine kill docker-machine ls docker-machine provision docker-machine regenerate-certs docker-machine restart docker-machine rm docker-machine scp docker-machine ssh docker-machine start docker-machine status docker-machine stop docker-machine upgrade docker-machine url Driver options and operating system defaults (Machine) Drivers overview (Machine) Exoscale (Machine) Generic (Machine) Get started with a local VM (Machine) Google Compute Engine (Machine) IBM Softlayer (Machine) Install Machine Machine Machine CLI overview Machine command-line completion Machine concepts and help Machine overview Microsoft Azure (Machine) Microsoft Hyper-V (Machine) Migrate from Boot2Docker to Machine OpenStack (Machine) Oracle VirtualBox (Machine) Provision AWS EC2 instances (Machine) Provision Digital Ocean Droplets (Machine) Provision hosts in the cloud (Machine) Rackspace (Machine) VMware Fusion (Machine) VMware vCloud Air (Machine) VMware vSphere (Machine) Notary Client configuration (Notary) Common Server and signer configurations (Notary) Getting started with Notary Notary changelog Notary configuration files Running a Notary service Server configuration (Notary) Signer configuration (Notary) Understand the service architecture (Notary) Use the Notary client
characters

在AmazonWeb服務(wù)...

創(chuàng)建機(jī)器AmazonWeb服務(wù),您必須提供兩個(gè)參數(shù):AWS訪問(wèn)密鑰ID和AWS秘密訪問(wèn)密鑰。

配置憑據(jù)

在使用amazonc 2驅(qū)動(dòng)程序之前,請(qǐng)確保您已經(jīng)配置了憑據(jù)。

AWS憑證文件

配置憑據(jù)的一種方法是為AmazonAWS使用標(biāo)準(zhǔn)憑據(jù)文件~/.aws/credentials文件,該文件可能如下所示:

[default]aws_access_key_id = AKID1234567890
aws_secret_access_key = MY-SECRET-KEY

在mac OS或各種類型的linux上,您可以安裝AWS命令行接口%28aws cli%29在終端中使用aws configure命令,它指導(dǎo)您創(chuàng)建憑據(jù)文件。

這是最簡(jiǎn)單的方法,然后您可以使用以下方法創(chuàng)建一臺(tái)新機(jī)器:

$ docker-machine create --driver amazonec2 aws01

命令行標(biāo)志

或者,您可以使用這些標(biāo)志。--amazonec2-access-key--amazonec2-secret-key在命令行上:

$ docker-machine create --driver amazonec2 --amazonec2-access-key AKI******* --amazonec2-secret-key 8T93C*******  aws01

環(huán)境變量

您可以使用環(huán)境變量:

$ export AWS_ACCESS_KEY_ID=AKID1234567890
$ export AWS_SECRET_ACCESS_KEY=MY-SECRET-KEY
$ docker-machine create --driver amazonec2 aws01

備選方案

  • --amazonec2-access-key::AmazonWebServicesAPI的訪問(wèn)密鑰ID。

  • --amazonec2-ami要使用的實(shí)例的AMI ID。

  • --amazonec2-block-duration-minutes:AWS SPOT實(shí)例持續(xù)時(shí)間(分鐘為%2860、120、180、240、300或360%29)。

  • --amazonec2-device-name實(shí)例的根設(shè)備名稱。

  • --amazonec2-endpoint:可選端點(diǎn)URL%28主機(jī)名或完全限定URI%29

  • --amazonec2-iam-instance-profileAWS IAM角色名用作實(shí)例概要文件。

  • --amazonec2-insecure-transport:在發(fā)送請(qǐng)求時(shí)禁用SSL

  • --amazonec2-instance-type要運(yùn)行的實(shí)例類型。

  • --amazonec2-keypair-name使用AWS鍵盤;需要-amazonec2-ssh-keypath

  • --amazonec2-monitoring*啟用云監(jiān)視監(jiān)視。

  • --amazonec2-open-port::使指定的端口號(hào)可從因特網(wǎng)訪問(wèn)。

  • --amazonec2-private-address-only::僅使用專用IP地址。

  • --amazonec2-region啟動(dòng)實(shí)例時(shí)要使用的區(qū)域。

  • --amazonec2-request-spot-instance*使用SPOT實(shí)例。

  • --amazonec2-retries:為可恢復(fù)故障設(shè)置重試計(jì)數(shù)%28use-1以禁用%29

  • --amazonec2-root-size實(shí)例%28的根磁盤大小(GB%29)。

  • --amazonec2-secret-key::AmazonWebServicesAPI的秘密訪問(wèn)密鑰。

  • --amazonec2-security-group:AWS VPC安全組名稱。

  • --amazonec2-session-token::AmazonWebServicesAPI的會(huì)話令牌。

  • --amazonec2-spot-price:競(jìng)價(jià)型實(shí)例競(jìng)標(biāo)價(jià)格(以美元計(jì))。要求--amazonec2-request-spot-instance國(guó)旗。

  • --amazonec2-ssh-keypath例如,要使用的專用密鑰文件的路徑。將公鑰與。酒吧擴(kuò)展應(yīng)該存在

  • --amazonec2-ssh-user:SSH登錄用戶名,它必須與所使用的ami中的默認(rèn)SSH用戶集相匹配。

  • --amazonec2-subnet-id:AWS VPC子網(wǎng)ID。

  • --amazonec2-tags:AWS額外標(biāo)簽鍵值對(duì)(逗號(hào)分隔,例如key1,value1,key2,value2)。

  • --amazonec2-use-ebs-optimized-instance::創(chuàng)建一個(gè)EBS優(yōu)化實(shí)例,實(shí)例類型必須支持它。

  • --amazonec2-use-private-address使用專用IP地址的對(duì)接機(jī),但仍然創(chuàng)建一個(gè)公共IP地址.

  • --amazonec2-userdata使用云init用戶數(shù)據(jù)進(jìn)行文件的路徑。

  • --amazonec2-volume-type::要附加到實(shí)例的AmazonEBS卷類型。

  • --amazonec2-vpc-id:您的vpc ID啟動(dòng)實(shí)例。

  • --amazonec2-zone:在AWS區(qū)域中啟動(dòng)實(shí)例(即a,b,c,d,e中的一個(gè))。

環(huán)境變量和默認(rèn)值:

CLI選項(xiàng)

環(huán)境變量

默認(rèn)

--amazonec2接入密鑰

AWS_ACCESS_KEY_ID

-

--amazonec2秘密密鑰

AWS_SECRET_ACCESS_KEY

-

--amazonec2會(huì)話令牌

AWS_SESSION_TOKEN

-

--amazonec2-朋友

AWS_AMI

ami-5f709f34

--amazonec2區(qū)域

AWS_DEFAULT_REGION

美國(guó) - 東 -  1

--amazonec2-VPC-ID

AWS_VPC_ID

-

--amazonec2區(qū)

AWS_ZONE

一個(gè)

--amazonec2子網(wǎng)的ID

AWS_SUBNET_ID

-

--amazonec2安全組

AWS_SECURITY_GROUP

docker-machine

--amazonec2標(biāo)簽

AWS_TAGS

-

--amazonec2實(shí)例型

AWS_INSTANCE_TYPE

t2.micro

--amazonec2-設(shè)備名稱

AWS_DEVICE_NAME

/ dev / sda1

--amazonec2根尺寸

AWS_ROOT_SIZE

16

--amazonec2容量式

AWS_VOLUME_TYPE

GP2

--amazonec2-IAM實(shí)例矚目

AWS_INSTANCE_PROFILE

-

--amazonec2-SSH用戶

AWS_SSH_USER

Ubuntu

--amazonec2請(qǐng)求現(xiàn)場(chǎng)實(shí)例

-

--amazonec2-現(xiàn)貨價(jià)格

-

0.50

--amazonec2  - 使用 - 私人地址

-

--amazonec2-私人地址,只

-

--amazonec2監(jiān)控

-

--amazonec2使用-EBS優(yōu)化實(shí)例

-

--amazonec2-SSH-的keyPath

AWS_SSH_KEYPATH

-

--amazonec2重試次數(shù)

-

5

默認(rèn)AMI

默認(rèn)情況下,AmazonEC 2驅(qū)動(dòng)程序?qū)⑹褂肬buntu 16.04 lts的每日映像。

地區(qū)

AMI ID

ap-northeast-1

ami-b36d4edd

ap-southeast-1

ami-1069af73

ap-southeast-2

ami-1d336a7e

ca-central-1

ami-ca6ddfae

cn-north-1

ami-79eb2214

eu-west-1

ami-8aa67cf9

eu-central-1

ami-fe408091

sa-east-1

ami-185de774

us-east-1

ami-26d5af4c

us-west-1

ami-9cbcd2fc

us-west-2

ami-16b1a077

us-gov-west-1

ami-b0bad893

安全小組

注意,將創(chuàng)建一個(gè)安全組并將其與主機(jī)相關(guān)聯(lián)。此安全組將打開以下入站端口:

  • ssh (22/tcp)

  • docker (2376/tcp)

  • swarm(3376 / tcp),只有當(dāng)該節(jié)點(diǎn)是swarm主節(jié)點(diǎn)時(shí)

如果使用--amazonec2-security-group標(biāo)志,將檢查和打開上述端口,并修改安全組。如果您希望打開更多端口,比如特定于應(yīng)用程序的端口,請(qǐng)使用AWS控制臺(tái)并手動(dòng)修改配置。

VPC ID

我們?cè)诿铋_始時(shí)確定默認(rèn)的VPC ID。在某些情況下,由于您的帳戶沒(méi)有默認(rèn)的vpc,或者您不想使用默認(rèn)的vpc,您可以使用--amazonec2-vpc-id旗子。

若要查找VPC ID,請(qǐng)執(zhí)行以下操作:

  1. 登錄到AWS控制臺(tái)

  1. 轉(zhuǎn)到服務(wù) - > VPC  - >您的VPC。

  1. VPC列中找到您想要的VPC ID 。

  1. 服務(wù)->vpc->子網(wǎng).檢查可用區(qū)列來(lái)驗(yàn)證該區(qū)域。a存在并匹配您的VPC ID。

例如,us-east1-aa可用性區(qū)域。如果a區(qū)域不存在,您可以在該區(qū)域中創(chuàng)建一個(gè)新的子網(wǎng),或者在創(chuàng)建計(jì)算機(jī)時(shí)指定一個(gè)不同的區(qū)域。

若要?jiǎng)?chuàng)建具有非默認(rèn)vpc-ID的計(jì)算機(jī):

$ docker-machine create --driver amazonec2 --amazonec2-access-key AKI
******* --amazonec2-secret-key 8T93C
********* --amazonec2-vpc-id vpc-
****** aws02

此示例假定VPC ID位于a可用性區(qū)域。使用--amazonec2-zone屬性以外的區(qū)域。a區(qū)域。例如,--amazonec2-zone c意指us-east1-c...

VPC連通性

機(jī)器使用SSH來(lái)完成EC2中實(shí)例的設(shè)置,并要求能夠直接訪問(wèn)實(shí)例。

如果您使用該標(biāo)志--amazonec2-private-address-only,則需要確保您有一些方法可以從VPC的內(nèi)部網(wǎng)絡(luò)中訪問(wèn)新實(shí)例(例如,公司VPN到VPC,VPC內(nèi)的VPN實(shí)例或使用Docker-machine您的VPC中的一個(gè)實(shí)例)。

vpc的配置超出了本指南的范圍,但是故障排除的第一步是確保如果您使用的是私有子網(wǎng),那么您將遵循AWS VPC用戶指南并有某種形式的NAT可用,使設(shè)置進(jìn)程可以訪問(wèn)互聯(lián)網(wǎng)完成設(shè)置。

自定義AMI和SSH用戶名

默認(rèn)AMI的默認(rèn)SSH用戶名是ubuntu。

只有當(dāng)您使用的自定義AMI具有不同的SSH用戶名時(shí),才需要更改SSH用戶名。

您可以--amazonec2-ssh-user根據(jù)您選擇的AMI 更改SSH用戶名--amazonec2-ami。

Previous article: Next article: