サクサク読めて、アプリ限定の機能も多数!
トップへ戻る
アメリカ大統領選
docs.docker.com
Reference documentation CLI reference docker (base command)docker builddocker build (legacy builder) docker builder docker builderdocker builder builddocker builder prune docker buildx docker buildxdocker buildx bakedocker buildx builddocker buildx createdocker buildx debugdocker buildx debug builddocker buildx dudocker buildx imagetoolsdocker buildx imagetools createdocker buildx imagetools inspe
Docker overview Get started Overview Quick hands-on guides What is a container?Run a containerRun Docker Hub imagesRun multi-container applicationsPersist container dataAccess a local folderContainerize your applicationPublish your image Getting started guide Part 1: OverviewPart 2: Containerize an applicationPart 3: Update the applicationPart 4: Share the applicationPart 5: Persist the DBPart 6:
OverviewGet Docker Docker Desktop Overview Install Docker Desktop Install on MacUnderstand permission requirements for MacInstall on WindowsUnderstand permission requirements for WindowsInstall on Linux Installation per Linux distro Install on UbuntuInstall on DebianInstall on FedoraInstall on ArchSign in Explore Docker Desktop OverviewExplore ContainersExplore ImagesExplore VolumesExplore BuildsR
Overview Docker Desktop Overview Install MacUnderstand permission requirements for MacWindows Use the MSI installer New OverviewInstall and configureUse IntuneFAQsUnderstand permission requirements for WindowsLinux Installation per Linux distro UbuntuDebianFedoraArchSign in Explore Docker Desktop OverviewExplore ContainersExplore ImagesExplore VolumesExplore BuildsResource Saver modePause Docker D
GitHub Actions is a popular CI/CD platform for automating your build, test, and deployment pipeline. Docker provides a set of official GitHub Actions for you to use in your workflows. These official actions are reusable, easy-to-use components for building, annotating, and pushing images. The following GitHub Actions are available: Build and push Docker images: build and push Docker images with Bu
Profiles help you adjust your Compose application for different environments or use cases by selectively activating services. Services can be assigned to one or more profiles; unassigned services start by default, while assigned ones only start when their profile is active. This setup means specific services, like those for debugging or development, to be included in a single compose.yml file and
{ switch(e.key) { case 'k': if (e.metaKey || e.ctrlKey) { e.preventDefault() open = !open; if (open) { document.body.classList.add('overflow-hidden'); } else { document.body.classList.remove('overflow-hidden'); } } } }">
Why do I keep getting a notification telling me an application has changed my Desktop configurations?You receive this notification because the Configuration integrity check feature has detected that a third-party application has altered your Docker Desktop configuration. This usually happens due to incorrect or missing symlinks. The notification ensures you are aware of these changes so you can re
{ switch(e.key) { case 'k': if (e.metaKey || e.ctrlKey) { e.preventDefault() open = !open; if (open) { document.body.classList.add('overflow-hidden'); } else { document.body.classList.remove('overflow-hidden'); } } } }"> OverviewGet Docker Docker Desktop Overview Install MacUnderstand permission requirements for MacWindowsUnderstand permission requirements for WindowsLinux Installation per Linux d
Container images consist of layers and software packages, which are susceptible to vulnerabilities. These vulnerabilities can compromise the security of containers and applications. Docker Scout is a solution for proactively enhancing your software supply chain security. By analyzing your images, Docker Scout compiles an inventory of components, also known as a Software Bill of Materials (SBOM). T
Rootless mode allows running the Docker daemon and containers as a non-root user to mitigate potential vulnerabilities in the daemon and the container runtime. Rootless mode does not require root privileges even during the installation of the Docker daemon, as long as the prerequisites are met. How it worksRootless mode executes the Docker daemon and containers inside a user namespace. This is ver
By default, a container has no resource constraints and can use as much of a given resource as the host's kernel scheduler allows. Docker provides ways to control how much memory, or CPU a container can use, setting runtime configuration flags of the docker run command. This section provides details on when you should set such limits and the possible implications of setting them. Many of these fea
DescriptionYou can specify a URL or - (dash) to take data directly from STDIN. The URL can point to an archive (.tar, .tar.gz, .tgz, .bzip, .tar.xz, or .txz) containing a filesystem or to an individual file on the Docker host. If you specify an archive, Docker untars it in the container relative to the / (root). If you specify an individual file, you must specify the full path within the host. To
Windows Subsystem for Linux (WSL) 2 is a full Linux kernel built by Microsoft, which lets Linux distributions run without managing virtual machines. With Docker Desktop running on WSL 2, users can leverage Linux workspaces and avoid maintaining both Linux and Windows build scripts. In addition, WSL 2 provides improvements to file system sharing and boot time. Docker Desktop uses the dynamic memory
The following development patterns have proven to be helpful for people building applications with Docker. If you have discovered something we should add, let us know. How to keep your images smallSmall images are faster to pull over the network and faster to load into memory when starting containers or services. There are a few rules of thumb to keep image size small: Start with an appropriate ba
Isolate containers with a user namespace Linux namespaces provide isolation for running processes, limiting their access to system resources without the running process being aware of the limitations. For more information on Linux namespaces, see Linux namespaces. The best way to prevent privilege-escalation attacks from within a container is to configure your container's applications to run as un
{ const container = $el; // The div with overflow const item = document.getElementById('sidebar-current-page') if (item) { const containerTop = container.scrollTop; const containerBottom = containerTop + container.clientHeight; const itemTop = item.offsetTop - container.offsetTop; const itemBottom = itemTop + item.offsetHeight; // Scroll only if the item is out of view if (itemBottom > containerBo
By default all files created inside a container are stored on a writable container layer. This means that: The data doesn't persist when that container no longer exists, and it can be difficult to get the data out of the container if another process needs it.A container's writable layer is tightly coupled to the host machine where the container is running. You can't easily move the data somewhere
Bind mounts have been around since the early days of Docker. Bind mounts have limited functionality compared to volumes. When you use a bind mount, a file or directory on the host machine is mounted into a container. The file or directory is referenced by its absolute path on the host machine. By contrast, when you use a volume, a new directory is created within Docker's storage directory on the h
Docker Desktop Overview Install Docker Desktop Install on MacUnderstand permission requirements for MacInstall on WindowsUnderstand permission requirements for WindowsInstall on Linux Installation per Linux distro Install on DebianInstall on FedoraInstall on UbuntuInstall on ArchSign in Explore Docker Desktop OverviewExplore ContainersExplore ImagesExplore VolumesExplore Builds (Beta)Resource Save
This page describes how to configure the Docker CLI to use proxies via environment variables in containers. This page doesn't describe how to configure proxies for Docker Desktop. For instructions, see configuring Docker Desktop to use HTTP/HTTPS proxies. If you're running Docker Engine without Docker Desktop, refer to Configure the Docker daemon to use a proxy to learn how to configure a proxy se
In terms of networking, a bridge network is a Link Layer device which forwards traffic between network segments. A bridge can be a hardware device or a software device running within a host machine's kernel. In terms of Docker, a bridge network uses a software bridge which lets containers connected to the same bridge network communicate, while providing isolation from containers that aren't connec
By default, when the Docker daemon terminates, it shuts down running containers. You can configure the daemon so that containers remain running if the daemon becomes unavailable. This functionality is called live restore. The live restore option helps reduce container downtime due to daemon crashes, planned outages, or upgrades. Note Live restore isn't supported for Windows containers, but it does
次のページ
このページを最初にブックマークしてみませんか?
『Docker for AWS Public Beta - Docker Blog』の新着エントリーを見る
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く