[SYMBOL][A][B][C][D][E][F][G][H][I][J][K][L][M][N][O][P][Q][R][S][T][U][V][W][Y][Z]
/counter endpoint, 2nd
# (hash sign)
-a flag, 2nd
abstractions
access control
access to devices
active option
ADD instruction, 2nd
adminer interface
adminer key, 2nd
adminer service, 2nd, 3rd
affinity
agents, 2nd
all-in-one images
All-in-One pattern
- -all-tags option
Amazon Web Services (AWS), 2nd
anti-affinity
Apache Cassandra project
apache2 process
api service, 2nd, 3rd, 4th, 5th, 6th, 7th
apk package manager
AppArmor profile, 2nd
app-image, 2nd
app-image-debug stage
application artifacts
applications
configurations and, separating
config resource
deploying applications
managing config resources directly
deploying to Swarm clusters
cluster resource types
defining application and its dependencies by using Docker services
using docker stack command
apt package manager, 2nd
apt-get tool, 2nd
apt-get update, Debian
ARG instruction
ARG VERSION instruction
artifact confidentiality
artifact integrity
attachable network
AUDIT_CONTROL capability
auto tag
automated resurrection and replication
automated rollout
autoscaling services
availability control
- -availability option
AWS (Amazon Web Services), 2nd
aws program
AWS_ACCESS_KEY_ID
AWS_DEFAULT_REGION
AWS_SECRET_ACCESS_KEY
backoff strategy
backoff-detector container
bandwidth overhead
base.version label, 2nd
best practices
bind mounts
blind mount points
block sequences (lists)
block style
bridge network, 2nd
build command
Build Plus Multiple Runtimes pattern, 2nd
Build Plus Runtime pattern
builder stage, 2nd
BUILD_ID tag, 2nd
BusyBox init
-c flag
CA (certificate authority)
CAIID (content-addressable image identifier)
CAP drop
- -cap-add flag
- -cap-drop flag
CAP_NET_ADMIN
Cassandra client tool (CQLSH), 2nd
cass-shared volume
CD (continuous delivery), 2nd
CentOS
certificate authority (CA)
CERT_PRIVATE_KEY_FILE variable
CFS (Completely Fair Scheduler)
cgroups
Chef Inspec tool
chroot system call, 2nd
CI (continuous integration), 2nd
CID (container ID) file
- -cidfile
cleanup, containers and
CLI (command-line interface)
CLIENT_ID environment variable
Cloudflare
CMD instruction, 2nd
command line, working with registries from
command-line interface (CLI)
command property
commit subcommand
Completely Fair Scheduler (CFS)
Compose
declarative service environments with
collections of
YAML primer
load balancing, service discovery, and networks with
- -compose-file option
composite key
confidentiality, artifact
config command
Config property
config.common.yml file
ConfigID
configs key
Configuration Image per Deployment Stage pattern
configurations
applications and, separating
config resource
deploying applications
managing config resources directly
distribution and management
secrets and
container ID (CID) file
container networking
custom DNS configuration
externalizing network management
firewalls, lack of
network policies, lack of
NodePort publishing
Container Structure Test (CST) tool
ContainerConfig.OnBuild
containers, 2nd, 3rd, 4th
building environment-agnostic system
environment variable injection
read-only filesystems
building images from
committing new images
configuring image attributes
packaging “Hello, World”
preparing packaging for Git
reviewing filesystem changes
cleanup and
conflicts between, eliminating
container state and dependencies
flexible container identification
creating and starting
durable
automatically restarting containers
using PID, 2nd
filesystem abstraction and isolation
for isolation
interactive, running
listing, stopping, restarting, and viewing output of
PID namespace and
shipping containers
virtualization different than
content-addressable image identifier (CAIID)
context
context switch
continuous delivery (CD), 2nd
continuous deployment
continuous integration (CI), 2nd
COPY instruction, 2nd, 3rd
copy-on-write pattern, 2nd
corporate storage networks
cost, of distribution
CPU resources
cpus option
- -cpuset-cpus flag
- -cpu-shares flag
- -cpu-shares value
CQLSH (Cassandra client tool), 2nd
create command
CST (Container Structure Test) tool
curl command, 2nd
current state
custom DNS configuration
custom image distribution infrastructure
DAB (Distributed Application Bundle)
DAEMON Tools
daemons
databases
db-data volume
Debian
Debian Linux Buster
Debian Stretch base image
debian:buster-slim
debian:stretch platform
declarative service environments with Compose
collections of services
YAML primer
default stage
depends_on key
deploy command
deploy key
deploy property
DEPLOY_ENV variable, 2nd
desired state
- -detach (-d) flag
detached containers
dev tag
- -device flag
devices, access to
diaweb container
diff command
diff subcommand, 2nd
DigitalOcean
Distributed Application Bundle (DAB)
distribution
image source-distribution workflows
manual image publishing and
method of, choosing
image distribution spectrum
selection criteria
private registries
consuming images from registry
performance of
registry image, using
publishing with hosted registries
private hosted repositories
public repositories
Distribution registry
- -dns flag
DNS service, Cloudflare
- -dns-search flag
Docker
containers and
“Hello World” example
importance of
in larger ecosystem
overview of
problems solved by
getting organized
improving portability
protecting computer
use of, when and where.
See also containers.
Docker API
docker build command, 2nd, 3rd, 4th
docker CLI, 2nd
Docker CloudStor
docker command, 2nd
docker command-line tool, 2nd
docker config command, 2nd
docker config create command
docker container commit command, 2nd, 3rd
docker container create command, 2nd, 3rd, 4th, 5th, 6th
docker container diff command, 2nd
docker container export command, 2nd
docker container ps command, 2nd, 3rd
docker container rm -f command
docker container run command, 2nd, 3rd, 4th, 5th, 6th, 7th
docker cp command, 2nd
docker create command, 2nd, 3rd, 4th, 5th, 6th
docker diff command
Docker Engine API, 2nd
Docker Enterprise Edition
docker exec command, 2nd
docker help command
Docker Hub, 2nd, 3rd, 4th, 5th, 6th
docker image build command, 2nd, 3rd, 4th, 5th, 6th, 7th
docker image inspect command
docker image load command
docker image ls registry
docker image pull command, 2nd
docker image push command
docker image save command, 2nd
docker image tag command
docker images command, 2nd
docker import command
docker inspect command, 2nd, 3rd, 4th, 5th
docker kill command
docker load command, 2nd, 3rd
docker login command, 2nd
docker logout command
docker logs agent command
docker logs command
docker logs diaweb command
docker logs mailer command
docker network command
docker network list command
docker network ls command
docker node ls command
docker node update command
docker plugin command
docker port command
docker ps -a command
docker ps command, 2nd, 3rd, 4th, 5th
docker pull command, 2nd, 3rd
docker push command
docker rename command
docker restart agent command
docker restart mailer command
docker restart web command
docker rm command
docker rm -f command
docker rm -v flag
docker rmi command, 2nd
docker rmi syntax
docker run - -rm flag
docker run command, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th, 11th, 12th, 13th
docker save command, 2nd, 3rd
docker secret command
docker secret create command
docker service command
docker service create command, 2nd
docker service inspect command, 2nd
docker service inspect hello-world command
docker service inspect my-databases_postgres command
docker service logs command
docker service ls command, 2nd
docker service ps command, 2nd, 3rd, 4th
docker service ps greetings_prod_api command
docker service ps hello-world command, 2nd
docker service ps multi-tier-app_api
docker service remove command
docker service rollback subcommand
docker service scale command
docker stack command, 2nd
docker stack deploy command, 2nd, 3rd, 4th, 5th
docker stack ps command
docker stack subcommands
docker start command
docker stats command
docker stop command, 2nd
Docker Swarm
clustering with
communicating with services running on Swarm cluster
load balancing
overlay networks
routing client requests to services by using Swarm routing mesh
deploying applications to Swarm clusters
cluster resource types
defining application and its dependencies
using docker stack command
placing service tasks on clusters, 2nd
constraining where tasks run
deploying real applications onto real clusters
replicating services
using global services for one task per node
docker swarm init
docker swarm join
docker swarm join-token
docker tag command, 2nd
docker top command
docker volume command
docker volume create command, 2nd
docker volume inspect command
docker volume list command
docker volume ls command
docker volume prune command
docker volume remove command
Dockerfiles, 2nd, 3rd, 4th
distributing projects with, on GitHub
downstream build-time behavior, injecting
filesystem instructions
maintainable, creating
metadata instructions
naming Dockerfiles
organizing metadata with labels
overview
overview
packaging Git with
docker_hello_world keyspace
dockerinaction client
dockerinaction username
docker-machine
docker-machine ip command
docker-machine ssh command
docker.sock
dockremap
double-quote style
downstream build-time behavior, injecting
downstream Dockerfile
drain option
driver_opts
Drone
dst parameter
durable containers
automatically restarting containers
using PID, 2nd
echo command
echo hello world value
echo service, 2nd
echo-global service
- -email flag
endpoint-mode property
end-to-end encryption
engine.labels attribute
- -entrypoint flag, 2nd
ENTRYPOINT instruction, 2nd, 3rd, 4th
entrypoints, 2nd
- -env (-e) flag, 2nd
ENV instruction
environment property
environment variable injection
environment-agnostic system, building
environment variable injection
read-only filesystems
environmental preconditions validation
env_specific_config resource, 2nd, 3rd
env_specific_config_v1
env_specific_config_v2
env_specific_config_vNNN
escape sequences
Ethernet interface, 2nd
exec command
exec subcommand
exit command
expertise, required for distribution method
export command, 2nd
export subcommand
EXPOSE instruction
external: true property
f option
- -file (-f) flag, 2nd, 3rd
file extensions
filesystems
instructions, Dockerfiles
structure
union filesystems, weaknesses of
firewalls, lack of
First Secret Problem
flag
flat filesystems, exporting and importing
flexible container identification
flow collections
foo network
- -force (-f) flag
- -format (-f) option
FROM instruction, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th
FROM ubuntu:latest
FTP (File Transport Protocol)
FTP-based distribution infrastructure
ftp-server container
Gathering Metadata message
GID (group ID)
Git
packaging Dockerfiles with
preparing packaging for
GitHub, distributing projects with Dockerfiles on
global mode, 2nd, 3rd, 4th
global value
Go programming language
Golang, 2nd
golang repository
Google Container Registry
gosu program
greetings service, 2nd, 3rd, 4th
greetings_dev service
greetings_dev_env_specific_config resource
group ID (GID)
hadolint linting tool
hardening images
content addressable image identifiers
SUID and SGID permissions
user permissions
hash sign ( #)
health checks
HEALTHCHECK instruction, 2nd, 3rd
- -health-cmd flag
“Hello, World”, 2nd
automated resurrection and replication
automated rollout
packaging
service health and rollback
hello-registry image
hello-world service, 2nd, 3rd
high-level system services
Homebrew
host driver
host network
host value
.HostConfig.CapAdd member
.HostConfig.CapDrop member
hosted registries, publishing with
private hosted repositories
public repositories
hosted registry
- -hostname flag
hostname flag, 2nd
HTTP (Hypertext Transfer Protocol)
HTTP POST message
http-client image
http-client program
httpping program
https
–i command
id command
identifier (unique ID)
IMAGE ID column
image layers
image pipelines
goals of
orchestrating build with make
patterns for building images
all-in-one images
image build pattern maturity
separate build and runtime images
variations of runtime image via multistage builds
patterns for tagging images
background
configuration image per deployment stage
continuous delivery with unique tags
semantic versioning
record metadata at image build time
testing images in build pipelines
image property, 2nd
image source distribution, GitHub
image source-distribution workflows
image tag mutation
image-dev container
ImageMagick
images
as files
building from containers
committing new images
configuring image attributes
packaging “Hello, World”
preparing packaging for Git
reviewing filesystem changes
hardening
content addressable image identifiers
SUID and SGID permissions
user permissions
startup scripts and multiprocess containers, using
environmental preconditions validation
health checks
initialization processes. .
See Dockerfiles.
imperative pattern
import command, 2nd, 3rd
indexes, 2nd
info subcommand
ingress network, 2nd, 3rd
init command
- -init option
init systems
initialization processes
in-memory storage
insecure.key
inspect command, 2nd
installing software
Docker registries, working with from command line
from Dockerfiles
installation files and isolation
container filesystem abstraction and isolation
filesystem structure
image layers
layer relationships
union filesystems, weaknesses of
using alternative registries
using Docker Hub from website
working with images as files
integrity, artifact
- -interactive (-i) option
interactive containers, running
interfaces, network
intermediate images
interprocess communication (IPC)
IP (Internet Protocol)
IP address
IPC (interprocess communication)
- -ipc flag
IPC namespace
IPC primitives
- -ipc=host option
iptables rule
ipvlan driver
ipvs rule
isolation, containers and
jail
Jenkins
JVM (Java Virtual Machine), 2nd
key/value pairs
kill program, Linux
Kubernetes, 2nd
label confinement, SELinux
- -label flag
LABEL instruction, 2nd
LABEL maintainer
Label Schema project, 2nd
- -label-add option
- -label-rm option
LAMP (Linux, Apache, MySQL PHP) stack
lamp-test container
latest tag, 2nd, 3rd, 4th
layer IDs
layer relationships
level label, SELinux
LFTP client
lighthouse container
linting tool
Linux Security Modules (LSM)
Linux, Apache, MySQL PHP (LAMP) stack
Linux’s user (USR) namespace
lists (block sequences)
load balancing, 2nd
load command
local value
local volume driver
local volume plugin
localhost node
logging service
login command
logs command
longevity control
loopback interface, 2nd
low-level system services
LSM (Linux Security Modules)
-m flag
MAC_ADMIN capability
macvlan driver
mailer container, 2nd
mailer program
mailer-base image
mailer-logging image
Major.Minor.Patch scheme, 2nd
make command
manager1 node, 2nd, 3rd
manager2 node, 2nd
manager3 node
manual image publishing
mariadb container
MariaDB database
mariadb key, 2nd
mariadb service
maturity
Maven tool
Memcached
- -memory flag
memory limits
Mercurial
metaconflicts, eliminating
container state and dependencies
flexible container identification
metadata
naming Dockerfiles
organizing metadata with labels
overview
record metadata at image build time, 2nd
MNT namespaces, 2nd, 3rd
mod_ubuntu container, 2nd
MongoDB
- -mount flag, 2nd
- -mount option
mount points
blind
shared
multistage Dockerfile
multi-tier-app_api, 2nd
multi-tier-app_postgres
multi-tier-app_private network, 2nd
multi-tier-app_public
mutable tags
my-databases stack
my-databases_default network
my-databases_mariadb
MySQL, 2nd, 3rd
- -name flag
namespaces, Linux
NAT (network address translation)
nc client program
- -net host flag
NET namespace
NET_ADMIN capability
NET_RAW capability
network address translation (NAT)
- -network flag
- -network host option
network interface
network-explorer container
networks
overview
policies for, lack of
with Compose
networks property
NGINX web server, 2nd, 3rd, 4th, 5th
nginx:latest, 2nd, 3rd
- -no-cache flag
node.hostname attribute
node.id attribute
NodePort publishing
node.role attribute
- -no-healthcheck flagp
none network, 2nd, 3rd
- -no-trunc option
npm package manager, 2nd
nslookup lighthouse
null driver
–o flag
ONBUILD instruction
onbuild suffixes
- -output (-o) option
overlay networks, 2nd
discovering services on
isolating service-to-service communication with
OverlayFS
package managers
passwd file
- -password flag
pause option
peer-to-peer networks
Permission denied message
pg-data volume
pgdata volume
PID (process identifier) namespace, 2nd, 3rd
PID, 2nd
- -pid flag
pip package manager
placement constraints
plain style
plath container
Play with Docker (PWD), 2nd
polymorphic tools
port conflict
portability, improving
ports
ports property
postgres database
postgres key
postgres service, 2nd, 3rd, 4th, 5th
postgres user
POSTGRES_* environment variable
POSTGRES_DB variable
POSTGRES_HOST variable
POSTGRES_PASSWORD variable
PostgreSQL database, 2nd
postgresql driver
POSTGRES_USER variable
private hosted repositories
private network, 2nd, 3rd
private registries
consuming images from registry
performance of
registry image, using
private zone
- -privileged flag
process identifier (PID) namespace, 2nd, 3rd
protecting computer
protocols, network
- -prune flag
ps command
public hosted repositories
public network, 2nd, 3rd
- -publish (-p) option
PublishMode
pull commands
push command, 2nd
PWD (Play with Docker), 2nd
Quay.io, 2nd
- -quiet (-q) flag
reader container
read-only filesystems
- -read-only flag
readonly=true argument
registries
alternative
working with from command line
registry repository
remove command
replicas property
replicated mode
replicated services
repositories
reserved status
resource controls
adjusting OS feature access with capabilities
allowances, setting
access to devices
CPU
memory limits
building use-case-appropriate containers
applications
high-level system services
low-level system services
running containers with full privileges
sharing memory
strengthening containers with enhanced tools
users and
Linux’s user (USR) namespace
run-as users
UID remapping
volumes and
- -restart flag, 2nd
restart_policy
REX-Ray, 2nd
rm command
- -rm flag
rm operation
- -rm option
role label, SELinux
roll forward command
rollback
- -rollback flag
rollout, automated
rsync tool
rules
run command, 2nd, 3rd, 4th
RUN instruction, 2nd, 3rd, 4th, 5th
run-as users
runit, 2nd
Running state
Running x minutes ago state
runtime stage, 2nd
Rust programming language
scanners, using to identify vulnerabilities
scope property, 2nd
scp tooling
scratch image, 2nd
scratch repository
$SECRET variable
secrets, 2nd
secrets key, 2nd
security modules
- -security-opt flag
sed command
SELinux
semantic versioning
Serverspec
Service converged
service create subcommand
service rollback subcommand
service-level agreement (SLA)
services, 2nd, 3rd
autoscaling
declarative service environments with Compose
collections of services
YAML primer
“Hello World”
automated resurrection and replication
automated rollout
service health and rollback
load balancing, service discovery, and networks with Compose
placing service tasks on clusters
constraining where tasks run
deploying real applications onto real clusters
replicating services
using global services for one task per node
running on Swarm cluster, communicating with
load balancing
overlay networks
routing client requests to services by using Swarm routing mesh
stateful services and preserving data
services key
services property
- -ServiceV2 flag
setgid attribute
setuid attribute
sh program
shared mount points
shell form
shell variables
shipping containers
short-form flags
SIG_HUP signal
SIG_KILL signal
Simple Email Service
SLA (service-level agreement)
software
finding
identifying
installation files and isolation
container filesystem abstraction and isolation
filesystem structure
image layers
layer relationships
union filesystems, weaknesses of
installing
from Dockerfiles
using alternative registries
using Docker Hub from website
working with Docker registries from command line
working with images as files
Spring Boot framework
src parameter
SSH protocol
stack deploy command
stacks
start period
startup scripts and multiprocess containers, 2nd
environmental preconditions validation
health checks
initialization processes
stateful services
STATUS column
stop command
storage
in-memory
mount points
blind
shared
volume plugins
volumes
cleaning up
container-independent data management using
using with NoSQL databases
- -storage-driver (-s) option
subgid map
subuid map
success status
SUID and SGID permissions
suid-enabled program
supervisord process, 2nd, 3rd
swap space
Swarm, 2nd, 3rd, 4th, 5th, 6th
Swarm Admin Guide
swarm value
Swarm3K project
SYS_ADMIN capability
SYSLOG capability
SYS_MODULE capability
SYS_NICE capability
SYS_RAWIO capability
SYS_RESOURCE capability
System up message
systemd
SYS_TIME capability
SysV
-t option
- -tag (-t) flag
tag command
tagging images, patterns for
background
configuration image per deployment stage
continuous delivery with unique tags
semantic versioning
TAR archive files
- -target option
tasks
TCP (Transmission Control Protocol)
testing images in build pipelines
time-out
tini
TLS (Transport Layer Security)
tmpfs device
tmpfs filesystem, 2nd
tmpfs-mode option
tmpfs-size option
Tomcat
top subcommand
Transmission Control Protocol (TCP)
Transport Layer Security (TLS)
transportation speed, of distribution method
Travis CI
tree root point
trusted repository
- -tty (-t) option
type label, SELinux
type option
type=bind option
Ubuntu image, 2nd
ubuntu:latest
ubuntu:latest image, 2nd
ubuntu-git images, 2nd, 3rd
ubuntu-git:removed image
UDP (User Datagram Protocol)
UFS (union filesystem), 2nd, 3rd, 4th
UID (user ID)
UID remapping
unconfined value
union filesystem (UFS), 2nd, 3rd, 4th
unique ID (identifier)
unique tags
Unique Tags scheme
update command
update_config
- -update-failure-action flag
- -update-max-failure-ratio flag
Upstart
- -user (-u) flag
user (USR) namespace, 2nd, 3rd
User Datagram Protocol (UDP)
user ID (UID)
USER instruction, 2nd
user label, SELinux
user namespaces
user permissions
user space memory
- -username flag
username/repository pattern
user-network
userns-remap option, 2nd
USR (Linux’s user) namespace
USR (user) namespace, 2nd, 3rd
UTS namespace
v option
v2 tag, 2nd
VCS (version-control system)
version property
VERSION variable, 2nd
version-control system (VCS)
versioning practices
VIP (virtual IP) addresses, 2nd, 3rd
vip endpoint mode
virtual machine (VM), 2nd, 3rd, 4th
VirtualIPs
virtualization, containers different than
visibility, of distribution method
VM (virtual machine), 2nd, 3rd, 4th
_vNNN character sequence
- -volume flag
VOLUME instruction
volume plugins
volumes, 2nd, 3rd, 4th
cleaning up
container-independent data management using
using with NoSQL databases
volumes key
volumes property
- -volumes-from flag
vulnerabilities, using scanners to identify
watcher program
web browsers
WEB_HOST environment variable
wget program
whoami command
Windows Subsystem for Linux (WSL)
WordPress, 2nd, 3rd, 4th, 5th
WORDPRESS_AUTH_KEY environment variable
WORDPRESS_AUTH_SALT environment variable
WORDPRESS_DB_HOST environment variable
WORDPRESS_DB_NAME environment variable
WORDPRESS_DB_PASSWORD environment variable
WORDPRESS_DB_USER environment variable
WORDPRESS_LOGGED_IN_KEY environment variable
WORDPRESS_LOGGED_IN_SALT environment variable
WORDPRESS_NONCE_KEY environment variable
WORDPRESS_NONCE_SALT environment variable
WORDPRESS_SECURE_AUTH_KEY environment variable
WORDPRESS_SECURE_AUTH_SALT environment variable
WORKDIR instruction
wp container, 2nd
WSL (Windows Subsystem for Linux)
YAML (Yet Another Markup Language), 2nd
YUM