The role of the docker cluster: abstract several Docker hosts into a whole, and uniformly manage various Docker resources on these Docker hosts through an entrance (cluster manager). The advantages of docker clusters include: scalable expansion, rolling upgrade, fast deployment and online deployment, etc.
The operating environment of this tutorial: linux5.9.8 system, docker-1.13.1 version, Dell G3 computer.
What is the use of docker cluster?
A cluster is a group of multiple machines running docker and added to a group. After joining the cluster, you can continue to run your own docker commands, but now these machines are managed by the cluster manager in the cluster. executed on.
To put it simply, it abstracts several Docker hosts into a whole, and manages various Docker resources on these Docker hosts through one entrance (cluster manager).
For large companies, docker clusters have great advantages, including scalable expansion, rolling upgrades, and fast deployment and online deployment.
Docker container can package your program in the Linux system, and then isolate your program from other programs. It is equivalent to installing a software on a virtual machine, which has nothing to do with the software on the computer. Contact, but the biggest difference between it and a virtual machine is that its performance overhead is particularly small.
The machines in the cluster can be physical or virtual. After joining the group, each machine is called a node. The cluster manager can use different strategies to manage running containers, such as: emptyest node, which is used to fill the least utilized containers; global to ensure that each machine can only get one instance of the specified container service.
You can write these policies into files to execute the cluster manager's policies.
The cluster manager is the only machine in the cluster that can execute commands. You can also authorize other machines to join the cluster management work. Authorized machines can only do what Workers are just there to provide capacity and cannot tell other machines what to do or what not to do.
After docker turns on the cluster mode, your machine becomes a cluster manager, and then the commands run by docker will be commands to manage the cluster, not just run on your current machine.
docker cluster manager-Swarm
Docker Swarm includes two aspects: an enterprise-level Docker security cluster, and a microservice application orchestration engine.
In terms of clustering, Swarm organizes one or more Docker nodes so that users can manage them in a cluster.
Swarm has built-in encrypted distributed cluster store, encrypted network, public TLS (Mutual TLS), secure cluster access token (Secure Cluster Join Token) and a A set of PKI (Public Key Infrastructure) that simplifies digital certificate management. We can add or delete nodes freely.
In terms of orchestration, Swarm provides a rich set of APIs that make it easy to deploy and manage complex microservice applications. By defining your application in a declarative configuration file, you can deploy it using native Docker commands.
In addition, you can even perform rolling upgrades, rollbacks, and expansion and contraction operations, which can also be completed based on simple commands.
In the past, Docker Swarm was an independent product based on the Docker engine. Since Docker version 1.12, it has been fully integrated into the Docker engine and can be enabled by executing a single command. By 2018, it will be able to deploy and manage Kubernetes applications in addition to native Swarm applications.
Swarm's configuration and status information is stored in a distributed etcd database located on all management nodes. The database runs in memory and keeps data up to date. The best thing about this database is that it requires almost no configuration, it is installed as part of Swarm and requires no administration.
Regarding cluster management, the biggest challenge is ensuring its security. When setting up a Swarm cluster you will inevitably use TLS as it is tightly integrated with Swarm.
In today's era of increasing security awareness, such a tool deserves to be vigorously promoted. Swarm uses TLS for communication encryption, node authentication, and role authorization. Automatic Key Rotation is the icing on the cake! It works silently in the background, and users don’t even notice the existence of this feature.
Regarding application orchestration, the smallest scheduling unit in Swarm is a service. It was introduced with Swarm and is a new object element in the API. It encapsulates some advanced features based on containers and is a higher-level concept. When a container is encapsulated in a service, we call it a task or a copy. Features such as expansion and contraction, rolling upgrade, and simple rollback are added to the service.
Recommended learning: "docker video tutorial"
The above is the detailed content of What is the use of docker cluster?. For more information, please follow other related articles on the PHP Chinese website!

Docker container startup steps: Pull the container image: Run "docker pull [mirror name]". Create a container: Use "docker create [options] [mirror name] [commands and parameters]". Start the container: Execute "docker start [Container name or ID]". Check container status: Verify that the container is running with "docker ps".

The methods to view Docker logs include: using the docker logs command, for example: docker logs CONTAINER_NAME Use the docker exec command to run /bin/sh and view the log file, for example: docker exec -it CONTAINER_NAME /bin/sh ; cat /var/log/CONTAINER_NAME.log Use the docker-compose logs command of Docker Compose, for example: docker-compose -f docker-com

You can query the Docker container name by following the steps: List all containers (docker ps). Filter the container list (using the grep command). Gets the container name (located in the "NAMES" column).

Create a container in Docker: 1. Pull the image: docker pull [mirror name] 2. Create a container: docker run [Options] [mirror name] [Command] 3. Start the container: docker start [Container name]

Four ways to exit Docker container: Use Ctrl D in the container terminal Enter exit command in the container terminal Use docker stop <container_name> Command Use docker kill <container_name> command in the host terminal (force exit)

Methods for copying files to external hosts in Docker: Use the docker cp command: Execute docker cp [Options] <Container Path> <Host Path>. Using data volumes: Create a directory on the host, and use the -v parameter to mount the directory into the container when creating the container to achieve bidirectional file synchronization.

The process of starting MySQL in Docker consists of the following steps: Pull the MySQL image to create and start the container, set the root user password, and map the port verification connection Create the database and the user grants all permissions to the database

How to restart the Docker container: get the container ID (docker ps); stop the container (docker stop <container_id>); start the container (docker start <container_id>); verify that the restart is successful (docker ps). Other methods: Docker Compose (docker-compose restart) or Docker API (see Docker documentation).


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Zend Studio 13.0.1
Powerful PHP integrated development environment

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

EditPlus Chinese cracked version
Small size, syntax highlighting, does not support code prompt function

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Safe Exam Browser
Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.