一. Docker的安裝
-
準(zhǔn)備
確保內(nèi)核版本大于3.1 并更新yumuname -r yum update -
添加倉(cāng)庫(kù) 安裝
yum install -y yum-utils device-mapper-persistent-data lvm2 # 安裝yum的輔助包 yum-config-manager --add-repo http://mirrors.aliyun.com/docker-ce/linux/centos/docker-ce.repo # 設(shè)置阿里的鏡像 yum install docker-ce # 安裝 -
啟動(dòng)并加入開機(jī)啟動(dòng)
systemctl start docker systemctl enable docker docker version -
配置遠(yuǎn)程訪問
vim /usr/lib/systemd/system/docker.service把 ExecStart=/usr/bin/dockerd 這一行改為
ExecStart=/usr/bin/dockerd -H unix:///var/run/docker.sock -H tcp://0.0.0.0:2375重啟docker服務(wù)
systemctl daemon-reload #通知systemd重載配置文件 systemctl restart docker此時(shí)訪問 http://IP:2375/version 可以看到版本為17.05.0-ce
-
設(shè)置國(guó)內(nèi)鏡像源
新增/修改 /etc/docker/daemon.json{ "registry-mirrors": ["https://registry.docker-cn.com"] } -
安裝 docker-compose
參見GitHub上的shelldocker-compose --version # 測(cè)試安裝成功了嗎 TLS
在/etc/docker目錄下新建shell
#!/bin/bash
#
# Created by L.STONE <web.developer.network@gmail.com>
# -------------------------------------------------------------
# 自動(dòng)創(chuàng)建 Docker TLS 證書
# -------------------------------------------------------------
# 以下是配置信息
# --[BEGIN]------------------------------
CODE="ADMIN"
IP="139.196.122.34"
PASSWORD="ADMIN"
COUNTRY="CN"
STATE="sd"
CITY="qd"
ORGANIZATION="redsoft"
ORGANIZATIONAL_UNIT="Dev"
COMMON_NAME="$IP"
EMAIL="dotff@qq.com"
# --[END]--
# Generate CA key
openssl genrsa -aes256 -passout "pass:$PASSWORD" -out "ca-key-$CODE.pem" 4096
# Generate CA
openssl req -new -x509 -days 365 -key "ca-key-$CODE.pem" -sha256 -out "ca-$CODE.pem" -passin "pass:$PASSWORD" -subj "/C=$COUNTRY/ST=$STATE/L=$CITY/O=$ORGANIZATION/OU=$ORGANIZATIONAL_UNIT/CN=$COMMON_NAME/emailAddress=$EMAIL"
# Generate Server key
openssl genrsa -out "server-key-$CODE.pem" 4096
# Generate Server Certs.
openssl req -subj "/CN=$COMMON_NAME" -sha256 -new -key "server-key-$CODE.pem" -out server.csr
echo "subjectAltName = IP:$IP,IP:127.0.0.1" >> extfile.cnf
echo "extendedKeyUsage = serverAuth" >> extfile.cnf
openssl x509 -req -days 365 -sha256 -in server.csr -passin "pass:$PASSWORD" -CA "ca-$CODE.pem" -CAkey "ca-key-$CODE.pem" -CAcreateserial -out "server-cert-$CODE.pem" -extfile extfile.cnf
# Generate Client Certs.
rm -f extfile.cnf
openssl genrsa -out "key-$CODE.pem" 4096
openssl req -subj '/CN=client' -new -key "key-$CODE.pem" -out client.csr
echo extendedKeyUsage = clientAuth >> extfile.cnf
openssl x509 -req -days 365 -sha256 -in client.csr -passin "pass:$PASSWORD" -CA "ca-$CODE.pem" -CAkey "ca-key-$CODE.pem" -CAcreateserial -out "cert-$CODE.pem" -extfile extfile.cnf
rm -vf client.csr server.csr
chmod -v 0400 "ca-key-$CODE.pem" "key-$CODE.pem" "server-key-$CODE.pem"
chmod -v 0444 "ca-$CODE.pem" "server-cert-$CODE.pem" "cert-$CODE.pem"
# 打包客戶端證書
mkdir -p "tls-client-certs-$CODE"
cp -f "ca-$CODE.pem" "cert-$CODE.pem" "key-$CODE.pem" "tls-client-certs-$CODE/"
cd "tls-client-certs-$CODE"
tar zcf "tls-client-certs-$CODE.tar.gz" *
mv "tls-client-certs-$CODE.tar.gz" ../
cd ..
rm -rf "tls-client-certs-$CODE"
# 拷貝服務(wù)端證書
mkdir -p /etc/docker/certs.d
cp "ca-$CODE.pem" "server-cert-$CODE.pem" "server-key-$CODE.pem" /etc/docker/certs.d/
# /etc/docker/daemon.json
# {
# "tlsverify": true,
# "tlscacert": "/etc/docker/certs.d/ca.pem",
# "tlscert": "/etc/docker/certs.d/server-cert.pem",
# "tlskey": "/etc/docker/certs.d/server-key.pem",
# "hosts": ["tcp://0.0.0.0:2376", "unix:///var/run/docker.sock"]
# }
echo " - 修改 /etc/docker/daemon.json 文件"
cat <<EOF
vi /etc/docker/daemon.json
{
"tlsverify": true,
"tlscacert": "/etc/docker/certs.d/ca-$CODE.pem",
"tlscert": "/etc/docker/certs.d/server-cert-$CODE.pem",
"tlskey": "/etc/docker/certs.d/server-key-$CODE.pem",
"hosts": ["tcp://0.0.0.0:2376", "unix:///var/run/docker.sock"]
}
EOF
# 拷貝客戶端證書文件
# cp -v {ca,cert,key}.pem ~/.docker
# 客戶端遠(yuǎn)程連接
# docker -H 192.168.1.130:2376 --tlsverify --tlscacert ~/.docker/ca.pem --tlscert ~/.docker/cert.pem --tlskey ~/.docker/key.pem ps -a
echo "docker -H $IP:2376 --tlsverify --tlscacert ~/.docker/ca-$CODE.pem --tlscert ~/.docker/cert-$CODE.pem --tlskey ~/.docker/key-$CODE.pem ps -a"
# 客戶端使用 cURL 連接
# curl --cacert ~/.docker/ca.pem --cert ~/.docker/cert.pem --key ~/.docker/key.pem https://192.168.1.130:2376/containers/json
echo "curl --cacert ~/.docker/ca-$CODE.pem --cert ~/.docker/cert-$CODE.pem --key ~/.docker/key-$CODE.pem https://$IP:2376/containers/json"
echo -e "\e[1;32mAll be done.\e[0m"
執(zhí)行腳本,設(shè)置 /usr/lib/systemd/system/docker.service
ExecStart=/usr/bin/dockerd -H unix:///var/run/docker.sock -D -H tcp://0.0.0.0:2376 --tlsverify --tlscacert=/etc/docker/certs.d/ca.pem --tlscert=/etc/docker/certs.d/server-cert.pem --tlskey=/etc/docker/certs.d/server-key.pem
重新加載配置文件重啟docker。下載tls-client-certs-.tar 設(shè)置idea
URL: https://IP:2376
把下載的文件夾放上,主要去掉-
二 . rabbitmq
- 拉取鏡像
docker pull rabbitmq:management
- 配置命令
#!/bin/bash
docker run -d --name rabbit -e RABBITMQ_DEFAULT_USER=admin -e RABBITMQ_DEFAULT_PASS=redSoft123 -p 5672:5672 -p 15672:15672 rabbitmq:management
添加執(zhí)行權(quán)限 執(zhí)行ok
- 常用命令
停止: docker ps
docker stop [id]
如果修改了啟動(dòng)shell的文件 則 docker rm [id]
啟動(dòng) docker start [id]
初次啟動(dòng) 執(zhí)行如上腳本
三. redis
- 配置命令
#!/bin/bash
docker run --name redis -p 6379:6379 -v /Users/fengfan/doc/temp/redis_temp_data:/data -d redis:latest redis-server --appendonly yes --requirepass "123456"