Merge pull request #1340 from docker/master

merging master to the patch release branch
This commit is contained in:
Dawn W 2019-09-26 17:21:38 -07:00 committed by GitHub
commit 4d93f1c1ef
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
4 changed files with 14 additions and 14 deletions

View File

@ -62,7 +62,7 @@ services.
web: web:
image: example/my_web_app:latest image: example/my_web_app:latest
links: depends_on:
- db - db
- cache - cache
@ -136,7 +136,7 @@ Start with a **docker-compose.yml**.
web: web:
image: example/my_web_app:latest image: example/my_web_app:latest
links: depends_on:
- db - db
db: db:
@ -147,7 +147,7 @@ export or backup.
dbadmin: dbadmin:
build: database_admin/ build: database_admin/
links: depends_on:
- db - db
To start a normal environment run `docker-compose up -d`. To run a database To start a normal environment run `docker-compose up -d`. To run a database
@ -177,9 +177,9 @@ is useful if you have several services that reuse a common set of configuration
options. Using `extends` you can define a common set of service options in one options. Using `extends` you can define a common set of service options in one
place and refer to it from anywhere. place and refer to it from anywhere.
Keep in mind that `links`, `volumes_from`, and `depends_on` are never shared Keep in mind that `volumes_from` and `depends_on` are never shared between
between services using `extends`. These exceptions exist to avoid implicit services using `extends`. These exceptions exist to avoid implicit
dependencies; you always define `links` and `volumes_from` locally. This ensures dependencies; you always define `volumes_from` locally. This ensures
dependencies between services are clearly visible when reading the current file. dependencies between services are clearly visible when reading the current file.
Defining these locally also ensures that changes to the referenced file don't Defining these locally also ensures that changes to the referenced file don't
break anything. break anything.
@ -233,7 +233,7 @@ You can also write other services and link your `web` service to them:
environment: environment:
- DEBUG=1 - DEBUG=1
cpu_shares: 5 cpu_shares: 5
links: depends_on:
- db - db
db: db:
image: postgres image: postgres
@ -264,7 +264,7 @@ common configuration:
command: /code/run_web_app command: /code/run_web_app
ports: ports:
- 8080:8080 - 8080:8080
links: depends_on:
- queue - queue
- db - db
@ -273,7 +273,7 @@ common configuration:
file: common.yml file: common.yml
service: app service: app
command: /code/run_worker command: /code/run_worker
links: depends_on:
- queue - queue
## Adding and overriding configuration ## Adding and overriding configuration

View File

@ -79,7 +79,7 @@ the install command on. DTR will be installed on the UCP worker defined by the
automatically reconfigured to trust DTR. automatically reconfigured to trust DTR.
* With DTR 2.7, you can [enable browser authentication via client * With DTR 2.7, you can [enable browser authentication via client
certificates](/ee/enable-authentication-via-client-certificates/) at install certificates](/ee/enable-client-certificate-authentication/) at install
time. This bypasses the DTR login page and hides the logout button, thereby time. This bypasses the DTR login page and hides the logout button, thereby
skipping the need for entering your username and password. skipping the need for entering your username and password.

View File

@ -356,4 +356,4 @@ From UCP 2.0: UCP 2.0 -> UCP 2.1 -> UCP 2.2
## Where to go next ## Where to go next
- [Upgrade DTR](/e/dtr/admin/upgrade/) - [Upgrade DTR](/ee/dtr/admin/upgrade/)

View File

@ -53,9 +53,9 @@ for a lot more information.
## Prevent Docker from manipulating iptables ## Prevent Docker from manipulating iptables
To prevent Docker from manipulating the `iptables` policies at all, set the It is possible to set the `iptables` key to `false` in the Docker engine's configuration file at `/etc/docker.daemon.json`, but this option is not appropriate for most users. It is not possible to completely prevent Docker from creating `iptables` rules, and creating them after-the-fact is extremely involved and beyond the scope of these instructions. Setting `iptables` to `false` will more than likely break container networking for the Docker engine.
`iptables` key to `false` in `/etc/docker/daemon.json`. This is inappropriate
for most users, because the `iptables` policies then need to be managed by hand. For system integrators who wish to build the Docker runtime into other applications, explore the [`moby` project](https://mobyproject.org/).
## Next steps ## Next steps