Server IP : 195.201.23.43 / Your IP : 3.144.40.81 Web Server : Apache System : Linux webserver2.vercom.be 5.4.0-192-generic #212-Ubuntu SMP Fri Jul 5 09:47:39 UTC 2024 x86_64 User : kdecoratie ( 1041) PHP Version : 7.1.33-63+ubuntu20.04.1+deb.sury.org+1 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals, MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : ON Directory : /usr/share/doc/docker.io/ |
Upload File : |
Docker on Debian ================ To enable docker memory limitation, the kernel needs to be loaded with boot parameters: cgroup_enable=memory swapaccount=1. This is because enabling memory cgroup support has some run-time overhead, and kernel maintainers don't want to slow down systems unnecessarily. http://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg764104.html https://github.com/docker/docker/issues/396 To instruct the kernel to enable memory cgroup support, edit /etc/default/grub and extend GRUB_CMDLINE_LINUX_DEFAULT like: GRUB_CMDLINE_LINUX_DEFAULT="cgroup_enable=memory swapaccount=1" Then run update-grub, and reboot. It's worth pointing out that upstream maintains a "check-config.sh" script for verifying not only proper kernel configuration (which isn't terribly relevant in the Debian context), but also the host system configuration, especially and including whether a properly mounted cgroup hierarchy can be found. If you're using cgroupfs-mount or systemd, chances are very high that you have one, but if not, you're likely to see strange behavior. In the docker.io package, one can find the "check-config.sh" script under "/usr/share/docker.io/contrib/check-config.sh", which when run (does NOT require root/sudo) will report on problems with your installation/configuration. As noted in the upstream documentation (https://docs.docker.io), Docker will allow non-root users in the "docker" group to access "docker.sock" and thus communicate with the daemon. To add yourself to the "docker" group, use something like: adduser YOURUSER docker As also noted in the upstream documentation, the "docker" group (and any other means of accessing the Docker API) is root-equivalent. If you don't trust a user with root on your box, you shouldn't trust them with Docker either. If you are interested in further information about the security aspects of Docker, please be sure to read the "Docker Security" article in the upstream documentation: https://docs.docker.com/engine/security/security/Private