- Mastering Docker Enterprise
- Mark Panthofer
- 63字
- 2021-07-02 12:30:16
Deploying a PoC application to a Docker Enterprise cluster
In order to secure access to a Docker Enterprise cluster, we use Docker's role-based access control system. We will get into more details on the role-based access control system in the pilot phase, but for our PoC, we need a user with sufficient access to deploy our PoC application containers to the cluster.
推薦閱讀
- Splunk 7 Essentials(Third Edition)
- 計算機(jī)應(yīng)用
- 大數(shù)據(jù)戰(zhàn)爭:人工智能時代不能不說的事
- 空間機(jī)器人遙操作系統(tǒng)及控制
- VB語言程序設(shè)計
- 新手學(xué)電腦快速入門
- JSP從入門到精通
- PostgreSQL 10 Administration Cookbook
- 智能生產(chǎn)線的重構(gòu)方法
- Citrix? XenDesktop? 7 Cookbook
- 單片機(jī)技術(shù)項目化原理與實訓(xùn)
- 智慧未來
- 運動控制系統(tǒng)(第2版)
- Access 2007數(shù)據(jù)庫入門與實例應(yīng)用金典
- 教育創(chuàng)新與創(chuàng)新人才:信息技術(shù)人才培養(yǎng)改革之路(四)