Skip to content
This repository has been archived by the owner on Feb 12, 2021. It is now read-only.

Latest commit

 

History

History
128 lines (89 loc) · 5.43 KB

quickstart.md

File metadata and controls

128 lines (89 loc) · 5.43 KB

Container Linux quick start

If you don't have a Container Linux machine running, check out the guides on running Container Linux on most cloud providers (EC2, Rackspace, GCE), virtualization platforms (Vagrant, VMware, OpenStack, QEMU/KVM) and bare metal servers (PXE, iPXE, ISO, Installer). With any of these guides you will have machines up and running in a few minutes.

It's highly recommended that you set up a cluster of at least 3 machines — it's not as much fun on a single machine. If you don't want to break the bank, Vagrant allows you to run an entire cluster on your laptop. For a cluster to be properly bootstrapped, you have to provide ideally an Ignition config (generated from a Container Linux Config), or possibly a cloud-config, via user-data, which is covered in each platform's guide.

Container Linux gives you three essential tools: service discovery, container management and process management. Let's try each of them out.

First, on the client start your user agent by typing:

eval $(ssh-agent)

Then, add your private key to the agent by typing:

ssh-add

Connect to a Container Linux machine via SSH as the user core. For example, on Amazon, use:

$ ssh [email protected]
CoreOS (beta)

If you're using Vagrant, you'll need to connect a bit differently:

$ ssh-add ~/.vagrant.d/insecure_private_key
Identity added: /Users/core/.vagrant.d/insecure_private_key (/Users/core/.vagrant.d/insecure_private_key)
$ vagrant ssh core-01
CoreOS (beta)

Service discovery with etcd

The first building block of Container Linux is service discovery with etcd (docs). Data stored in etcd is distributed across all of your machines running Container Linux. For example, each of your app containers can announce itself to a proxy container, which would automatically know which machines should receive traffic. Building service discovery into your application allows you to add more machines and scale your services seamlessly.

If you used an example Container Linux Config or cloud-config from a guide linked in the first paragraph, etcd is automatically started on boot.

A good starting point for a Container Linux Config would be something like:

etcd:
  discovery: https://discovery.etcd.io/<token>
passwd:
  users:
    - name: core
      ssh_authorized_keys:
        - ssh-rsa AAAA...

In order to get the discovery token, visit https://discovery.etcd.io/new and you will receive a URL including your token. Paste the whole thing into your Container Linux Config file.

etcdctl is a command line interface to etcd that is preinstalled on Container Linux. To set and retrieve a key from etcd you can use the following examples:

Set a key message with value Hello world:

etcdctl set /message "Hello world"

Read the value of message back:

etcdctl get /message

You can also use simple curl. These examples correspond to previous ones:

Set the value:

curl -L http://127.0.0.1:2379/v2/keys/message -XPUT -d value="Hello world"

Read the value:

curl -L http://127.0.0.1:2379/v2/keys/message

If you followed a guide to set up more than one Container Linux machine, you can SSH into another machine and can retrieve this same value.

More detailed information

View Complete Guide Read etcd API Docs

Container management with Docker

The second building block, Docker (docs), is where your applications and code run. It is installed on each Container Linux machine. You should make each of your services (web server, caching, database) into a container and connect them together by reading and writing to etcd. You can quickly try out a minimal busybox container in two different ways:

Run a command in the container and then stop it:

docker run busybox /bin/echo hello world

Open a shell prompt inside the container:

docker run -i -t busybox /bin/sh

More detailed information

View Complete Guide Read Docker Docs