mirror of https://github.com/docker/cli.git
1191 lines
55 KiB
Markdown
1191 lines
55 KiB
Markdown
# service create
|
|
|
|
<!---MARKER_GEN_START-->
|
|
Create a new service
|
|
|
|
### Options
|
|
|
|
| Name | Type | Default | Description |
|
|
|:----------------------------------------------------|:------------------|:-------------|:----------------------------------------------------------------------------------------------------|
|
|
| `--cap-add` | `list` | | Add Linux capabilities |
|
|
| `--cap-drop` | `list` | | Drop Linux capabilities |
|
|
| [`--config`](#config) | `config` | | Specify configurations to expose to the service |
|
|
| [`--constraint`](#constraint) | `list` | | Placement constraints |
|
|
| `--container-label` | `list` | | Container labels |
|
|
| `--credential-spec` | `credential-spec` | | Credential spec for managed service account (Windows only) |
|
|
| `-d`, `--detach` | | | Exit immediately instead of waiting for the service to converge |
|
|
| `--dns` | `list` | | Set custom DNS servers |
|
|
| `--dns-option` | `list` | | Set DNS options |
|
|
| `--dns-search` | `list` | | Set custom DNS search domains |
|
|
| `--endpoint-mode` | `string` | `vip` | Endpoint mode (vip or dnsrr) |
|
|
| `--entrypoint` | `command` | | Overwrite the default ENTRYPOINT of the image |
|
|
| [`-e`](#env), [`--env`](#env) | `list` | | Set environment variables |
|
|
| `--env-file` | `list` | | Read in a file of environment variables |
|
|
| `--generic-resource` | `list` | | User defined resources |
|
|
| `--group` | `list` | | Set one or more supplementary user groups for the container |
|
|
| `--health-cmd` | `string` | | Command to run to check health |
|
|
| `--health-interval` | `duration` | | Time between running the check (ms\|s\|m\|h) |
|
|
| `--health-retries` | `int` | `0` | Consecutive failures needed to report unhealthy |
|
|
| `--health-start-period` | `duration` | | Start period for the container to initialize before counting retries towards unstable (ms\|s\|m\|h) |
|
|
| `--health-timeout` | `duration` | | Maximum time to allow one check to run (ms\|s\|m\|h) |
|
|
| `--host` | `list` | | Set one or more custom host-to-IP mappings (host:ip) |
|
|
| [`--hostname`](#hostname) | `string` | | Container hostname |
|
|
| `--init` | | | Use an init inside each service container to forward signals and reap processes |
|
|
| [`--isolation`](#isolation) | `string` | | Service container isolation mode |
|
|
| [`-l`](#label), [`--label`](#label) | `list` | | Service labels |
|
|
| `--limit-cpu` | `decimal` | | Limit CPUs |
|
|
| `--limit-memory` | `bytes` | `0` | Limit Memory |
|
|
| `--limit-pids` | `int64` | `0` | Limit maximum number of processes (default 0 = unlimited) |
|
|
| `--log-driver` | `string` | | Logging driver for service |
|
|
| `--log-opt` | `list` | | Logging driver options |
|
|
| `--max-concurrent` | `uint` | | Number of job tasks to run concurrently (default equal to --replicas) |
|
|
| `--mode` | `string` | `replicated` | Service mode (`replicated`, `global`, `replicated-job`, `global-job`) |
|
|
| [`--mount`](#mount) | `mount` | | Attach a filesystem mount to the service |
|
|
| `--name` | `string` | | Service name |
|
|
| [`--network`](#network) | `network` | | Network attachments |
|
|
| `--no-healthcheck` | | | Disable any container-specified HEALTHCHECK |
|
|
| `--no-resolve-image` | | | Do not query the registry to resolve image digest and supported platforms |
|
|
| [`--placement-pref`](#placement-pref) | `pref` | | Add a placement preference |
|
|
| [`-p`](#publish), [`--publish`](#publish) | `port` | | Publish a port as a node port |
|
|
| `-q`, `--quiet` | | | Suppress progress output |
|
|
| `--read-only` | | | Mount the container's root filesystem as read only |
|
|
| [`--replicas`](#replicas) | `uint` | | Number of tasks |
|
|
| [`--replicas-max-per-node`](#replicas-max-per-node) | `uint64` | `0` | Maximum number of tasks per node (default 0 = unlimited) |
|
|
| `--reserve-cpu` | `decimal` | | Reserve CPUs |
|
|
| [`--reserve-memory`](#reserve-memory) | `bytes` | `0` | Reserve Memory |
|
|
| `--restart-condition` | `string` | | Restart when condition is met (`none`, `on-failure`, `any`) (default `any`) |
|
|
| `--restart-delay` | `duration` | | Delay between restart attempts (ns\|us\|ms\|s\|m\|h) (default 5s) |
|
|
| `--restart-max-attempts` | `uint` | | Maximum number of restarts before giving up |
|
|
| `--restart-window` | `duration` | | Window used to evaluate the restart policy (ns\|us\|ms\|s\|m\|h) |
|
|
| `--rollback-delay` | `duration` | `0s` | Delay between task rollbacks (ns\|us\|ms\|s\|m\|h) (default 0s) |
|
|
| `--rollback-failure-action` | `string` | | Action on rollback failure (`pause`, `continue`) (default `pause`) |
|
|
| `--rollback-max-failure-ratio` | `float` | `0` | Failure rate to tolerate during a rollback (default 0) |
|
|
| `--rollback-monitor` | `duration` | `0s` | Duration after each task rollback to monitor for failure (ns\|us\|ms\|s\|m\|h) (default 5s) |
|
|
| `--rollback-order` | `string` | | Rollback order (`start-first`, `stop-first`) (default `stop-first`) |
|
|
| `--rollback-parallelism` | `uint64` | `1` | Maximum number of tasks rolled back simultaneously (0 to roll back all at once) |
|
|
| [`--secret`](#secret) | `secret` | | Specify secrets to expose to the service |
|
|
| `--stop-grace-period` | `duration` | | Time to wait before force killing a container (ns\|us\|ms\|s\|m\|h) (default 10s) |
|
|
| `--stop-signal` | `string` | | Signal to stop the container |
|
|
| `--sysctl` | `list` | | Sysctl options |
|
|
| `-t`, `--tty` | | | Allocate a pseudo-TTY |
|
|
| `--ulimit` | `ulimit` | | Ulimit options |
|
|
| [`--update-delay`](#update-delay) | `duration` | `0s` | Delay between updates (ns\|us\|ms\|s\|m\|h) (default 0s) |
|
|
| `--update-failure-action` | `string` | | Action on update failure (`pause`, `continue`, `rollback`) (default `pause`) |
|
|
| `--update-max-failure-ratio` | `float` | `0` | Failure rate to tolerate during an update (default 0) |
|
|
| `--update-monitor` | `duration` | `0s` | Duration after each task update to monitor for failure (ns\|us\|ms\|s\|m\|h) (default 5s) |
|
|
| `--update-order` | `string` | | Update order (`start-first`, `stop-first`) (default `stop-first`) |
|
|
| `--update-parallelism` | `uint64` | `1` | Maximum number of tasks updated simultaneously (0 to update all at once) |
|
|
| `-u`, `--user` | `string` | | Username or UID (format: <name\|uid>[:<group\|gid>]) |
|
|
| [`--with-registry-auth`](#with-registry-auth) | | | Send registry authentication details to swarm agents |
|
|
| `-w`, `--workdir` | `string` | | Working directory inside the container |
|
|
|
|
|
|
<!---MARKER_GEN_END-->
|
|
|
|
## Description
|
|
|
|
Creates a service as described by the specified parameters.
|
|
|
|
> **Note**
|
|
>
|
|
> This is a cluster management command, and must be executed on a swarm
|
|
> manager node. To learn about managers and workers, refer to the
|
|
> [Swarm mode section](https://docs.docker.com/engine/swarm/) in the
|
|
> documentation.
|
|
|
|
## Examples
|
|
|
|
### Create a service
|
|
|
|
```console
|
|
$ docker service create --name redis redis:3.0.6
|
|
|
|
dmu1ept4cxcfe8k8lhtux3ro3
|
|
|
|
$ docker service create --mode global --name redis2 redis:3.0.6
|
|
|
|
a8q9dasaafudfs8q8w32udass
|
|
|
|
$ docker service ls
|
|
|
|
ID NAME MODE REPLICAS IMAGE
|
|
dmu1ept4cxcf redis replicated 1/1 redis:3.0.6
|
|
a8q9dasaafud redis2 global 1/1 redis:3.0.6
|
|
```
|
|
|
|
#### <a name="with-registry-auth"></a> Create a service using an image on a private registry (--with-registry-auth)
|
|
|
|
If your image is available on a private registry which requires login, use the
|
|
`--with-registry-auth` flag with `docker service create`, after logging in. If
|
|
your image is stored on `registry.example.com`, which is a private registry, use
|
|
a command like the following:
|
|
|
|
```console
|
|
$ docker login registry.example.com
|
|
|
|
$ docker service create \
|
|
--with-registry-auth \
|
|
--name my_service \
|
|
registry.example.com/acme/my_image:latest
|
|
```
|
|
|
|
This passes the login token from your local client to the swarm nodes where the
|
|
service is deployed, using the encrypted WAL logs. With this information, the
|
|
nodes are able to log into the registry and pull the image.
|
|
|
|
### <a name="replicas"></a> Create a service with 5 replica tasks (--replicas)
|
|
|
|
Use the `--replicas` flag to set the number of replica tasks for a replicated
|
|
service. The following command creates a `redis` service with `5` replica tasks:
|
|
|
|
```console
|
|
$ docker service create --name redis --replicas=5 redis:3.0.6
|
|
|
|
4cdgfyky7ozwh3htjfw0d12qv
|
|
```
|
|
|
|
The above command sets the *desired* number of tasks for the service. Even
|
|
though the command returns immediately, actual scaling of the service may take
|
|
some time. The `REPLICAS` column shows both the *actual* and *desired* number
|
|
of replica tasks for the service.
|
|
|
|
In the following example the desired state is `5` replicas, but the current
|
|
number of `RUNNING` tasks is `3`:
|
|
|
|
```console
|
|
$ docker service ls
|
|
|
|
ID NAME MODE REPLICAS IMAGE
|
|
4cdgfyky7ozw redis replicated 3/5 redis:3.0.7
|
|
```
|
|
|
|
Once all the tasks are created and `RUNNING`, the actual number of tasks is
|
|
equal to the desired number:
|
|
|
|
```console
|
|
$ docker service ls
|
|
|
|
ID NAME MODE REPLICAS IMAGE
|
|
4cdgfyky7ozw redis replicated 5/5 redis:3.0.7
|
|
```
|
|
|
|
### <a name="secret"></a> Create a service with secrets (--secret)
|
|
|
|
Use the `--secret` flag to give a container access to a
|
|
[secret](secret_create.md).
|
|
|
|
Create a service specifying a secret:
|
|
|
|
```console
|
|
$ docker service create --name redis --secret secret.json redis:3.0.6
|
|
|
|
4cdgfyky7ozwh3htjfw0d12qv
|
|
```
|
|
|
|
Create a service specifying the secret, target, user/group ID, and mode:
|
|
|
|
```console
|
|
$ docker service create --name redis \
|
|
--secret source=ssh-key,target=ssh \
|
|
--secret source=app-key,target=app,uid=1000,gid=1001,mode=0400 \
|
|
redis:3.0.6
|
|
|
|
4cdgfyky7ozwh3htjfw0d12qv
|
|
```
|
|
|
|
To grant a service access to multiple secrets, use multiple `--secret` flags.
|
|
|
|
Secrets are located in `/run/secrets` in the container if no target is specified.
|
|
If no target is specified, the name of the secret is used as the in memory file
|
|
in the container. If a target is specified, that is used as the filename. In the
|
|
example above, two files are created: `/run/secrets/ssh` and
|
|
`/run/secrets/app` for each of the secret targets specified.
|
|
|
|
### <a name="config"></a> Create a service with configs (--config)
|
|
|
|
Use the `--config` flag to give a container access to a
|
|
[config](config_create.md).
|
|
|
|
Create a service with a config. The config will be mounted into `redis-config`,
|
|
be owned by the user who runs the command inside the container (often `root`),
|
|
and have file mode `0444` or world-readable. You can specify the `uid` and `gid`
|
|
as numerical IDs or names. When using names, the provided group/user names must
|
|
pre-exist in the container. The `mode` is specified as a 4-number sequence such
|
|
as `0755`.
|
|
|
|
```console
|
|
$ docker service create --name=redis --config redis-conf redis:3.0.6
|
|
```
|
|
|
|
Create a service with a config and specify the target location and file mode:
|
|
|
|
```console
|
|
$ docker service create --name redis \
|
|
--config source=redis-conf,target=/etc/redis/redis.conf,mode=0400 redis:3.0.6
|
|
```
|
|
|
|
To grant a service access to multiple configs, use multiple `--config` flags.
|
|
|
|
Configs are located in `/` in the container if no target is specified. If no
|
|
target is specified, the name of the config is used as the name of the file in
|
|
the container. If a target is specified, that is used as the filename.
|
|
|
|
### <a name="update-delay"></a> Create a service with a rolling update policy
|
|
|
|
```console
|
|
$ docker service create \
|
|
--replicas 10 \
|
|
--name redis \
|
|
--update-delay 10s \
|
|
--update-parallelism 2 \
|
|
redis:3.0.6
|
|
```
|
|
|
|
When you run a [service update](service_update.md), the scheduler updates a
|
|
maximum of 2 tasks at a time, with `10s` between updates. For more information,
|
|
refer to the [rolling updates
|
|
tutorial](https://docs.docker.com/engine/swarm/swarm-tutorial/rolling-update/).
|
|
|
|
### <a name="env"></a> Set environment variables (-e, --env)
|
|
|
|
This sets an environment variable for all tasks in a service. For example:
|
|
|
|
```console
|
|
$ docker service create \
|
|
--name redis_2 \
|
|
--replicas 5 \
|
|
--env MYVAR=foo \
|
|
redis:3.0.6
|
|
```
|
|
|
|
To specify multiple environment variables, specify multiple `--env` flags, each
|
|
with a separate key-value pair.
|
|
|
|
```console
|
|
$ docker service create \
|
|
--name redis_2 \
|
|
--replicas 5 \
|
|
--env MYVAR=foo \
|
|
--env MYVAR2=bar \
|
|
redis:3.0.6
|
|
```
|
|
|
|
### <a name="hostname"></a> Create a service with specific hostname (--hostname)
|
|
|
|
This option sets the docker service containers hostname to a specific string.
|
|
For example:
|
|
|
|
```console
|
|
$ docker service create --name redis --hostname myredis redis:3.0.6
|
|
```
|
|
|
|
### <a name="label"></a> Set metadata on a service (-l, --label)
|
|
|
|
A label is a `key=value` pair that applies metadata to a service. To label a
|
|
service with two labels:
|
|
|
|
```console
|
|
$ docker service create \
|
|
--name redis_2 \
|
|
--label com.example.foo="bar" \
|
|
--label bar=baz \
|
|
redis:3.0.6
|
|
```
|
|
|
|
For more information about labels, refer to [apply custom
|
|
metadata](https://docs.docker.com/config/labels-custom-metadata/).
|
|
|
|
### <a name="mount"></a> Add bind mounts, volumes or memory filesystems (--mount)
|
|
|
|
Docker supports three different kinds of mounts, which allow containers to read
|
|
from or write to files or directories, either on the host operating system, or
|
|
on memory filesystems. These types are _data volumes_ (often referred to simply
|
|
as volumes), _bind mounts_, _tmpfs_, and _named pipes_.
|
|
|
|
A **bind mount** makes a file or directory on the host available to the
|
|
container it is mounted within. A bind mount may be either read-only or
|
|
read-write. For example, a container might share its host's DNS information by
|
|
means of a bind mount of the host's `/etc/resolv.conf` or a container might
|
|
write logs to its host's `/var/log/myContainerLogs` directory. If you use
|
|
bind mounts and your host and containers have different notions of permissions,
|
|
access controls, or other such details, you will run into portability issues.
|
|
|
|
A **named volume** is a mechanism for decoupling persistent data needed by your
|
|
container from the image used to create the container and from the host machine.
|
|
Named volumes are created and managed by Docker, and a named volume persists
|
|
even when no container is currently using it. Data in named volumes can be
|
|
shared between a container and the host machine, as well as between multiple
|
|
containers. Docker uses a _volume driver_ to create, manage, and mount volumes.
|
|
You can back up or restore volumes using Docker commands.
|
|
|
|
A **tmpfs** mounts a tmpfs inside a container for volatile data.
|
|
|
|
A **npipe** mounts a named pipe from the host into the container.
|
|
|
|
Consider a situation where your image starts a lightweight web server. You could
|
|
use that image as a base image, copy in your website's HTML files, and package
|
|
that into another image. Each time your website changed, you'd need to update
|
|
the new image and redeploy all of the containers serving your website. A better
|
|
solution is to store the website in a named volume which is attached to each of
|
|
your web server containers when they start. To update the website, you just
|
|
update the named volume.
|
|
|
|
For more information about named volumes, see
|
|
[Data Volumes](https://docs.docker.com/storage/volumes/).
|
|
|
|
The following table describes options which apply to both bind mounts and named
|
|
volumes in a service:
|
|
|
|
<table>
|
|
<tr>
|
|
<th>Option</th>
|
|
<th>Required</th>
|
|
<th>Description</th>
|
|
</tr>
|
|
<tr>
|
|
<td><b>type</b></td>
|
|
<td></td>
|
|
<td>
|
|
<p>The type of mount, can be either <tt>volume</tt>, <tt>bind</tt>, <tt>tmpfs</tt>, or <tt>npipe</tt>. Defaults to <tt>volume</tt> if no type is specified.</p>
|
|
<ul>
|
|
<li><tt>volume</tt>: mounts a <a href="https://docs.docker.com/engine/reference/commandline/volume_create/">managed volume</a>
|
|
into the container.</li> <li><tt>bind</tt>:
|
|
bind-mounts a directory or file from the host into the container.</li>
|
|
<li><tt>tmpfs</tt>: mount a tmpfs in the container</li>
|
|
<li><tt>npipe</tt>: mounts named pipe from the host into the container (Windows containers only).</li>
|
|
</ul>
|
|
</td>
|
|
</tr>
|
|
<tr>
|
|
<td><b>src</b> or <b>source</b></td>
|
|
<td>for <tt>type=bind</tt> and <tt>type=npipe</tt></td>
|
|
<td>
|
|
<ul>
|
|
<li>
|
|
<tt>type=volume</tt>: <tt>src</tt> is an optional way to specify the name of the volume (for example, <tt>src=my-volume</tt>).
|
|
If the named volume does not exist, it is automatically created. If no <tt>src</tt> is specified, the volume is
|
|
assigned a random name which is guaranteed to be unique on the host, but may not be unique cluster-wide.
|
|
A randomly-named volume has the same lifecycle as its container and is destroyed when the <i>container</i>
|
|
is destroyed (which is upon <tt>service update</tt>, or when scaling or re-balancing the service)
|
|
</li>
|
|
<li>
|
|
<tt>type=bind</tt>: <tt>src</tt> is required, and specifies an absolute path to the file or directory to bind-mount
|
|
(for example, <tt>src=/path/on/host/</tt>). An error is produced if the file or directory does not exist.
|
|
</li>
|
|
<li>
|
|
<tt>type=tmpfs</tt>: <tt>src</tt> is not supported.
|
|
</li>
|
|
</ul>
|
|
</td>
|
|
</tr>
|
|
<tr>
|
|
<td><p><b>dst</b> or <b>destination</b> or <b>target</b></p></td>
|
|
<td>yes</td>
|
|
<td>
|
|
<p>Mount path inside the container, for example <tt>/some/path/in/container/</tt>.
|
|
If the path does not exist in the container's filesystem, the Engine creates
|
|
a directory at the specified location before mounting the volume or bind mount.</p>
|
|
</td>
|
|
</tr>
|
|
<tr>
|
|
<td><p><b>readonly</b> or <b>ro</b></p></td>
|
|
<td></td>
|
|
<td>
|
|
<p>The Engine mounts binds and volumes <tt>read-write</tt> unless <tt>readonly</tt> option
|
|
is given when mounting the bind or volume. Note that setting <tt>readonly</tt> for a
|
|
bind-mount does not make its submounts <tt>readonly</tt> on the current Linux implementation. See also <tt>bind-nonrecursive</tt>.</p>
|
|
<ul>
|
|
<li><tt>true</tt> or <tt>1</tt> or no value: Mounts the bind or volume read-only.</li>
|
|
<li><tt>false</tt> or <tt>0</tt>: Mounts the bind or volume read-write.</li>
|
|
</ul>
|
|
</td>
|
|
</tr>
|
|
</table>
|
|
|
|
#### Options for Bind Mounts
|
|
|
|
The following options can only be used for bind mounts (`type=bind`):
|
|
|
|
|
|
<table>
|
|
<tr>
|
|
<th>Option</th>
|
|
<th>Description</th>
|
|
</tr>
|
|
<tr>
|
|
<td><b>bind-propagation</b></td>
|
|
<td>
|
|
<p>See the <a href="#bind-propagation">bind propagation section</a>.</p>
|
|
</td>
|
|
</tr>
|
|
<tr>
|
|
<td><b>consistency</b></td>
|
|
<td>
|
|
<p>The consistency requirements for the mount; one of </p>
|
|
<ul>
|
|
<li><tt>default</tt>: Equivalent to <tt>consistent</tt>.</li>
|
|
<li><tt>consistent</tt>: Full consistency. The container runtime and the host maintain an identical view of the mount at all times.</li>
|
|
<li><tt>cached</tt>: The host's view of the mount is authoritative. There may be delays before updates made on the host are visible within a container.</li>
|
|
<li><tt>delegated</tt>: The container runtime's view of the mount is authoritative. There may be delays before updates made in a container are visible on the host.</li>
|
|
</ul>
|
|
</td>
|
|
</tr>
|
|
<tr>
|
|
<td><b>bind-nonrecursive</b></td>
|
|
<td>
|
|
By default, submounts are recursively bind-mounted as well. However, this behavior can be confusing when a
|
|
bind mount is configured with <tt>readonly</tt> option, because submounts are not mounted as read-only.
|
|
Set <tt>bind-nonrecursive</tt> to disable recursive bind-mount.<br />
|
|
<br />
|
|
A value is optional:<br />
|
|
<br />
|
|
<ul>
|
|
<li><tt>true</tt> or <tt>1</tt>: Disables recursive bind-mount.</li>
|
|
<li><tt>false</tt> or <tt>0</tt>: Default if you do not provide a value. Enables recursive bind-mount.</li>
|
|
</ul>
|
|
</td>
|
|
</tr>
|
|
</table>
|
|
|
|
##### Bind propagation
|
|
|
|
Bind propagation refers to whether or not mounts created within a given
|
|
bind mount or named volume can be propagated to replicas of that mount. Consider
|
|
a mount point `/mnt`, which is also mounted on `/tmp`. The propagation settings
|
|
control whether a mount on `/tmp/a` would also be available on `/mnt/a`. Each
|
|
propagation setting has a recursive counterpoint. In the case of recursion,
|
|
consider that `/tmp/a` is also mounted as `/foo`. The propagation settings
|
|
control whether `/mnt/a` and/or `/tmp/a` would exist.
|
|
|
|
The `bind-propagation` option defaults to `rprivate` for both bind mounts and
|
|
volume mounts, and is only configurable for bind mounts. In other words, named
|
|
volumes do not support bind propagation.
|
|
|
|
- **`shared`**: Sub-mounts of the original mount are exposed to replica mounts,
|
|
and sub-mounts of replica mounts are also propagated to the
|
|
original mount.
|
|
- **`slave`**: similar to a shared mount, but only in one direction. If the
|
|
original mount exposes a sub-mount, the replica mount can see it.
|
|
However, if the replica mount exposes a sub-mount, the original
|
|
mount cannot see it.
|
|
- **`private`**: The mount is private. Sub-mounts within it are not exposed to
|
|
replica mounts, and sub-mounts of replica mounts are not
|
|
exposed to the original mount.
|
|
- **`rshared`**: The same as shared, but the propagation also extends to and from
|
|
mount points nested within any of the original or replica mount
|
|
points.
|
|
- **`rslave`**: The same as `slave`, but the propagation also extends to and from
|
|
mount points nested within any of the original or replica mount
|
|
points.
|
|
- **`rprivate`**: The default. The same as `private`, meaning that no mount points
|
|
anywhere within the original or replica mount points propagate
|
|
in either direction.
|
|
|
|
For more information about bind propagation, see the
|
|
[Linux kernel documentation for shared subtree](https://www.kernel.org/doc/Documentation/filesystems/sharedsubtree.txt).
|
|
|
|
#### Options for named volumes
|
|
|
|
The following options can only be used for named volumes (`type=volume`):
|
|
|
|
|
|
<table>
|
|
<tr>
|
|
<th>Option</th>
|
|
<th>Description</th>
|
|
</tr>
|
|
<tr>
|
|
<td><b>volume-driver</b></td>
|
|
<td>
|
|
<p>Name of the volume-driver plugin to use for the volume. Defaults to
|
|
<tt>"local"</tt>, to use the local volume driver to create the volume if the
|
|
volume does not exist.</p>
|
|
</td>
|
|
</tr>
|
|
<tr>
|
|
<td><b>volume-label</b></td>
|
|
<td>
|
|
One or more custom metadata ("labels") to apply to the volume upon
|
|
creation. For example,
|
|
<tt>volume-label=mylabel=hello-world,my-other-label=hello-mars</tt>. For more
|
|
information about labels, refer to
|
|
<a href="https://docs.docker.com/config/labels-custom-metadata/">apply custom metadata</a>.
|
|
</td>
|
|
</tr>
|
|
<tr>
|
|
<td><b>volume-nocopy</b></td>
|
|
<td>
|
|
By default, if you attach an empty volume to a container, and files or
|
|
directories already existed at the mount-path in the container (<tt>dst</tt>),
|
|
the Engine copies those files and directories into the volume, allowing
|
|
the host to access them. Set <tt>volume-nocopy</tt> to disable copying files
|
|
from the container's filesystem to the volume and mount the empty volume.<br />
|
|
<br />
|
|
A value is optional:<br />
|
|
<br />
|
|
<ul>
|
|
<li><tt>true</tt> or <tt>1</tt>: Default if you do not provide a value. Disables copying.</li>
|
|
<li><tt>false</tt> or <tt>0</tt>: Enables copying.</li>
|
|
</ul>
|
|
</td>
|
|
</tr>
|
|
<tr>
|
|
<td><b>volume-opt</b></td>
|
|
<td>
|
|
Options specific to a given volume driver, which will be passed to the
|
|
driver when creating the volume. Options are provided as a comma-separated
|
|
list of key/value pairs, for example,
|
|
<tt>volume-opt=some-option=some-value,volume-opt=some-other-option=some-other-value</tt>.
|
|
For available options for a given driver, refer to that driver's
|
|
documentation.
|
|
</td>
|
|
</tr>
|
|
</table>
|
|
|
|
|
|
#### Options for tmpfs
|
|
|
|
The following options can only be used for tmpfs mounts (`type=tmpfs`);
|
|
|
|
|
|
<table>
|
|
<tr>
|
|
<th>Option</th>
|
|
<th>Description</th>
|
|
</tr>
|
|
<tr>
|
|
<td><b>tmpfs-size</b></td>
|
|
<td>Size of the tmpfs mount in bytes. Unlimited by default in Linux.</td>
|
|
</tr>
|
|
<tr>
|
|
<td><b>tmpfs-mode</b></td>
|
|
<td>File mode of the tmpfs in octal. (e.g. <tt>"700"</tt> or <tt>"0700"</tt>.) Defaults to <tt>"1777"</tt> in Linux.</td>
|
|
</tr>
|
|
</table>
|
|
|
|
|
|
#### Differences between "--mount" and "--volume"
|
|
|
|
The `--mount` flag supports most options that are supported by the `-v`
|
|
or `--volume` flag for `docker run`, with some important exceptions:
|
|
|
|
- The `--mount` flag allows you to specify a volume driver and volume driver
|
|
options *per volume*, without creating the volumes in advance. In contrast,
|
|
`docker run` allows you to specify a single volume driver which is shared
|
|
by all volumes, using the `--volume-driver` flag.
|
|
|
|
- The `--mount` flag allows you to specify custom metadata ("labels") for a volume,
|
|
before the volume is created.
|
|
|
|
- When you use `--mount` with `type=bind`, the host-path must refer to an *existing*
|
|
path on the host. The path will not be created for you and the service will fail
|
|
with an error if the path does not exist.
|
|
|
|
- The `--mount` flag does not allow you to relabel a volume with `Z` or `z` flags,
|
|
which are used for `selinux` labeling.
|
|
|
|
#### Create a service using a named volume
|
|
|
|
The following example creates a service that uses a named volume:
|
|
|
|
```console
|
|
$ docker service create \
|
|
--name my-service \
|
|
--replicas 3 \
|
|
--mount type=volume,source=my-volume,destination=/path/in/container,volume-label="color=red",volume-label="shape=round" \
|
|
nginx:alpine
|
|
```
|
|
|
|
For each replica of the service, the engine requests a volume named "my-volume"
|
|
from the default ("local") volume driver where the task is deployed. If the
|
|
volume does not exist, the engine creates a new volume and applies the "color"
|
|
and "shape" labels.
|
|
|
|
When the task is started, the volume is mounted on `/path/in/container/` inside
|
|
the container.
|
|
|
|
Be aware that the default ("local") volume is a locally scoped volume driver.
|
|
This means that depending on where a task is deployed, either that task gets a
|
|
*new* volume named "my-volume", or shares the same "my-volume" with other tasks
|
|
of the same service. Multiple containers writing to a single shared volume can
|
|
cause data corruption if the software running inside the container is not
|
|
designed to handle concurrent processes writing to the same location. Also take
|
|
into account that containers can be re-scheduled by the Swarm orchestrator and
|
|
be deployed on a different node.
|
|
|
|
#### Create a service that uses an anonymous volume
|
|
|
|
The following command creates a service with three replicas with an anonymous
|
|
volume on `/path/in/container`:
|
|
|
|
```console
|
|
$ docker service create \
|
|
--name my-service \
|
|
--replicas 3 \
|
|
--mount type=volume,destination=/path/in/container \
|
|
nginx:alpine
|
|
```
|
|
|
|
In this example, no name (`source`) is specified for the volume, so a new volume
|
|
is created for each task. This guarantees that each task gets its own volume,
|
|
and volumes are not shared between tasks. Anonymous volumes are removed after
|
|
the task using them is complete.
|
|
|
|
#### Create a service that uses a bind-mounted host directory
|
|
|
|
The following example bind-mounts a host directory at `/path/in/container` in
|
|
the containers backing the service:
|
|
|
|
```console
|
|
$ docker service create \
|
|
--name my-service \
|
|
--mount type=bind,source=/path/on/host,destination=/path/in/container \
|
|
nginx:alpine
|
|
```
|
|
|
|
### Set service mode (--mode)
|
|
|
|
The service mode determines whether this is a _replicated_ service or a _global_
|
|
service. A replicated service runs as many tasks as specified, while a global
|
|
service runs on each active node in the swarm.
|
|
|
|
The following command creates a global service:
|
|
|
|
```console
|
|
$ docker service create \
|
|
--name redis_2 \
|
|
--mode global \
|
|
redis:3.0.6
|
|
```
|
|
|
|
### <a name="constraint"></a> Specify service constraints (--constraint)
|
|
|
|
You can limit the set of nodes where a task can be scheduled by defining
|
|
constraint expressions. Constraint expressions can either use a _match_ (`==`)
|
|
or _exclude_ (`!=`) rule. Multiple constraints find nodes that satisfy every
|
|
expression (AND match). Constraints can match node or Docker Engine labels as
|
|
follows:
|
|
|
|
| node attribute | matches | example |
|
|
|----------------------|--------------------------------|-----------------------------------------------|
|
|
| `node.id` | Node ID | `node.id==2ivku8v2gvtg4` |
|
|
| `node.hostname` | Node hostname | `node.hostname!=node-2` |
|
|
| `node.role` | Node role (`manager`/`worker`) | `node.role==manager` |
|
|
| `node.platform.os` | Node operating system | `node.platform.os==windows` |
|
|
| `node.platform.arch` | Node architecture | `node.platform.arch==x86_64` |
|
|
| `node.labels` | User-defined node labels | `node.labels.security==high` |
|
|
| `engine.labels` | Docker Engine's labels | `engine.labels.operatingsystem==ubuntu-22.04` |
|
|
|
|
`engine.labels` apply to Docker Engine labels like operating system, drivers,
|
|
etc. Swarm administrators add `node.labels` for operational purposes by using
|
|
the [`docker node update`](node_update.md) command.
|
|
|
|
For example, the following limits tasks for the redis service to nodes where the
|
|
node type label equals queue:
|
|
|
|
```console
|
|
$ docker service create \
|
|
--name redis_2 \
|
|
--constraint node.platform.os==linux \
|
|
--constraint node.labels.type==queue \
|
|
redis:3.0.6
|
|
```
|
|
|
|
If the service constraints exclude all nodes in the cluster, a message is printed
|
|
that no suitable node is found, but the scheduler will start a reconciliation
|
|
loop and deploy the service once a suitable node becomes available.
|
|
|
|
In the example below, no node satisfying the constraint was found, causing the
|
|
service to not reconcile with the desired state:
|
|
|
|
```console
|
|
$ docker service create \
|
|
--name web \
|
|
--constraint node.labels.region==east \
|
|
nginx:alpine
|
|
|
|
lx1wrhhpmbbu0wuk0ybws30bc
|
|
overall progress: 0 out of 1 tasks
|
|
1/1: no suitable node (scheduling constraints not satisfied on 5 nodes)
|
|
|
|
$ docker service ls
|
|
ID NAME MODE REPLICAS IMAGE PORTS
|
|
b6lww17hrr4e web replicated 0/1 nginx:alpine
|
|
```
|
|
|
|
After adding the `region=east` label to a node in the cluster, the service
|
|
reconciles, and the desired number of replicas are deployed:
|
|
|
|
```console
|
|
$ docker node update --label-add region=east yswe2dm4c5fdgtsrli1e8ya5l
|
|
yswe2dm4c5fdgtsrli1e8ya5l
|
|
|
|
$ docker service ls
|
|
ID NAME MODE REPLICAS IMAGE PORTS
|
|
b6lww17hrr4e web replicated 1/1 nginx:alpine
|
|
```
|
|
|
|
### <a name="placement-pref"></a> Specify service placement preferences (--placement-pref)
|
|
|
|
You can set up the service to divide tasks evenly over different categories of
|
|
nodes. One example of where this can be useful is to balance tasks over a set
|
|
of datacenters or availability zones. The example below illustrates this:
|
|
|
|
```console
|
|
$ docker service create \
|
|
--replicas 9 \
|
|
--name redis_2 \
|
|
--placement-pref spread=node.labels.datacenter \
|
|
redis:3.0.6
|
|
```
|
|
|
|
This uses `--placement-pref` with a `spread` strategy (currently the only
|
|
supported strategy) to spread tasks evenly over the values of the `datacenter`
|
|
node label. In this example, we assume that every node has a `datacenter` node
|
|
label attached to it. If there are three different values of this label among
|
|
nodes in the swarm, one third of the tasks will be placed on the nodes
|
|
associated with each value. This is true even if there are more nodes with one
|
|
value than another. For example, consider the following set of nodes:
|
|
|
|
- Three nodes with `node.labels.datacenter=east`
|
|
- Two nodes with `node.labels.datacenter=south`
|
|
- One node with `node.labels.datacenter=west`
|
|
|
|
Since we are spreading over the values of the `datacenter` label and the
|
|
service has 9 replicas, 3 replicas will end up in each datacenter. There are
|
|
three nodes associated with the value `east`, so each one will get one of the
|
|
three replicas reserved for this value. There are two nodes with the value
|
|
`south`, and the three replicas for this value will be divided between them,
|
|
with one receiving two replicas and another receiving just one. Finally, `west`
|
|
has a single node that will get all three replicas reserved for `west`.
|
|
|
|
If the nodes in one category (for example, those with
|
|
`node.labels.datacenter=south`) can't handle their fair share of tasks due to
|
|
constraints or resource limitations, the extra tasks will be assigned to other
|
|
nodes instead, if possible.
|
|
|
|
Both engine labels and node labels are supported by placement preferences. The
|
|
example above uses a node label, because the label is referenced with
|
|
`node.labels.datacenter`. To spread over the values of an engine label, use
|
|
`--placement-pref spread=engine.labels.<labelname>`.
|
|
|
|
It is possible to add multiple placement preferences to a service. This
|
|
establishes a hierarchy of preferences, so that tasks are first divided over
|
|
one category, and then further divided over additional categories. One example
|
|
of where this may be useful is dividing tasks fairly between datacenters, and
|
|
then splitting the tasks within each datacenter over a choice of racks. To add
|
|
multiple placement preferences, specify the `--placement-pref` flag multiple
|
|
times. The order is significant, and the placement preferences will be applied
|
|
in the order given when making scheduling decisions.
|
|
|
|
The following example sets up a service with multiple placement preferences.
|
|
Tasks are spread first over the various datacenters, and then over racks
|
|
(as indicated by the respective labels):
|
|
|
|
```console
|
|
$ docker service create \
|
|
--replicas 9 \
|
|
--name redis_2 \
|
|
--placement-pref 'spread=node.labels.datacenter' \
|
|
--placement-pref 'spread=node.labels.rack' \
|
|
redis:3.0.6
|
|
```
|
|
|
|
When updating a service with `docker service update`, `--placement-pref-add`
|
|
appends a new placement preference after all existing placement preferences.
|
|
`--placement-pref-rm` removes an existing placement preference that matches the
|
|
argument.
|
|
|
|
### <a name="reserve-memory"></a> Specify memory requirements and constraints for a service (--reserve-memory and --limit-memory)
|
|
|
|
If your service needs a minimum amount of memory in order to run correctly,
|
|
you can use `--reserve-memory` to specify that the service should only be
|
|
scheduled on a node with this much memory available to reserve. If no node is
|
|
available that meets the criteria, the task is not scheduled, but remains in a
|
|
pending state.
|
|
|
|
The following example requires that 4GB of memory be available and reservable
|
|
on a given node before scheduling the service to run on that node.
|
|
|
|
```console
|
|
$ docker service create --reserve-memory=4GB --name=too-big nginx:alpine
|
|
```
|
|
|
|
The managers won't schedule a set of containers on a single node whose combined
|
|
reservations exceed the memory available on that node.
|
|
|
|
After a task is scheduled and running, `--reserve-memory` does not enforce a
|
|
memory limit. Use `--limit-memory` to ensure that a task uses no more than a
|
|
given amount of memory on a node. This example limits the amount of memory used
|
|
by the task to 4GB. The task will be scheduled even if each of your nodes has
|
|
only 2GB of memory, because `--limit-memory` is an upper limit.
|
|
|
|
```console
|
|
$ docker service create --limit-memory=4GB --name=too-big nginx:alpine
|
|
```
|
|
|
|
Using `--reserve-memory` and `--limit-memory` does not guarantee that Docker
|
|
will not use more memory on your host than you want. For instance, you could
|
|
create many services, the sum of whose memory usage could exhaust the available
|
|
memory.
|
|
|
|
You can prevent this scenario from exhausting the available memory by taking
|
|
into account other (non-containerized) software running on the host as well. If
|
|
`--reserve-memory` is greater than or equal to `--limit-memory`, Docker won't
|
|
schedule a service on a host that doesn't have enough memory. `--limit-memory`
|
|
will limit the service's memory to stay within that limit, so if every service
|
|
has a memory-reservation and limit set, Docker services will be less likely to
|
|
saturate the host. Other non-service containers or applications running directly
|
|
on the Docker host could still exhaust memory.
|
|
|
|
There is a downside to this approach. Reserving memory also means that you may
|
|
not make optimum use of the memory available on the node. Consider a service
|
|
that under normal circumstances uses 100MB of memory, but depending on load can
|
|
"peak" at 500MB. Reserving 500MB for that service (to guarantee can have 500MB
|
|
for those "peaks") results in 400MB of memory being wasted most of the time.
|
|
|
|
In short, you can take a more conservative or more flexible approach:
|
|
|
|
- **Conservative**: reserve 500MB, and limit to 500MB. Basically you're now
|
|
treating the service containers as VMs, and you may be losing a big advantage
|
|
containers, which is greater density of services per host.
|
|
|
|
- **Flexible**: limit to 500MB in the assumption that if the service requires
|
|
more than 500MB, it is malfunctioning. Reserve something between the 100MB
|
|
"normal" requirement and the 500MB "peak" requirement". This assumes that when
|
|
this service is at "peak", other services or non-container workloads probably
|
|
won't be.
|
|
|
|
The approach you take depends heavily on the memory-usage patterns of your
|
|
workloads. You should test under normal and peak conditions before settling
|
|
on an approach.
|
|
|
|
On Linux, you can also limit a service's overall memory footprint on a given
|
|
host at the level of the host operating system, using `cgroups` or other
|
|
relevant operating system tools.
|
|
|
|
### <a name="replicas-max-per-node"></a> Specify maximum replicas per node (--replicas-max-per-node)
|
|
|
|
Use the `--replicas-max-per-node` flag to set the maximum number of replica tasks that can run on a node.
|
|
The following command creates a nginx service with 2 replica tasks but only one replica task per node.
|
|
|
|
One example where this can be useful is to balance tasks over a set of data centers together with `--placement-pref`
|
|
and let `--replicas-max-per-node` setting make sure that replicas are not migrated to another datacenter during
|
|
maintenance or datacenter failure.
|
|
|
|
The example below illustrates this:
|
|
|
|
```console
|
|
$ docker service create \
|
|
--name nginx \
|
|
--replicas 2 \
|
|
--replicas-max-per-node 1 \
|
|
--placement-pref 'spread=node.labels.datacenter' \
|
|
nginx
|
|
```
|
|
|
|
### <a name="network"></a> Attach a service to an existing network (--network)
|
|
|
|
You can use overlay networks to connect one or more services within the swarm.
|
|
|
|
First, create an overlay network on a manager node the docker network create
|
|
command:
|
|
|
|
```console
|
|
$ docker network create --driver overlay my-network
|
|
|
|
etjpu59cykrptrgw0z0hk5snf
|
|
```
|
|
|
|
After you create an overlay network in swarm mode, all manager nodes have
|
|
access to the network.
|
|
|
|
When you create a service and pass the `--network` flag to attach the service to
|
|
the overlay network:
|
|
|
|
```console
|
|
$ docker service create \
|
|
--replicas 3 \
|
|
--network my-network \
|
|
--name my-web \
|
|
nginx
|
|
|
|
716thylsndqma81j6kkkb5aus
|
|
```
|
|
|
|
The swarm extends my-network to each node running the service.
|
|
|
|
Containers on the same network can access each other using
|
|
[service discovery](https://docs.docker.com/network/drivers/overlay/#container-discovery).
|
|
|
|
Long form syntax of `--network` allows to specify list of aliases and driver options:
|
|
`--network name=my-network,alias=web1,driver-opt=field1=value1`
|
|
|
|
### <a name="publish"></a> Publish service ports externally to the swarm (-p, --publish)
|
|
|
|
You can publish service ports to make them available externally to the swarm
|
|
using the `--publish` flag. The `--publish` flag can take two different styles
|
|
of arguments. The short version is positional, and allows you to specify the
|
|
published port and target port separated by a colon (`:`).
|
|
|
|
```console
|
|
$ docker service create --name my_web --replicas 3 --publish 8080:80 nginx
|
|
```
|
|
|
|
There is also a long format, which is easier to read and allows you to specify
|
|
more options. The long format is preferred. You cannot specify the service's
|
|
mode when using the short format. Here is an example of using the long format
|
|
for the same service as above:
|
|
|
|
```console
|
|
$ docker service create --name my_web --replicas 3 --publish published=8080,target=80 nginx
|
|
```
|
|
|
|
The options you can specify are:
|
|
|
|
<table>
|
|
<thead>
|
|
<tr>
|
|
<th>Option</th>
|
|
<th>Short syntax</th>
|
|
<th>Long syntax</th>
|
|
<th>Description</th>
|
|
</tr>
|
|
</thead>
|
|
<tr>
|
|
<td>published and target port</td>
|
|
<td><tt>--publish 8080:80</tt></td>
|
|
<td><tt>--publish published=8080,target=80</tt></td>
|
|
<td><p>
|
|
The target port within the container and the port to map it to on the
|
|
nodes, using the routing mesh (<tt>ingress</tt>) or host-level networking.
|
|
More options are available, later in this table. The key-value syntax is
|
|
preferred, because it is somewhat self-documenting.
|
|
</p></td>
|
|
</tr>
|
|
<tr>
|
|
<td>mode</td>
|
|
<td>Not possible to set using short syntax.</td>
|
|
<td><tt>--publish published=8080,target=80,mode=host</tt></td>
|
|
<td><p>
|
|
The mode to use for binding the port, either <tt>ingress</tt> or <tt>host</tt>.
|
|
Defaults to <tt>ingress</tt> to use the routing mesh.
|
|
</p></td>
|
|
</tr>
|
|
<tr>
|
|
<td>protocol</td>
|
|
<td><tt>--publish 8080:80/tcp</tt></td>
|
|
<td><tt>--publish published=8080,target=80,protocol=tcp</tt></td>
|
|
<td><p>
|
|
The protocol to use, <tt>tcp</tt> , <tt>udp</tt>, or <tt>sctp</tt>. Defaults to
|
|
<tt>tcp</tt>. To bind a port for both protocols, specify the <tt>-p</tt> or
|
|
<tt>--publish</tt> flag twice.
|
|
</p></td>
|
|
</tr>
|
|
</table>
|
|
|
|
When you publish a service port using `ingress` mode, the swarm routing mesh
|
|
makes the service accessible at the published port on every node regardless if
|
|
there is a task for the service running on the node. If you use `host` mode,
|
|
the port is only bound on nodes where the service is running, and a given port
|
|
on a node can only be bound once. You can only set the publication mode using
|
|
the long syntax. For more information refer to
|
|
[Use swarm mode routing mesh](https://docs.docker.com/engine/swarm/ingress/).
|
|
|
|
### <a name="credentials-spec"></a> Provide credential specs for managed service accounts (--credentials-spec)
|
|
|
|
This option is only used for services using Windows containers. The
|
|
`--credential-spec` must be in the format `file://<filename>` or
|
|
`registry://<value-name>`.
|
|
|
|
When using the `file://<filename>` format, the referenced file must be
|
|
present in the `CredentialSpecs` subdirectory in the docker data directory,
|
|
which defaults to `C:\ProgramData\Docker\` on Windows. For example,
|
|
specifying `file://spec.json` loads `C:\ProgramData\Docker\CredentialSpecs\spec.json`.
|
|
|
|
When using the `registry://<value-name>` format, the credential spec is
|
|
read from the Windows registry on the daemon's host. The specified
|
|
registry value must be located in:
|
|
|
|
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Virtualization\Containers\CredentialSpecs
|
|
|
|
|
|
### Create services using templates
|
|
|
|
You can use templates for some flags of `service create`, using the syntax
|
|
provided by the Go's [text/template](https://pkg.go.dev/text/template) package.
|
|
|
|
The supported flags are the following :
|
|
|
|
- `--hostname`
|
|
- `--mount`
|
|
- `--env`
|
|
|
|
Valid placeholders for the Go template are listed below:
|
|
|
|
|
|
<table>
|
|
<tr>
|
|
<th>Placeholder</th>
|
|
<th>Description</th>
|
|
</tr>
|
|
<tr>
|
|
<td><tt>.Service.ID</tt></td>
|
|
<td>Service ID</td>
|
|
</tr>
|
|
<tr>
|
|
<td><tt>.Service.Name</tt></td>
|
|
<td>Service name</td>
|
|
</tr>
|
|
<tr>
|
|
<td><tt>.Service.Labels</tt></td>
|
|
<td>Service labels</td>
|
|
</tr>
|
|
<tr>
|
|
<td><tt>.Node.ID</tt></td>
|
|
<td>Node ID</td>
|
|
</tr>
|
|
<tr>
|
|
<td><tt>.Node.Hostname</tt></td>
|
|
<td>Node Hostname</td>
|
|
</tr>
|
|
<tr>
|
|
<td><tt>.Task.ID</tt></td>
|
|
<td>Task ID</td>
|
|
</tr>
|
|
<tr>
|
|
<td><tt>.Task.Name</tt></td>
|
|
<td>Task name</td>
|
|
</tr>
|
|
<tr>
|
|
<td><tt>.Task.Slot</tt></td>
|
|
<td>Task slot</td>
|
|
</tr>
|
|
</table>
|
|
|
|
|
|
#### Template example
|
|
|
|
In this example, we are going to set the template of the created containers based on the
|
|
service's name, the node's ID and hostname where it sits.
|
|
|
|
```console
|
|
$ docker service create \
|
|
--name hosttempl \
|
|
--hostname="{{.Node.Hostname}}-{{.Node.ID}}-{{.Service.Name}}"\
|
|
busybox top
|
|
|
|
va8ew30grofhjoychbr6iot8c
|
|
|
|
$ docker service ps va8ew30grofhjoychbr6iot8c
|
|
|
|
ID NAME IMAGE NODE DESIRED STATE CURRENT STATE ERROR PORTS
|
|
wo41w8hg8qan hosttempl.1 busybox:latest@sha256:29f5d56d12684887bdfa50dcd29fc31eea4aaf4ad3bec43daf19026a7ce69912 2e7a8a9c4da2 Running Running about a minute ago
|
|
|
|
$ docker inspect --format="{{.Config.Hostname}}" 2e7a8a9c4da2-wo41w8hg8qanxwjwsg4kxpprj-hosttempl
|
|
|
|
x3ti0erg11rjpg64m75kej2mz-hosttempl
|
|
```
|
|
|
|
### <a name="isolation"></a> Specify isolation mode on Windows (--isolation)
|
|
|
|
By default, tasks scheduled on Windows nodes are run using the default isolation mode
|
|
configured for this particular node. To force a specific isolation mode, you can use
|
|
the `--isolation` flag:
|
|
|
|
```console
|
|
$ docker service create --name myservice --isolation=process microsoft/nanoserver
|
|
```
|
|
|
|
Supported isolation modes on Windows are:
|
|
- `default`: use default settings specified on the node running the task
|
|
- `process`: use process isolation (Windows server only)
|
|
- `hyperv`: use Hyper-V isolation
|
|
|
|
### <a name="generic-resources"></a> Create services requesting Generic Resources (--generic-resources)
|
|
|
|
You can narrow the kind of nodes your task can land on through the using the
|
|
`--generic-resource` flag (if the nodes advertise these resources):
|
|
|
|
```console
|
|
$ docker service create \
|
|
--name cuda \
|
|
--generic-resource "NVIDIA-GPU=2" \
|
|
--generic-resource "SSD=1" \
|
|
nvidia/cuda
|
|
```
|
|
|
|
### Running as a job
|
|
|
|
Jobs are a special kind of service designed to run an operation to completion
|
|
and then stop, as opposed to running long-running daemons. When a Task
|
|
belonging to a job exits successfully (return value 0), the Task is marked as
|
|
"Completed", and is not run again.
|
|
|
|
Jobs are started by using one of two modes, `replicated-job` or `global-job`
|
|
|
|
```console
|
|
$ docker service create --name myjob \
|
|
--mode replicated-job \
|
|
bash "true"
|
|
```
|
|
|
|
This command will run one Task, which will, using the `bash` image, execute the
|
|
command `true`, which will return 0 and then exit.
|
|
|
|
Though Jobs are ultimately a different kind of service, they a couple of
|
|
caveats compared to other services:
|
|
|
|
- None of the update or rollback configuration options are valid. Jobs can be
|
|
updated, but cannot be rolled out or rolled back, making these configuration
|
|
options moot.
|
|
- Jobs are never restarted on reaching the `Complete` state. This means that
|
|
for jobs, setting `--restart-condition` to `any` is the same as setting it to
|
|
`on-failure`.
|
|
|
|
Jobs are available in both replicated and global modes.
|
|
|
|
#### Replicated Jobs
|
|
|
|
A replicated job is like a replicated service. Setting the `--replicas` flag
|
|
will specify total number of iterations of a job to execute.
|
|
|
|
By default, all replicas of a replicated job will launch at once. To control
|
|
the total number of replicas that are executing simultaneously at any one time,
|
|
the `--max-concurrent` flag can be used:
|
|
|
|
```console
|
|
$ docker service create \
|
|
--name mythrottledjob \
|
|
--mode replicated-job \
|
|
--replicas 10 \
|
|
--max-concurrent 2 \
|
|
bash "true"
|
|
```
|
|
|
|
The above command will execute 10 Tasks in total, but only 2 of them will be
|
|
run at any given time.
|
|
|
|
#### Global Jobs
|
|
|
|
Global jobs are like global services, in that a Task is executed once on each node
|
|
matching placement constraints. Global jobs are represented by the mode `global-job`.
|
|
|
|
Note that after a Global job is created, any new Nodes added to the cluster
|
|
will have a Task from that job started on them. The Global Job does not as a
|
|
whole have a "done" state, except insofar as every Node meeting the job's
|
|
constraints has a Completed task.
|
|
|
|
## Related commands
|
|
|
|
* [service inspect](service_inspect.md)
|
|
* [service logs](service_logs.md)
|
|
* [service ls](service_ls.md)
|
|
* [service ps](service_ps.md)
|
|
* [service rm](service_rm.md)
|
|
* [service rollback](service_rollback.md)
|
|
* [service scale](service_scale.md)
|
|
* [service update](service_update.md)
|
|
|
|
<style>table tr > td:first-child { white-space: nowrap;}</style>
|