Merge ~cjdc/ubuntu-docker-images/+git/templates:add-ubuntu-base into ~ubuntu-docker-images/ubuntu-docker-images/+git/templates:main
- Git
- lp:~cjdc/ubuntu-docker-images/+git/templates
- add-ubuntu-base
- Merge into main
Proposed by
Cristovao Cordeiro
Status: | Merged |
---|---|
Merged at revision: | 331f4829c6faa869fb6954ad22d95152ec688ed1 |
Proposed branch: | ~cjdc/ubuntu-docker-images/+git/templates:add-ubuntu-base |
Merge into: | ~ubuntu-docker-images/ubuntu-docker-images/+git/templates:main |
Diff against target: |
7360 lines (+2998/-2733) 95 files modified
Makefile (+7/-0) data/grafana.yaml (+1/-1) docs/docker.io/ubuntu/apache2.md (+10/-8) docs/docker.io/ubuntu/bind9.md (+10/-8) docs/docker.io/ubuntu/cassandra.md (+8/-6) docs/docker.io/ubuntu/cortex.md (+8/-6) docs/docker.io/ubuntu/grafana.md (+9/-7) docs/docker.io/ubuntu/kafka.md (+8/-6) docs/docker.io/ubuntu/loki.md (+8/-6) docs/docker.io/ubuntu/memcached.md (+12/-10) docs/docker.io/ubuntu/mysql.md (+10/-8) docs/docker.io/ubuntu/nginx.md (+10/-8) docs/docker.io/ubuntu/postgres.md (+10/-8) docs/docker.io/ubuntu/prometheus-alertmanager.md (+8/-6) docs/docker.io/ubuntu/prometheus.md (+8/-6) docs/docker.io/ubuntu/redis.md (+12/-10) docs/docker.io/ubuntu/squid.md (+10/-8) docs/docker.io/ubuntu/telegraf.md (+11/-9) docs/docker.io/ubuntu/zookeeper.md (+8/-6) docs/public.ecr.aws/lts/apache2.md (+6/-70) docs/public.ecr.aws/lts/bind9.md (+6/-70) docs/public.ecr.aws/lts/cassandra.md (+4/-70) docs/public.ecr.aws/lts/cortex.md (+4/-67) docs/public.ecr.aws/lts/grafana.md (+4/-68) docs/public.ecr.aws/lts/kafka.md (+4/-70) docs/public.ecr.aws/lts/loki.md (+4/-68) docs/public.ecr.aws/lts/memcached.md (+5/-98) docs/public.ecr.aws/lts/mysql.md (+6/-96) docs/public.ecr.aws/lts/nginx.md (+6/-71) docs/public.ecr.aws/lts/postgres.md (+6/-95) docs/public.ecr.aws/lts/prometheus-alertmanager.md (+4/-68) docs/public.ecr.aws/lts/prometheus.md (+4/-68) docs/public.ecr.aws/lts/redis.md (+4/-89) docs/public.ecr.aws/lts/squid.md (+6/-72) docs/public.ecr.aws/lts/telegraf.md (+4/-67) docs/public.ecr.aws/lts/usage/apache2.md (+68/-0) docs/public.ecr.aws/lts/usage/bind9.md (+68/-0) docs/public.ecr.aws/lts/usage/cassandra.md (+67/-0) docs/public.ecr.aws/lts/usage/cortex.md (+64/-0) docs/public.ecr.aws/lts/usage/grafana.md (+65/-0) docs/public.ecr.aws/lts/usage/kafka.md (+67/-0) docs/public.ecr.aws/lts/usage/loki.md (+65/-0) docs/public.ecr.aws/lts/usage/memcached.md (+96/-0) docs/public.ecr.aws/lts/usage/mysql.md (+94/-0) docs/public.ecr.aws/lts/usage/nginx.md (+69/-0) docs/public.ecr.aws/lts/usage/postgres.md (+93/-0) docs/public.ecr.aws/lts/usage/prometheus-alertmanager.md (+65/-0) docs/public.ecr.aws/lts/usage/prometheus.md (+65/-0) docs/public.ecr.aws/lts/usage/redis.md (+87/-0) docs/public.ecr.aws/lts/usage/squid.md (+70/-0) docs/public.ecr.aws/lts/usage/telegraf.md (+65/-0) docs/public.ecr.aws/lts/usage/zookeeper.md (+62/-0) docs/public.ecr.aws/lts/zookeeper.md (+4/-65) docs/public.ecr.aws/ubuntu/apache2.md (+9/-72) docs/public.ecr.aws/ubuntu/bind9.md (+9/-72) docs/public.ecr.aws/ubuntu/cassandra.md (+4/-69) docs/public.ecr.aws/ubuntu/cortex.md (+4/-66) docs/public.ecr.aws/ubuntu/grafana.md (+4/-67) docs/public.ecr.aws/ubuntu/kafka.md (+4/-69) docs/public.ecr.aws/ubuntu/loki.md (+4/-67) docs/public.ecr.aws/ubuntu/memcached.md (+8/-100) docs/public.ecr.aws/ubuntu/mysql.md (+9/-98) docs/public.ecr.aws/ubuntu/nginx.md (+9/-73) docs/public.ecr.aws/ubuntu/postgres.md (+9/-97) docs/public.ecr.aws/ubuntu/prometheus-alertmanager.md (+4/-67) docs/public.ecr.aws/ubuntu/prometheus.md (+4/-67) docs/public.ecr.aws/ubuntu/redis.md (+5/-89) docs/public.ecr.aws/ubuntu/squid.md (+9/-74) docs/public.ecr.aws/ubuntu/telegraf.md (+5/-67) docs/public.ecr.aws/ubuntu/usage/apache2.md (+68/-0) docs/public.ecr.aws/ubuntu/usage/bind9.md (+68/-0) docs/public.ecr.aws/ubuntu/usage/cassandra.md (+67/-0) docs/public.ecr.aws/ubuntu/usage/cortex.md (+64/-0) docs/public.ecr.aws/ubuntu/usage/grafana.md (+65/-0) docs/public.ecr.aws/ubuntu/usage/kafka.md (+67/-0) docs/public.ecr.aws/ubuntu/usage/loki.md (+65/-0) docs/public.ecr.aws/ubuntu/usage/memcached.md (+96/-0) docs/public.ecr.aws/ubuntu/usage/mysql.md (+94/-0) docs/public.ecr.aws/ubuntu/usage/nginx.md (+69/-0) docs/public.ecr.aws/ubuntu/usage/postgres.md (+93/-0) docs/public.ecr.aws/ubuntu/usage/prometheus-alertmanager.md (+65/-0) docs/public.ecr.aws/ubuntu/usage/prometheus.md (+65/-0) docs/public.ecr.aws/ubuntu/usage/redis.md (+87/-0) docs/public.ecr.aws/ubuntu/usage/squid.md (+70/-0) docs/public.ecr.aws/ubuntu/usage/telegraf.md (+65/-0) docs/public.ecr.aws/ubuntu/usage/zookeeper.md (+62/-0) docs/public.ecr.aws/ubuntu/zookeeper.md (+4/-64) templates/README_DOCKERHUB.md (+48/-14) templates/README_ECR.md (+30/-18) templates/README_ECR_LTS.md (+18/-17) templates/USAGE_ECR.md (+32/-0) templates/channels_message.md (+1/-1) templates/common_usage.md (+10/-3) templates/header.md (+5/-3) templates/ubuntu.yaml (+41/-0) |
Related bugs: |
Reviewer | Review Type | Date Requested | Status |
---|---|---|---|
Paulo Machado | Approve | ||
Valentin Viennot (community) | Approve | ||
Samir Akarioh (community) | Approve | ||
Simon Aronsson | Pending | ||
Athos Ribeiro | Pending | ||
Sergio Durigan Junior | Pending | ||
Ubuntu Docker Images | Pending | ||
Review via email: mp+431840@code.launchpad.net |
Commit message
feat: adjust templates to also support Ubuntu base container image
- Add ubuntu.yaml template for dynamically generating docs for Ubuntu
base image
- add support for "support" YAML properties, to help with EOL info
- split the ECR docs to have USAGE in separate
- adjust all templates to have consistent content and support Ubuntu
Description of the change
To post a comment you must log in.
Revision history for this message
Cristovao Cordeiro (cjdc) wrote : | # |
Revision history for this message
Samir Akarioh (samiraka) : | # |
review:
Approve
Preview Diff
[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
1 | diff --git a/Makefile b/Makefile |
2 | index a179a07..214aac1 100644 |
3 | --- a/Makefile |
4 | +++ b/Makefile |
5 | @@ -5,10 +5,13 @@ DATADIR ?= data |
6 | |
7 | NS_DOCKERHUB = docker.io/ubuntu |
8 | NS_ECR = public.ecr.aws/ubuntu |
9 | +NS_ECR_USAGE = public.ecr.aws/ubuntu/usage |
10 | NS_ECR_LTS = public.ecr.aws/lts |
11 | +NS_ECR_LTS_USAGE = public.ecr.aws/lts/usage |
12 | |
13 | README_TEMPLATE_DOCKERHUB = templates/README_DOCKERHUB.md |
14 | README_TEMPLATE_ECR = templates/README_ECR.md |
15 | +USAGE_TEMPLATE_ECR = templates/USAGE_ECR.md |
16 | README_TEMPLATE_ECR_LTS = templates/README_ECR_LTS.md |
17 | |
18 | all: all-doc |
19 | @@ -22,10 +25,14 @@ dockerhub-docs: |
20 | ecr-docs: |
21 | mkdir -p $(BUILDDIR)/$(NS_ECR) |
22 | $(PYTHON) $(RENDERDOWN) $(README_TEMPLATE_ECR) --outdir $(BUILDDIR)/$(NS_ECR) --data $(DATADIR) |
23 | + mkdir -p $(BUILDDIR)/$(NS_ECR_USAGE) |
24 | + $(PYTHON) $(RENDERDOWN) $(USAGE_TEMPLATE_ECR) --outdir $(BUILDDIR)/$(NS_ECR_USAGE) --data $(DATADIR) |
25 | |
26 | ecr-lts-docs: |
27 | mkdir -p $(BUILDDIR)/$(NS_ECR_LTS) |
28 | $(PYTHON) $(RENDERDOWN) $(README_TEMPLATE_ECR_LTS) --outdir $(BUILDDIR)/$(NS_ECR_LTS) --data $(DATADIR) |
29 | + mkdir -p $(BUILDDIR)/$(NS_ECR_LTS_USAGE) |
30 | + $(PYTHON) $(RENDERDOWN) $(USAGE_TEMPLATE_ECR) --outdir $(BUILDDIR)/$(NS_ECR_LTS_USAGE) --data $(DATADIR) |
31 | |
32 | clean: clean-doc |
33 | |
34 | diff --git a/data/grafana.yaml b/data/grafana.yaml |
35 | index d000148..b1b5c1b 100644 |
36 | --- a/data/grafana.yaml |
37 | +++ b/data/grafana.yaml |
38 | @@ -70,7 +70,7 @@ parameters: |
39 | description: Pass a directory with files to provision a Grafana `datasource` and `dashboard` (see [documentation](https://grafana.com/docs/grafana/latest/administration/provisioning/)). |
40 | - type: -v |
41 | value: /path/to/persisted/data:/var/lib/grafana |
42 | - description: Persist data with a voulme instead of initializing a new database for each newly launched container. |
43 | + description: Persist data with a volume instead of initializing a new database for each newly launched container. |
44 | debug: None |
45 | microk8s: |
46 | deploy: |
47 | diff --git a/docs/docker.io/ubuntu/apache2.md b/docs/docker.io/ubuntu/apache2.md |
48 | index b77a473..c99ce70 100644 |
49 | --- a/docs/docker.io/ubuntu/apache2.md |
50 | +++ b/docs/docker.io/ubuntu/apache2.md |
51 | @@ -13,21 +13,22 @@ The Apache HTTP Server Project's goal is to build a secure, efficient and extens |
52 | Up to 5 years free security maintenance on LTS channels. |
53 | |
54 | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) |
55 | -Up to 10 years customer security maintenance `from canonical/apache2`. [Request access](https://ubuntu.com/security/docker-images#get-in-touch). |
56 | +Up to 10 years customer security maintenance [from Canonical's restricted repositories](https://ubuntu.com/security/docker-images#get-in-touch). |
57 | |
58 | -_Tags in italics are not available in ubuntu/apache2 but are shown here for completeness._ |
59 | |
60 | -| Channel Tag | | | Currently | Architectures | |
61 | +| Channel Tags | | | Currently | Architectures | |
62 | |---|---|---|---|---| |
63 | - | **`2.4-22.04_beta`** | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) | | Apache2 2.4 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
64 | - | `2.4-21.10_beta` | | | Apache2 2.4.48 on Ubuntu 21.10 | `amd64`, `arm64`, `ppc64el`, `s390x` | |
65 | - | `2.4-20.04_beta` | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) | | Apache2 2.4.41 on Ubuntu 20.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
66 | + | **`2.4-22.04_beta`** | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) <br> | Apache2 2.4 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
67 | + | `2.4-21.10_beta` | - | - <br> | Apache2 2.4.48 on Ubuntu 21.10 | `amd64`, `arm64`, `ppc64el`, `s390x` | |
68 | + | `2.4-20.04_beta` | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) <br> | Apache2 2.4.41 on Ubuntu 20.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
69 | | _`track_risk`_ | |
70 | |
71 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
72 | + |
73 | + |
74 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
75 | |
76 | ### Commercial use and Extended Security Maintenance channels |
77 | -If your usage includes commercial redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
78 | +If your usage includes commercial redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
79 | |
80 | ## Usage |
81 | |
82 | @@ -99,3 +100,4 @@ These channels (tags) are not updated anymore. Please upgrade to newer channels, |
83 | | ~~2.4-21.04~~ | Apache2 2.4.46 on Ubuntu 21.04 | 01/2022 | 2.4-21.10_beta | |
84 | | _`track`_ | |
85 | |
86 | + |
87 | diff --git a/docs/docker.io/ubuntu/bind9.md b/docs/docker.io/ubuntu/bind9.md |
88 | index 327f7c7..08d3f7e 100644 |
89 | --- a/docs/docker.io/ubuntu/bind9.md |
90 | +++ b/docs/docker.io/ubuntu/bind9.md |
91 | @@ -13,21 +13,22 @@ BIND 9 provides software for Domain Name System (DNS) management including both |
92 | Up to 5 years free security maintenance on LTS channels. |
93 | |
94 | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) |
95 | -Up to 10 years customer security maintenance `from canonical/bind9`. [Request access](https://ubuntu.com/security/docker-images#get-in-touch). |
96 | +Up to 10 years customer security maintenance [from Canonical's restricted repositories](https://ubuntu.com/security/docker-images#get-in-touch). |
97 | |
98 | -_Tags in italics are not available in ubuntu/bind9 but are shown here for completeness._ |
99 | |
100 | -| Channel Tag | | | Currently | Architectures | |
101 | +| Channel Tags | | | Currently | Architectures | |
102 | |---|---|---|---|---| |
103 | - | **`9.18-22.04_beta`** | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) | | Bind9 9.18 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
104 | - | `9.16-21.10_beta` | | | Bind9 9.16.15 on Ubuntu 21.10 | `amd64`, `arm64`, `ppc64el`, `s390x` | |
105 | - | `9.16-20.04_beta` | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) | | Bind9 9.16.1 on Ubuntu 20.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
106 | + | **`9.18-22.04_beta`** | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) <br> | Bind9 9.18 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
107 | + | `9.16-21.10_beta` | - | - <br> | Bind9 9.16.15 on Ubuntu 21.10 | `amd64`, `arm64`, `ppc64el`, `s390x` | |
108 | + | `9.16-20.04_beta` | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) <br> | Bind9 9.16.1 on Ubuntu 20.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
109 | | _`track_risk`_ | |
110 | |
111 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
112 | + |
113 | + |
114 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
115 | |
116 | ### Commercial use and Extended Security Maintenance channels |
117 | -If your usage includes commercial redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
118 | +If your usage includes commercial redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
119 | |
120 | ## Usage |
121 | |
122 | @@ -98,3 +99,4 @@ These channels (tags) are not updated anymore. Please upgrade to newer channels, |
123 | |---|---|---|---| |
124 | | _`track`_ | |
125 | |
126 | + |
127 | diff --git a/docs/docker.io/ubuntu/cassandra.md b/docs/docker.io/ubuntu/cassandra.md |
128 | index 4316f4a..706d084 100644 |
129 | --- a/docs/docker.io/ubuntu/cassandra.md |
130 | +++ b/docs/docker.io/ubuntu/cassandra.md |
131 | @@ -24,19 +24,20 @@ Apache Cassandra is an open source NoSQL distributed database trusted by thousan |
132 | Up to 5 years free security maintenance on LTS channels. |
133 | |
134 | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) |
135 | -Up to 10 years customer security maintenance `from canonical/cassandra`. [Request access](https://ubuntu.com/security/docker-images#get-in-touch). |
136 | +Up to 10 years customer security maintenance [from Canonical's restricted repositories](https://ubuntu.com/security/docker-images#get-in-touch). |
137 | |
138 | -_Tags in italics are not available in ubuntu/cassandra but are shown here for completeness._ |
139 | |
140 | -| Channel Tag | | | Currently | Architectures | |
141 | +| Channel Tags | | | Currently | Architectures | |
142 | |---|---|---|---|---| |
143 | - | **`4.0-22.04_beta`** | | | Apache Cassandra 4.0 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
144 | + | **`4.0-22.04_beta`** | - | - <br> | Apache Cassandra 4.0 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
145 | | _`track_risk`_ | |
146 | |
147 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
148 | + |
149 | + |
150 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
151 | |
152 | ### Commercial use and Extended Security Maintenance channels |
153 | -If your usage includes commercial redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
154 | +If your usage includes commercial redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
155 | |
156 | ## Usage |
157 | |
158 | @@ -112,3 +113,4 @@ These channels (tags) are not updated anymore. Please upgrade to newer channels, |
159 | | ~~4.0-20.04~~ | Apache Cassandra 4.0 on Ubuntu 20.04 LTS | 01/2021 | ~~4.0-21.04~~ | |
160 | | _`track`_ | |
161 | |
162 | + |
163 | diff --git a/docs/docker.io/ubuntu/cortex.md b/docs/docker.io/ubuntu/cortex.md |
164 | index 5e618f0..98bacbe 100644 |
165 | --- a/docs/docker.io/ubuntu/cortex.md |
166 | +++ b/docs/docker.io/ubuntu/cortex.md |
167 | @@ -20,19 +20,20 @@ Read more on the [Cortex website](https://cortexmetrics.io/). |
168 | Up to 5 years free security maintenance on LTS channels. |
169 | |
170 | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) |
171 | -Up to 10 years customer security maintenance `from canonical/cortex`. [Request access](https://ubuntu.com/security/docker-images#get-in-touch). |
172 | +Up to 10 years customer security maintenance [from Canonical's restricted repositories](https://ubuntu.com/security/docker-images#get-in-touch). |
173 | |
174 | -_Tags in italics are not available in ubuntu/cortex but are shown here for completeness._ |
175 | |
176 | -| Channel Tag | | | Currently | Architectures | |
177 | +| Channel Tags | | | Currently | Architectures | |
178 | |---|---|---|---|---| |
179 | - | **`1.11-22.04_beta`** | | | Cortex 1.11 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
180 | + | **`1.11-22.04_beta`** | - | - <br> | Cortex 1.11 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
181 | | _`track_risk`_ | |
182 | |
183 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
184 | + |
185 | + |
186 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
187 | |
188 | ### Commercial use and Extended Security Maintenance channels |
189 | -If your usage includes commercial redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
190 | +If your usage includes commercial redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
191 | |
192 | ## Usage |
193 | |
194 | @@ -105,3 +106,4 @@ These channels (tags) are not updated anymore. Please upgrade to newer channels, |
195 | | ~~1.4-20.04~~ | Cortex 1.4.0 on Ubuntu 20.04 LTS | 01/2021 | ~~1.7-21.04~~ | |
196 | | _`track`_ | |
197 | |
198 | + |
199 | diff --git a/docs/docker.io/ubuntu/grafana.md b/docs/docker.io/ubuntu/grafana.md |
200 | index e92143e..2388afa 100644 |
201 | --- a/docs/docker.io/ubuntu/grafana.md |
202 | +++ b/docs/docker.io/ubuntu/grafana.md |
203 | @@ -13,19 +13,20 @@ Grafana is a feature rich metrics dashboard and graph editor for Cloudwatch, Ela |
204 | Up to 5 years free security maintenance on LTS channels. |
205 | |
206 | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) |
207 | -Up to 10 years customer security maintenance `from canonical/grafana`. [Request access](https://ubuntu.com/security/docker-images#get-in-touch). |
208 | +Up to 10 years customer security maintenance [from Canonical's restricted repositories](https://ubuntu.com/security/docker-images#get-in-touch). |
209 | |
210 | -_Tags in italics are not available in ubuntu/grafana but are shown here for completeness._ |
211 | |
212 | -| Channel Tag | | | Currently | Architectures | |
213 | +| Channel Tags | | | Currently | Architectures | |
214 | |---|---|---|---|---| |
215 | - | **`8.2-22.04_beta`** | | | Grafana™ software 8.2 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
216 | + | **`8.2-22.04_beta`** | - | - <br> | Grafana™ software 8.2 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
217 | | _`track_risk`_ | |
218 | |
219 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
220 | + |
221 | + |
222 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
223 | |
224 | ### Commercial use and Extended Security Maintenance channels |
225 | -If your usage includes commercial redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
226 | +If your usage includes commercial redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
227 | |
228 | ## Usage |
229 | |
230 | @@ -43,7 +44,7 @@ Access your Grafana server at `localhost:30000`. |
231 | | `-e TZ=UTC` | Timezone. | |
232 | | `-p 30000:3000` | Expose Grafana on `localhost:30000`. | |
233 | | `-v /path/to/grafana/provisioning/files/:/etc/grafana/provisioning/` | Pass a directory with files to provision a Grafana `datasource` and `dashboard` (see [documentation](https://grafana.com/docs/grafana/latest/administration/provisioning/)). | |
234 | -| `-v /path/to/persisted/data:/var/lib/grafana` | Persist data with a voulme instead of initializing a new database for each newly launched container. | |
235 | +| `-v /path/to/persisted/data:/var/lib/grafana` | Persist data with a volume instead of initializing a new database for each newly launched container. | |
236 | |
237 | |
238 | #### Testing/Debugging |
239 | @@ -99,3 +100,4 @@ These channels (tags) are not updated anymore. Please upgrade to newer channels, |
240 | | ~~7.2-20.04~~ | Grafana™ software 7.2.0 on Ubuntu 20.04 LTS | 01/2021 | ~~7.4-21.04~~ | |
241 | | _`track`_ | |
242 | |
243 | + |
244 | diff --git a/docs/docker.io/ubuntu/kafka.md b/docs/docker.io/ubuntu/kafka.md |
245 | index 2e6880d..0e37aec 100644 |
246 | --- a/docs/docker.io/ubuntu/kafka.md |
247 | +++ b/docs/docker.io/ubuntu/kafka.md |
248 | @@ -13,19 +13,20 @@ Apache Kafka is an open-source distributed event streaming platform for high-per |
249 | Up to 5 years free security maintenance on LTS channels. |
250 | |
251 | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) |
252 | -Up to 10 years customer security maintenance `from canonical/kafka`. [Request access](https://ubuntu.com/security/docker-images#get-in-touch). |
253 | +Up to 10 years customer security maintenance [from Canonical's restricted repositories](https://ubuntu.com/security/docker-images#get-in-touch). |
254 | |
255 | -_Tags in italics are not available in ubuntu/kafka but are shown here for completeness._ |
256 | |
257 | -| Channel Tag | | | Currently | Architectures | |
258 | +| Channel Tags | | | Currently | Architectures | |
259 | |---|---|---|---|---| |
260 | - | **`3.1-22.04_beta`** | | | Apache Kafka 3.1.0 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
261 | + | **`3.1-22.04_beta`** | - | - <br> | Apache Kafka 3.1.0 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
262 | | _`track_risk`_ | |
263 | |
264 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
265 | + |
266 | + |
267 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
268 | |
269 | ### Commercial use and Extended Security Maintenance channels |
270 | -If your usage includes commercial redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
271 | +If your usage includes commercial redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
272 | |
273 | ## Usage |
274 | |
275 | @@ -98,3 +99,4 @@ These channels (tags) are not updated anymore. Please upgrade to newer channels, |
276 | |---|---|---|---| |
277 | | _`track`_ | |
278 | |
279 | + |
280 | diff --git a/docs/docker.io/ubuntu/loki.md b/docs/docker.io/ubuntu/loki.md |
281 | index bfc31b2..01fde14 100644 |
282 | --- a/docs/docker.io/ubuntu/loki.md |
283 | +++ b/docs/docker.io/ubuntu/loki.md |
284 | @@ -13,19 +13,20 @@ Loki is a horizontally scalable, highly available, multi-tenant log aggregation |
285 | Up to 5 years free security maintenance on LTS channels. |
286 | |
287 | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) |
288 | -Up to 10 years customer security maintenance `from canonical/loki`. [Request access](https://ubuntu.com/security/docker-images#get-in-touch). |
289 | +Up to 10 years customer security maintenance [from Canonical's restricted repositories](https://ubuntu.com/security/docker-images#get-in-touch). |
290 | |
291 | -_Tags in italics are not available in ubuntu/loki but are shown here for completeness._ |
292 | |
293 | -| Channel Tag | | | Currently | Architectures | |
294 | +| Channel Tags | | | Currently | Architectures | |
295 | |---|---|---|---|---| |
296 | - | **`2.4-22.04_beta`** | | | Grafana Loki™ software 2.4.2 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
297 | + | **`2.4-22.04_beta`** | - | - <br> | Grafana Loki™ software 2.4.2 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
298 | | _`track_risk`_ | |
299 | |
300 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
301 | + |
302 | + |
303 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
304 | |
305 | ### Commercial use and Extended Security Maintenance channels |
306 | -If your usage includes commercial redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
307 | +If your usage includes commercial redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
308 | |
309 | ## Usage |
310 | |
311 | @@ -96,3 +97,4 @@ These channels (tags) are not updated anymore. Please upgrade to newer channels, |
312 | |---|---|---|---| |
313 | | _`track`_ | |
314 | |
315 | + |
316 | diff --git a/docs/docker.io/ubuntu/memcached.md b/docs/docker.io/ubuntu/memcached.md |
317 | index 29d33e1..5009145 100644 |
318 | --- a/docs/docker.io/ubuntu/memcached.md |
319 | +++ b/docs/docker.io/ubuntu/memcached.md |
320 | @@ -13,28 +13,29 @@ Memcached is an in-memory key-value store for small chunks of arbitrary data (st |
321 | Up to 5 years free security maintenance on LTS channels. |
322 | |
323 | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) |
324 | -Up to 10 years customer security maintenance `from canonical/memcached`. [Request access](https://ubuntu.com/security/docker-images#get-in-touch). |
325 | +Up to 10 years customer security maintenance [from Canonical's restricted repositories](https://ubuntu.com/security/docker-images#get-in-touch). |
326 | |
327 | -_Tags in italics are not available in ubuntu/memcached but are shown here for completeness._ |
328 | |
329 | -| Channel Tag | | | Currently | Architectures | |
330 | +| Channel Tags | | | Currently | Architectures | |
331 | |---|---|---|---|---| |
332 | - | **`1.6-22.04_beta`** | | | Memcached 1.6 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
333 | - | `1.6-21.10_beta` | | | Memcached 1.6.9 on Ubuntu 21.10 | `amd64`, `arm64`, `ppc64el`, `s390x` | |
334 | - | `1.5-20.04_beta` | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) | | Memcached 1.5.22 on Ubuntu 20.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
335 | + | **`1.6-22.04_beta`** | - | - <br> | Memcached 1.6 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
336 | + | `1.6-21.10_beta` | - | - <br> | Memcached 1.6.9 on Ubuntu 21.10 | `amd64`, `arm64`, `ppc64el`, `s390x` | |
337 | + | `1.5-20.04_beta` | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) <br> | Memcached 1.5.22 on Ubuntu 20.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
338 | | _`track_risk`_ | |
339 | |
340 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
341 | + |
342 | + |
343 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
344 | |
345 | ### Commercial use and Extended Security Maintenance channels |
346 | -If your usage includes commercial redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
347 | +If your usage includes commercial redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
348 | |
349 | ## Usage |
350 | |
351 | Launch this image locally: |
352 | |
353 | ```sh |
354 | -docker run -d --name memcached-container -e TZ=UTC ubuntu/memcached:1.6-22.04_beta |
355 | +docker run -d --name memcached-container -e TZ=UTC ubuntu/memcached:1.5-20.04_beta |
356 | ``` |
357 | |
358 | #### Parameters |
359 | @@ -99,7 +100,7 @@ In this case you can append the flags themselves or a shell script to the run co |
360 | Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
361 | |
362 | Download |
363 | -[memcached-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/memcached/plain/examples/memcached-deployment.yml?h=1.6-22.04) and set `containers.memcached.image` in `memcached-deployment.yml` to your chosen channel tag (e.g. `ubuntu/memcached:1.6-22.04_beta`), then: |
364 | +[memcached-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/memcached/plain/examples/memcached-deployment.yml?h=1.6-22.04) and set `containers.memcached.image` in `memcached-deployment.yml` to your chosen channel tag (e.g. `ubuntu/memcached:1.5-20.04_beta`), then: |
365 | |
366 | ```sh |
367 | kubectl apply -f memcached-deployment.yml |
368 | @@ -128,3 +129,4 @@ These channels (tags) are not updated anymore. Please upgrade to newer channels, |
369 | | ~~1.6-21.04~~ | Memcached 1.6.9 on Ubuntu 21.04 | 01/2022 | 1.6-21.10_beta | |
370 | | _`track`_ | |
371 | |
372 | + |
373 | diff --git a/docs/docker.io/ubuntu/mysql.md b/docs/docker.io/ubuntu/mysql.md |
374 | index e1b2916..9ae2525 100644 |
375 | --- a/docs/docker.io/ubuntu/mysql.md |
376 | +++ b/docs/docker.io/ubuntu/mysql.md |
377 | @@ -13,21 +13,22 @@ MySQL is a fast, stable and true multi-user, multi-threaded SQL database server. |
378 | Up to 5 years free security maintenance on LTS channels. |
379 | |
380 | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) |
381 | -Up to 10 years customer security maintenance `from canonical/mysql`. [Request access](https://ubuntu.com/security/docker-images#get-in-touch). |
382 | +Up to 10 years customer security maintenance [from Canonical's restricted repositories](https://ubuntu.com/security/docker-images#get-in-touch). |
383 | |
384 | -_Tags in italics are not available in ubuntu/mysql but are shown here for completeness._ |
385 | |
386 | -| Channel Tag | | | Currently | Architectures | |
387 | +| Channel Tags | | | Currently | Architectures | |
388 | |---|---|---|---|---| |
389 | - | **`8.0-22.04_beta`** | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) | | MySQL™ software 8.0 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
390 | - | `8.0-21.10_beta` | | | MySQL™ software 8.0.27 on Ubuntu 21.10 | `amd64`, `arm64`, `ppc64el`, `s390x` | |
391 | - | `8.0-20.04_beta` | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) | | MySQL™ software 8.0.22 on Ubuntu 20.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
392 | + | **`8.0-22.04_beta`** | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) <br> | MySQL™ software 8.0 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
393 | + | `8.0-21.10_beta` | - | - <br> | MySQL™ software 8.0.27 on Ubuntu 21.10 | `amd64`, `arm64`, `ppc64el`, `s390x` | |
394 | + | `8.0-20.04_beta` | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) <br> | MySQL™ software 8.0.22 on Ubuntu 20.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
395 | | _`track_risk`_ | |
396 | |
397 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
398 | + |
399 | + |
400 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
401 | |
402 | ### Commercial use and Extended Security Maintenance channels |
403 | -If your usage includes commercial redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
404 | +If your usage includes commercial redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
405 | |
406 | ## Usage |
407 | |
408 | @@ -125,3 +126,4 @@ These channels (tags) are not updated anymore. Please upgrade to newer channels, |
409 | | ~~8.0-21.04~~ | MySQL™ software 8.0.27 on Ubuntu 21.04 | 01/2022 | 8.0-21.10_beta | |
410 | | _`track`_ | |
411 | |
412 | + |
413 | diff --git a/docs/docker.io/ubuntu/nginx.md b/docs/docker.io/ubuntu/nginx.md |
414 | index e83354c..d0b65bb 100644 |
415 | --- a/docs/docker.io/ubuntu/nginx.md |
416 | +++ b/docs/docker.io/ubuntu/nginx.md |
417 | @@ -13,21 +13,22 @@ Nginx ("engine X") is a high-performance web and reverse proxy server created by |
418 | Up to 5 years free security maintenance on LTS channels. |
419 | |
420 | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) |
421 | -Up to 10 years customer security maintenance `from canonical/nginx`. [Request access](https://ubuntu.com/security/docker-images#get-in-touch). |
422 | +Up to 10 years customer security maintenance [from Canonical's restricted repositories](https://ubuntu.com/security/docker-images#get-in-touch). |
423 | |
424 | -_Tags in italics are not available in ubuntu/nginx but are shown here for completeness._ |
425 | |
426 | -| Channel Tag | | | Currently | Architectures | |
427 | +| Channel Tags | | | Currently | Architectures | |
428 | |---|---|---|---|---| |
429 | - | **`1.18-22.04_beta`** | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) | | Nginx 1.18 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
430 | - | `1.18-21.10_beta` | | | Nginx 1.18.0 on Ubuntu 21.10 | `amd64`, `arm64`, `ppc64el`, `s390x` | |
431 | - | `1.18-20.04_beta` | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) | | Nginx 1.18.0 on Ubuntu 20.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
432 | + | **`1.18-22.04_beta`** | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) <br> | Nginx 1.18 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
433 | + | `1.18-21.10_beta` | - | - <br> | Nginx 1.18.0 on Ubuntu 21.10 | `amd64`, `arm64`, `ppc64el`, `s390x` | |
434 | + | `1.18-20.04_beta` | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) <br> | Nginx 1.18.0 on Ubuntu 20.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
435 | | _`track_risk`_ | |
436 | |
437 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
438 | + |
439 | + |
440 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
441 | |
442 | ### Commercial use and Extended Security Maintenance channels |
443 | -If your usage includes commercial redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
444 | +If your usage includes commercial redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
445 | |
446 | ## Usage |
447 | |
448 | @@ -100,3 +101,4 @@ These channels (tags) are not updated anymore. Please upgrade to newer channels, |
449 | | ~~1.18-21.04~~ | Nginx 1.18.0 on Ubuntu 21.04 | 01/2022 | 1.18-21.10_beta | |
450 | | _`track`_ | |
451 | |
452 | + |
453 | diff --git a/docs/docker.io/ubuntu/postgres.md b/docs/docker.io/ubuntu/postgres.md |
454 | index 7cb092c..416dcc0 100644 |
455 | --- a/docs/docker.io/ubuntu/postgres.md |
456 | +++ b/docs/docker.io/ubuntu/postgres.md |
457 | @@ -13,21 +13,22 @@ PostgreSQL is a powerful, open source object-relational database system. It is f |
458 | Up to 5 years free security maintenance on LTS channels. |
459 | |
460 | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) |
461 | -Up to 10 years customer security maintenance `from canonical/postgres`. [Request access](https://ubuntu.com/security/docker-images#get-in-touch). |
462 | +Up to 10 years customer security maintenance [from Canonical's restricted repositories](https://ubuntu.com/security/docker-images#get-in-touch). |
463 | |
464 | -_Tags in italics are not available in ubuntu/postgres but are shown here for completeness._ |
465 | |
466 | -| Channel Tag | | | Currently | Architectures | |
467 | +| Channel Tags | | | Currently | Architectures | |
468 | |---|---|---|---|---| |
469 | - | **`14-22.04_beta`** | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) | | Postgres 14 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
470 | - | `13-21.10_beta` | | | Postgres 13.1 on Ubuntu 21.10 | `amd64`, `arm64`, `ppc64el`, `s390x` | |
471 | - | `12-20.04_beta` | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) | | Postgres 12.4 on Ubuntu 20.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
472 | + | **`14-22.04_beta`** | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) <br> | Postgres 14 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
473 | + | `13-21.10_beta` | - | - <br> | Postgres 13.1 on Ubuntu 21.10 | `amd64`, `arm64`, `ppc64el`, `s390x` | |
474 | + | `12-20.04_beta` | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) <br> | Postgres 12.4 on Ubuntu 20.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
475 | | _`track_risk`_ | |
476 | |
477 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
478 | + |
479 | + |
480 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
481 | |
482 | ### Commercial use and Extended Security Maintenance channels |
483 | -If your usage includes commercial redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
484 | +If your usage includes commercial redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
485 | |
486 | ## Usage |
487 | |
488 | @@ -124,3 +125,4 @@ These channels (tags) are not updated anymore. Please upgrade to newer channels, |
489 | | ~~13-21.04~~ | Postgres 13.1 on Ubuntu 21.04 | 01/2022 | ~~13.1-21.10~~ | |
490 | | _`track`_ | |
491 | |
492 | + |
493 | diff --git a/docs/docker.io/ubuntu/prometheus-alertmanager.md b/docs/docker.io/ubuntu/prometheus-alertmanager.md |
494 | index a06fffe..a777714 100644 |
495 | --- a/docs/docker.io/ubuntu/prometheus-alertmanager.md |
496 | +++ b/docs/docker.io/ubuntu/prometheus-alertmanager.md |
497 | @@ -13,19 +13,20 @@ The Alertmanager handles alerts sent by client applications such as the Promethe |
498 | Up to 5 years free security maintenance on LTS channels. |
499 | |
500 | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) |
501 | -Up to 10 years customer security maintenance `from canonical/prometheus-alertmanager`. [Request access](https://ubuntu.com/security/docker-images#get-in-touch). |
502 | +Up to 10 years customer security maintenance [from Canonical's restricted repositories](https://ubuntu.com/security/docker-images#get-in-touch). |
503 | |
504 | -_Tags in italics are not available in ubuntu/prometheus-alertmanager but are shown here for completeness._ |
505 | |
506 | -| Channel Tag | | | Currently | Architectures | |
507 | +| Channel Tags | | | Currently | Architectures | |
508 | |---|---|---|---|---| |
509 | - | **`0.23-22.04_beta`** | | | Prometheus Alertmanager 0.23 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
510 | + | **`0.23-22.04_beta`** | - | - <br> | Prometheus Alertmanager 0.23 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
511 | | _`track_risk`_ | |
512 | |
513 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
514 | + |
515 | + |
516 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
517 | |
518 | ### Commercial use and Extended Security Maintenance channels |
519 | -If your usage includes commercial redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
520 | +If your usage includes commercial redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
521 | |
522 | ## Usage |
523 | |
524 | @@ -99,3 +100,4 @@ These channels (tags) are not updated anymore. Please upgrade to newer channels, |
525 | | ~~0.21-20.04~~ | Prometheus Alertmanager 0.21.0 on Ubuntu 20.04 LTS | 01/2021 | ~~0.21-21.04~~ | |
526 | | _`track`_ | |
527 | |
528 | + |
529 | diff --git a/docs/docker.io/ubuntu/prometheus.md b/docs/docker.io/ubuntu/prometheus.md |
530 | index 52e94f1..30fc9b7 100644 |
531 | --- a/docs/docker.io/ubuntu/prometheus.md |
532 | +++ b/docs/docker.io/ubuntu/prometheus.md |
533 | @@ -13,19 +13,20 @@ Prometheus is a systems and service monitoring system. It collects metrics from |
534 | Up to 5 years free security maintenance on LTS channels. |
535 | |
536 | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) |
537 | -Up to 10 years customer security maintenance `from canonical/prometheus`. [Request access](https://ubuntu.com/security/docker-images#get-in-touch). |
538 | +Up to 10 years customer security maintenance [from Canonical's restricted repositories](https://ubuntu.com/security/docker-images#get-in-touch). |
539 | |
540 | -_Tags in italics are not available in ubuntu/prometheus but are shown here for completeness._ |
541 | |
542 | -| Channel Tag | | | Currently | Architectures | |
543 | +| Channel Tags | | | Currently | Architectures | |
544 | |---|---|---|---|---| |
545 | - | **`2.33-22.04_beta`** | | | Prometheus 2.33 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
546 | + | **`2.33-22.04_beta`** | - | - <br> | Prometheus 2.33 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
547 | | _`track_risk`_ | |
548 | |
549 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
550 | + |
551 | + |
552 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
553 | |
554 | ### Commercial use and Extended Security Maintenance channels |
555 | -If your usage includes commercial redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
556 | +If your usage includes commercial redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
557 | |
558 | ## Usage |
559 | |
560 | @@ -100,3 +101,4 @@ These channels (tags) are not updated anymore. Please upgrade to newer channels, |
561 | | ~~2.20-20.04~~ | Prometheus 2.20.1 on Ubuntu 20.04 LTS | 01/2021 | ~~2.25-21.04~~ | |
562 | | _`track`_ | |
563 | |
564 | + |
565 | diff --git a/docs/docker.io/ubuntu/redis.md b/docs/docker.io/ubuntu/redis.md |
566 | index 34330ab..2c75035 100644 |
567 | --- a/docs/docker.io/ubuntu/redis.md |
568 | +++ b/docs/docker.io/ubuntu/redis.md |
569 | @@ -13,27 +13,28 @@ Redis is an open source (BSD licensed), in-memory data structure store, used as |
570 | Up to 5 years free security maintenance on LTS channels. |
571 | |
572 | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) |
573 | -Up to 10 years customer security maintenance `from canonical/redis`. [Request access](https://ubuntu.com/security/docker-images#get-in-touch). |
574 | +Up to 10 years customer security maintenance [from Canonical's restricted repositories](https://ubuntu.com/security/docker-images#get-in-touch). |
575 | |
576 | -_Tags in italics are not available in ubuntu/redis but are shown here for completeness._ |
577 | |
578 | -| Channel Tag | | | Currently | Architectures | |
579 | +| Channel Tags | | | Currently | Architectures | |
580 | |---|---|---|---|---| |
581 | - | **`6.2-22.04_beta`** | | | Redis™ software 6.2 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
582 | - | `6.0-21.10_beta` | | | Redis™ software 6.0.15 on Ubuntu 21.10 | `amd64`, `arm64`, `ppc64el`, `s390x` | |
583 | + | **`6.2-22.04_beta`** | - | - <br> | Redis™ software 6.2 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
584 | + | `6.0-21.10_beta` | - | - <br> | Redis™ software 6.0.15 on Ubuntu 21.10 | `amd64`, `arm64`, `ppc64el`, `s390x` | |
585 | | _`track_risk`_ | |
586 | |
587 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
588 | + |
589 | + |
590 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
591 | |
592 | ### Commercial use and Extended Security Maintenance channels |
593 | -If your usage includes commercial redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
594 | +If your usage includes commercial redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
595 | |
596 | ## Usage |
597 | |
598 | Launch this image locally: |
599 | |
600 | ```sh |
601 | -docker run -d --name redis-container -e TZ=UTC -p 30073:6379 -e REDIS_PASSWORD=mypassword ubuntu/redis:6.2-22.04_beta |
602 | +docker run -d --name redis-container -e TZ=UTC -p 30073:6379 -e REDIS_PASSWORD=mypassword ubuntu/redis:6.0-21.10_beta |
603 | ``` |
604 | Access your Redis server at `localhost:30073`. |
605 | |
606 | @@ -71,7 +72,7 @@ This image also includes the `redis-cli` client for interactive container use: |
607 | ```sh |
608 | $ docker network create redis-network |
609 | $ docker network connect redis-network redis-container |
610 | -$ docker run -it --rm --network redis-network ubuntu/redis:6.2-22.04_beta redis-cli -h redis-container |
611 | +$ docker run -it --rm --network redis-network ubuntu/redis:6.0-21.10_beta redis-cli -h redis-container |
612 | ``` |
613 | Now you can: |
614 | ``` |
615 | @@ -89,7 +90,7 @@ Works with any Kubernetes; if you don't have one, we recommend you [install Micr |
616 | |
617 | Download |
618 | [redis.conf](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/redis/plain/examples/config/redis.conf?h=6.2-22.04) and |
619 | -[redis-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/redis/plain/examples/redis-deployment.yml?h=6.2-22.04) and set `containers.redis.image` in `redis-deployment.yml` to your chosen channel tag (e.g. `ubuntu/redis:6.2-22.04_beta`), then: |
620 | +[redis-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/redis/plain/examples/redis-deployment.yml?h=6.2-22.04) and set `containers.redis.image` in `redis-deployment.yml` to your chosen channel tag (e.g. `ubuntu/redis:6.0-21.10_beta`), then: |
621 | |
622 | ```sh |
623 | kubectl create configmap redis-config --from-file=redis=redis.conf |
624 | @@ -120,3 +121,4 @@ These channels (tags) are not updated anymore. Please upgrade to newer channels, |
625 | | ~~5.0-20.04~~ | Redis™ software 5.0.7 on Ubuntu 20.04 LTS | 01/2021 | ~~6.0-21.04~~ | |
626 | | _`track`_ | |
627 | |
628 | + |
629 | diff --git a/docs/docker.io/ubuntu/squid.md b/docs/docker.io/ubuntu/squid.md |
630 | index 15c055f..e581c7a 100644 |
631 | --- a/docs/docker.io/ubuntu/squid.md |
632 | +++ b/docs/docker.io/ubuntu/squid.md |
633 | @@ -13,21 +13,22 @@ Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. It r |
634 | Up to 5 years free security maintenance on LTS channels. |
635 | |
636 | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) |
637 | -Up to 10 years customer security maintenance `from canonical/squid`. [Request access](https://ubuntu.com/security/docker-images#get-in-touch). |
638 | +Up to 10 years customer security maintenance [from Canonical's restricted repositories](https://ubuntu.com/security/docker-images#get-in-touch). |
639 | |
640 | -_Tags in italics are not available in ubuntu/squid but are shown here for completeness._ |
641 | |
642 | -| Channel Tag | | | Currently | Architectures | |
643 | +| Channel Tags | | | Currently | Architectures | |
644 | |---|---|---|---|---| |
645 | - | **`5.2-22.04_beta`** | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) | | Squid 5.2 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
646 | - | `4.13-21.10_beta` | | | Squid 4.13 on Ubuntu 21.10 | `amd64`, `arm64`, `ppc64el`, `s390x` | |
647 | - | `4.10-20.04_beta` | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) | | Squid 4.10 on Ubuntu 20.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
648 | + | **`5.2-22.04_beta`** | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) <br> | Squid 5.2 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
649 | + | `4.13-21.10_beta` | - | - <br> | Squid 4.13 on Ubuntu 21.10 | `amd64`, `arm64`, `ppc64el`, `s390x` | |
650 | + | `4.10-20.04_beta` | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) <br> | Squid 4.10 on Ubuntu 20.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
651 | | _`track_risk`_ | |
652 | |
653 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
654 | + |
655 | + |
656 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
657 | |
658 | ### Commercial use and Extended Security Maintenance channels |
659 | -If your usage includes commercial redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
660 | +If your usage includes commercial redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
661 | |
662 | ## Usage |
663 | |
664 | @@ -100,3 +101,4 @@ These channels (tags) are not updated anymore. Please upgrade to newer channels, |
665 | |---|---|---|---| |
666 | | _`track`_ | |
667 | |
668 | + |
669 | diff --git a/docs/docker.io/ubuntu/telegraf.md b/docs/docker.io/ubuntu/telegraf.md |
670 | index cfb8f51..ff4bf7b 100644 |
671 | --- a/docs/docker.io/ubuntu/telegraf.md |
672 | +++ b/docs/docker.io/ubuntu/telegraf.md |
673 | @@ -13,27 +13,28 @@ Telegraf is an agent for collecting, processing, aggregating, and writing metric |
674 | Up to 5 years free security maintenance on LTS channels. |
675 | |
676 | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) |
677 | -Up to 10 years customer security maintenance `from canonical/telegraf`. [Request access](https://ubuntu.com/security/docker-images#get-in-touch). |
678 | +Up to 10 years customer security maintenance [from Canonical's restricted repositories](https://ubuntu.com/security/docker-images#get-in-touch). |
679 | |
680 | -_Tags in italics are not available in ubuntu/telegraf but are shown here for completeness._ |
681 | |
682 | -| Channel Tag | | | Currently | Architectures | |
683 | +| Channel Tags | | | Currently | Architectures | |
684 | |---|---|---|---|---| |
685 | - | **`1.21-22.04_beta`** | | | Telegraf™ software 1.21 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
686 | - | `1.19-21.10_beta` | | | Telegraf™ software 1.19.2 on Ubuntu 21.10 | `amd64`, `arm64`, `ppc64el`, `s390x` | |
687 | + | **`1.21-22.04_beta`** | - | - <br> | Telegraf™ software 1.21 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
688 | + | `1.19-21.10_beta` | - | - <br> | Telegraf™ software 1.19.2 on Ubuntu 21.10 | `amd64`, `arm64`, `ppc64el`, `s390x` | |
689 | | _`track_risk`_ | |
690 | |
691 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
692 | + |
693 | + |
694 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
695 | |
696 | ### Commercial use and Extended Security Maintenance channels |
697 | -If your usage includes commercial redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
698 | +If your usage includes commercial redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
699 | |
700 | ## Usage |
701 | |
702 | Launch this image locally: |
703 | |
704 | ```sh |
705 | -docker run -d --name telegraf-container -e TZ=UTC -p 30273:9273 ubuntu/telegraf:1.21-22.04_beta |
706 | +docker run -d --name telegraf-container -e TZ=UTC -p 30273:9273 ubuntu/telegraf:1.19-21.10_beta |
707 | ``` |
708 | Access your Telegraf server at `localhost:30273`. |
709 | |
710 | @@ -67,7 +68,7 @@ Works with any Kubernetes; if you don't have one, we recommend you [install Micr |
711 | |
712 | Download |
713 | [telegraf.conf](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/telegraf/plain/examples/config/telegraf.conf?h=1.21-22.04) and |
714 | -[telegraf-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/telegraf/plain/examples/telegraf-deployment.yml?h=1.21-22.04) and set `containers.telegraf.image` in `telegraf-deployment.yml` to your chosen channel tag (e.g. `ubuntu/telegraf:1.21-22.04_beta`), then: |
715 | +[telegraf-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/telegraf/plain/examples/telegraf-deployment.yml?h=1.21-22.04) and set `containers.telegraf.image` in `telegraf-deployment.yml` to your chosen channel tag (e.g. `ubuntu/telegraf:1.19-21.10_beta`), then: |
716 | |
717 | ```sh |
718 | kubectl create configmap telegraf-config --from-file=main-config=telegraf.conf |
719 | @@ -98,3 +99,4 @@ These channels (tags) are not updated anymore. Please upgrade to newer channels, |
720 | | ~~1.15-20.04~~ | Telegraf™ software 1.15.2 on Ubuntu 20.04 LTS | 01/2021 | ~~1.17-21.04~~ | |
721 | | _`track`_ | |
722 | |
723 | + |
724 | diff --git a/docs/docker.io/ubuntu/zookeeper.md b/docs/docker.io/ubuntu/zookeeper.md |
725 | index 98180d0..1b10c78 100644 |
726 | --- a/docs/docker.io/ubuntu/zookeeper.md |
727 | +++ b/docs/docker.io/ubuntu/zookeeper.md |
728 | @@ -13,19 +13,20 @@ ZooKeeper is a centralized service for maintaining configuration information, na |
729 | Up to 5 years free security maintenance on LTS channels. |
730 | |
731 | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) |
732 | -Up to 10 years customer security maintenance `from canonical/zookeeper`. [Request access](https://ubuntu.com/security/docker-images#get-in-touch). |
733 | +Up to 10 years customer security maintenance [from Canonical's restricted repositories](https://ubuntu.com/security/docker-images#get-in-touch). |
734 | |
735 | -_Tags in italics are not available in ubuntu/zookeeper but are shown here for completeness._ |
736 | |
737 | -| Channel Tag | | | Currently | Architectures | |
738 | +| Channel Tags | | | Currently | Architectures | |
739 | |---|---|---|---|---| |
740 | - | **`3.1-22.04_beta`** | | | Apache ZooKeeper 3.1.0 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
741 | + | **`3.1-22.04_beta`** | - | - <br> | Apache ZooKeeper 3.1.0 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
742 | | _`track_risk`_ | |
743 | |
744 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
745 | + |
746 | + |
747 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
748 | |
749 | ### Commercial use and Extended Security Maintenance channels |
750 | -If your usage includes commercial redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
751 | +If your usage includes commercial redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
752 | |
753 | ## Usage |
754 | |
755 | @@ -93,3 +94,4 @@ These channels (tags) are not updated anymore. Please upgrade to newer channels, |
756 | |---|---|---|---| |
757 | | _`track`_ | |
758 | |
759 | + |
760 | diff --git a/docs/public.ecr.aws/lts/apache2.md b/docs/public.ecr.aws/lts/apache2.md |
761 | index 93dc477..673b55f 100644 |
762 | --- a/docs/public.ecr.aws/lts/apache2.md |
763 | +++ b/docs/public.ecr.aws/lts/apache2.md |
764 | @@ -1,4 +1,4 @@ |
765 | -# Apache2 LTS Docker Image |
766 | +# Apache2 | Ubuntu |
767 | |
768 | |
769 | ## LTS Docker Image Portfolio |
770 | @@ -18,78 +18,14 @@ Up to 10 years customer security maintenance `from canonical/apache2`. [Request |
771 | |
772 | <!-- _Tags in italics are not available in public.ecr.aws/lts/apache2 but are shown here for completeness._ --> |
773 | |
774 | -| Channel Tag | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
775 | +| Channel Tags | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
776 | |---|---|---|---|---| |
777 | - | **`2.4-22.04_beta`** | 04/2027 | 04/2032 | Apache2 2.4 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
778 | - | `2.4-20.04_beta` | 04/2025 | 04/2030 | Apache2 2.4.41 on Ubuntu 20.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
779 | + | **`2.4-22.04_beta`** | 04/2027 | 04/2032 | Apache2 2.4 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
780 | + | `2.4-20.04_beta` | 04/2025 | 04/2030 | Apache2 2.4.41 on Ubuntu 20.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
781 | | _`track_risk`_ | |
782 | |
783 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
784 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
785 | |
786 | ### Commercial use and Extended Security Maintenance channels |
787 | -If your usage includes redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
788 | - |
789 | - |
790 | -If your usage includes redistribution, please [contact Canonical](https://ubuntu.com/security/docker-images#get-in-touch). |
791 | - |
792 | -## Docker CLI |
793 | - |
794 | -Launch this image locally: |
795 | - |
796 | -```sh |
797 | -docker run -d --name apache2-container -e TZ=UTC -p 8080:80 public.ecr.aws/lts/apache2:2.4-22.04_beta |
798 | -``` |
799 | -Access your Apache2 server at `http://localhost:8080`. |
800 | - |
801 | -#### Parameters |
802 | - |
803 | -| Parameter | Description | |
804 | -|---|---| |
805 | -| `-e TZ=UTC` | Timezone. | |
806 | -| `-p 8080:80` | Expose Apache2 on `localhost:8080`. | |
807 | -| `-v /local/path/to/website:/var/www/html` | Mount and serve a local website. | |
808 | -| `-v /path/to/apache2.conf:/etc/apache2/apache2.conf` | Local [configuration file](https://httpd.apache.org/docs/2.4/) `apache2.conf` (try [this example](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/apache2/plain/examples/config/apache2.conf?h=2.4-22.04)). | |
809 | - |
810 | - |
811 | -#### Testing/Debugging |
812 | - |
813 | -To debug the container: |
814 | - |
815 | -```sh |
816 | -docker logs -f apache2-container |
817 | -``` |
818 | - |
819 | -To get an interactive shell: |
820 | - |
821 | -```sh |
822 | -docker exec -it apache2-container /bin/bash |
823 | -``` |
824 | - |
825 | - |
826 | -## Deploy with Kubernetes |
827 | - |
828 | -Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
829 | - |
830 | -Download |
831 | -[apache2.conf](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/apache2/plain/examples/config/apache2.conf?h=2.4-22.04), [index.html](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/apache2/plain/examples/config/html/index.html?h=2.4-22.04) and |
832 | -[apache2-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/apache2/plain/examples/apache2-deployment.yml?h=2.4-22.04) and set `containers.apache2.image` in `apache2-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/lts/apache2:2.4-22.04_beta`), then: |
833 | - |
834 | -```sh |
835 | -kubectl create configmap apache2-config --from-file=apache2=apache2.conf --from-file=apache2-site=index.html |
836 | -kubectl apply -f apache2-deployment.yml |
837 | -``` |
838 | - |
839 | -You will now be able to connect to the apache2 server on `http://localhost:30080`. |
840 | - |
841 | -## Bugs and feature requests |
842 | - |
843 | -If you find a bug in our image or want to request a specific feature, please file a bug here: |
844 | - |
845 | -[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
846 | - |
847 | -Please title the bug "`apache2: <issue summary>`". Make sure to include the digest of the image you are using, from: |
848 | - |
849 | -```sh |
850 | -docker images --no-trunc --quiet public.ecr.aws/lts/apache2:<tag> |
851 | -``` |
852 | +If your usage includes redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
853 | |
854 | diff --git a/docs/public.ecr.aws/lts/bind9.md b/docs/public.ecr.aws/lts/bind9.md |
855 | index f30b9e1..e5448d5 100644 |
856 | --- a/docs/public.ecr.aws/lts/bind9.md |
857 | +++ b/docs/public.ecr.aws/lts/bind9.md |
858 | @@ -1,4 +1,4 @@ |
859 | -# Bind9 LTS Docker Image |
860 | +# Bind9 | Ubuntu |
861 | |
862 | |
863 | ## LTS Docker Image Portfolio |
864 | @@ -18,78 +18,14 @@ Up to 10 years customer security maintenance `from canonical/bind9`. [Request ac |
865 | |
866 | <!-- _Tags in italics are not available in public.ecr.aws/lts/bind9 but are shown here for completeness._ --> |
867 | |
868 | -| Channel Tag | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
869 | +| Channel Tags | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
870 | |---|---|---|---|---| |
871 | - | **`9.18-22.04_beta`** | 04/2027 | 04/2032 | Bind9 9.18 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
872 | - | `9.16-20.04_beta` | 04/2025 | 04/2030 | Bind9 9.16.1 on Ubuntu 20.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
873 | + | **`9.18-22.04_beta`** | 04/2027 | 04/2032 | Bind9 9.18 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
874 | + | `9.16-20.04_beta` | 04/2025 | 04/2030 | Bind9 9.16.1 on Ubuntu 20.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
875 | | _`track_risk`_ | |
876 | |
877 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
878 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
879 | |
880 | ### Commercial use and Extended Security Maintenance channels |
881 | -If your usage includes redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
882 | - |
883 | - |
884 | -If your usage includes redistribution, please [contact Canonical](https://ubuntu.com/security/docker-images#get-in-touch). |
885 | - |
886 | -## Docker CLI |
887 | - |
888 | -Launch this image locally: |
889 | - |
890 | -```sh |
891 | -docker run -d --name bind9-container -e TZ=UTC -p 30053:53 public.ecr.aws/lts/bind9:9.18-22.04_beta |
892 | -``` |
893 | -Access your Bind9 server at `localhost:30053` |
894 | - |
895 | -#### Parameters |
896 | - |
897 | -| Parameter | Description | |
898 | -|---|---| |
899 | -| `-e TZ=UTC` | Timezone. | |
900 | -| `-p 30053:53` | Expose bind9 on `localhost:30053`. | |
901 | -| `-e BIND9_USER=bind` | The user which will start the `named` process. | |
902 | -| `-v /path/to/bind/configuration:/etc/bind/named.conf` | Local [configuration file](https://bind9.readthedocs.io/en/latest/reference.html) `named.conf` (try [this example](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/bind9/plain/examples/caching-nameserver/named.conf.options?h=9.18-22.04)). | |
903 | -| `-v /path/to/cached/data:/var/cache/bind` | Location where locally cached data can be dumped. | |
904 | -| `-v /path/to/resource/records:/var/lib/bind` | Location of Resource Records defining various domain information. | |
905 | - |
906 | - |
907 | -#### Testing/Debugging |
908 | - |
909 | -To debug the container: |
910 | - |
911 | -```sh |
912 | -docker logs -f bind9-container |
913 | -``` |
914 | - |
915 | -To get an interactive shell: |
916 | - |
917 | -```sh |
918 | -docker exec -it bind9-container /bin/bash |
919 | -``` |
920 | - |
921 | - |
922 | -## Deploy with Kubernetes |
923 | - |
924 | -Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
925 | - |
926 | -Download |
927 | -[bind9-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/bind9/plain/examples/bind9-deployment.yml?h=9.18-22.04) and set `containers.bind9.image` in `bind9-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/lts/bind9:9.18-22.04_beta`), then: |
928 | - |
929 | -```sh |
930 | -kubectl apply -f bind9-deployment.yml |
931 | -``` |
932 | - |
933 | -You will now be able to connect to the Bind9 server on localhost:30053`. |
934 | - |
935 | -## Bugs and feature requests |
936 | - |
937 | -If you find a bug in our image or want to request a specific feature, please file a bug here: |
938 | - |
939 | -[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
940 | - |
941 | -Please title the bug "`bind9: <issue summary>`". Make sure to include the digest of the image you are using, from: |
942 | - |
943 | -```sh |
944 | -docker images --no-trunc --quiet public.ecr.aws/lts/bind9:<tag> |
945 | -``` |
946 | +If your usage includes redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
947 | |
948 | diff --git a/docs/public.ecr.aws/lts/cassandra.md b/docs/public.ecr.aws/lts/cassandra.md |
949 | index affee36..7284240 100644 |
950 | --- a/docs/public.ecr.aws/lts/cassandra.md |
951 | +++ b/docs/public.ecr.aws/lts/cassandra.md |
952 | @@ -9,7 +9,7 @@ tags listed below will still receive security updates when needed. |
953 | Once the most recent tag listed below is deprecated, this repository will no |
954 | longer receive security updates. |
955 | |
956 | -# Apache Cassandra LTS Docker Image |
957 | +# Apache Cassandra | Ubuntu |
958 | **This repository has no LTS channel yet, please [get in touch](https://ubuntu.com/security/docker-images#get-in-touch) if you need one.** |
959 | |
960 | ## LTS Docker Image Portfolio |
961 | @@ -29,78 +29,12 @@ Up to 10 years customer security maintenance `from canonical/cassandra`. [Reques |
962 | |
963 | <!-- _Tags in italics are not available in public.ecr.aws/lts/cassandra but are shown here for completeness._ --> |
964 | |
965 | -| Channel Tag | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
966 | +| Channel Tags | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
967 | |---|---|---|---|---| |
968 | | _`track_risk`_ | |
969 | |
970 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
971 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
972 | |
973 | ### Commercial use and Extended Security Maintenance channels |
974 | -If your usage includes redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
975 | - |
976 | - |
977 | -If your usage includes redistribution, please [contact Canonical](https://ubuntu.com/security/docker-images#get-in-touch). |
978 | - |
979 | -## Docker CLI |
980 | - |
981 | -Launch this image locally: |
982 | - |
983 | -```sh |
984 | -docker run -d --name cassandra-container -e TZ=UTC -p 7000:7000 -p 7001:7001 -p 7199:7199 -p 9042:9042 -p 9160:9160 public.ecr.aws/lts/cassandra:latest |
985 | -``` |
986 | -Access your Cassandra server with `cqlsh localhost 9042`. |
987 | - |
988 | -#### Parameters |
989 | - |
990 | -| Parameter | Description | |
991 | -|---|---| |
992 | -| `-e TZ=UTC` | Timezone. | |
993 | -| `-p 7000:7000` | Expose itra-node communication | |
994 | -| `-p 7001:7001` | Expose TLS itra-node communication | |
995 | -| `-p 7199:7199` | Expose JMX | |
996 | -| `-p 9042:9042` | Expose CQL | |
997 | -| `-p 9160:9160` | Expose thrift service | |
998 | -| `-v /local/path/to/data:/var/lib/cassandra` | Volume to store Cassandra data | |
999 | -| `-v /path/to/logs:/var/log/cassandra` | Volume to store cassandra logs | |
1000 | - |
1001 | - |
1002 | -#### Testing/Debugging |
1003 | - |
1004 | -To debug the container: |
1005 | - |
1006 | -```sh |
1007 | -docker logs -f cassandra-container |
1008 | -``` |
1009 | - |
1010 | -To get an interactive shell: |
1011 | - |
1012 | -```sh |
1013 | -docker exec -it cassandra-container /bin/bash |
1014 | -``` |
1015 | - |
1016 | - |
1017 | -## Deploy with Kubernetes |
1018 | - |
1019 | -Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
1020 | - |
1021 | -Download |
1022 | -[cassandra-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/cassandra/plain/examples/cassandra-deployment.yml?h=4.0-22.04) and set `containers.cassandra.image` in `cassandra-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/lts/cassandra:latest`), then: |
1023 | - |
1024 | -```sh |
1025 | -kubectl apply -f cassandra-deployment.yml |
1026 | -``` |
1027 | - |
1028 | -You can now access the cassandra server on port 9042 (e.g., cqlsh localhost 9042) |
1029 | - |
1030 | -## Bugs and feature requests |
1031 | - |
1032 | -If you find a bug in our image or want to request a specific feature, please file a bug here: |
1033 | - |
1034 | -[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
1035 | - |
1036 | -Please title the bug "`cassandra: <issue summary>`". Make sure to include the digest of the image you are using, from: |
1037 | - |
1038 | -```sh |
1039 | -docker images --no-trunc --quiet public.ecr.aws/lts/cassandra:<tag> |
1040 | -``` |
1041 | +If your usage includes redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
1042 | |
1043 | diff --git a/docs/public.ecr.aws/lts/cortex.md b/docs/public.ecr.aws/lts/cortex.md |
1044 | index 22ff38a..4ea818d 100644 |
1045 | --- a/docs/public.ecr.aws/lts/cortex.md |
1046 | +++ b/docs/public.ecr.aws/lts/cortex.md |
1047 | @@ -1,4 +1,4 @@ |
1048 | -# Cortex LTS Docker Image |
1049 | +# Cortex | Ubuntu |
1050 | **This repository has no LTS channel yet, please [get in touch](https://ubuntu.com/security/docker-images#get-in-touch) if you need one.** |
1051 | |
1052 | ## LTS Docker Image Portfolio |
1053 | @@ -25,75 +25,12 @@ Up to 10 years customer security maintenance `from canonical/cortex`. [Request a |
1054 | |
1055 | <!-- _Tags in italics are not available in public.ecr.aws/lts/cortex but are shown here for completeness._ --> |
1056 | |
1057 | -| Channel Tag | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
1058 | +| Channel Tags | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
1059 | |---|---|---|---|---| |
1060 | | _`track_risk`_ | |
1061 | |
1062 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
1063 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
1064 | |
1065 | ### Commercial use and Extended Security Maintenance channels |
1066 | -If your usage includes redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
1067 | - |
1068 | - |
1069 | -If your usage includes redistribution, please [contact Canonical](https://ubuntu.com/security/docker-images#get-in-touch). |
1070 | - |
1071 | -## Docker CLI |
1072 | - |
1073 | -Launch this image locally: |
1074 | - |
1075 | -```sh |
1076 | -docker run -d --name cortex-container -e TZ=UTC -p 32709:9009 public.ecr.aws/lts/cortex:latest |
1077 | -``` |
1078 | -Access your Cortex server at `http://localhost:32709`. |
1079 | - |
1080 | -#### Parameters |
1081 | - |
1082 | -| Parameter | Description | |
1083 | -|---|---| |
1084 | -| `-e TZ=UTC` | Timezone. | |
1085 | -| `-p 32709:9009` | Expose Cortex on `localhost:32709`. | |
1086 | -| `-v /my/local/cortex.yaml:/etc/cortex/cortex.yaml` | Local [configuration file](https://cortexmetrics.io/docs/configuration/) `cortex.yaml` (try [this example](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/cortex/plain/oci/examples/config/cortex.yaml?h=1.11-22.04)). | |
1087 | - |
1088 | - |
1089 | -#### Testing/Debugging |
1090 | - |
1091 | -To debug the container: |
1092 | - |
1093 | -```sh |
1094 | -docker logs -f cortex-container |
1095 | -``` |
1096 | - |
1097 | -To get an interactive shell: |
1098 | - |
1099 | -```sh |
1100 | -docker exec -it cortex-container /bin/bash |
1101 | -``` |
1102 | - |
1103 | - |
1104 | -## Deploy with Kubernetes |
1105 | - |
1106 | -Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
1107 | - |
1108 | -Download |
1109 | -[cortex.yaml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/cortex/plain/oci/examples/config/cortex.yaml?h=1.11-22.04) and |
1110 | -[cortex-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/cortex/plain/oci/examples/cortex-deployment.yml?h=1.11-22.04) and set `containers.cortex.image` in `cortex-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/lts/cortex:latest`), then: |
1111 | - |
1112 | -```sh |
1113 | -kubectl create configmap cortex-config --from-file=main-config=cortex.yaml |
1114 | -kubectl apply -f cortex-deployment.yml |
1115 | -``` |
1116 | - |
1117 | -You will now be able to connect to the Cortex server on `localhost:32709`. |
1118 | - |
1119 | -## Bugs and feature requests |
1120 | - |
1121 | -If you find a bug in our image or want to request a specific feature, please file a bug here: |
1122 | - |
1123 | -[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
1124 | - |
1125 | -Please title the bug "`cortex: <issue summary>`". Make sure to include the digest of the image you are using, from: |
1126 | - |
1127 | -```sh |
1128 | -docker images --no-trunc --quiet public.ecr.aws/lts/cortex:<tag> |
1129 | -``` |
1130 | +If your usage includes redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
1131 | |
1132 | diff --git a/docs/public.ecr.aws/lts/grafana.md b/docs/public.ecr.aws/lts/grafana.md |
1133 | index eee018e..c9ac009 100644 |
1134 | --- a/docs/public.ecr.aws/lts/grafana.md |
1135 | +++ b/docs/public.ecr.aws/lts/grafana.md |
1136 | @@ -1,4 +1,4 @@ |
1137 | -# Grafana™ software LTS Docker Image |
1138 | +# Grafana™ software | Ubuntu |
1139 | **This repository has no LTS channel yet, please [get in touch](https://ubuntu.com/security/docker-images#get-in-touch) if you need one.** |
1140 | |
1141 | ## LTS Docker Image Portfolio |
1142 | @@ -18,76 +18,12 @@ Up to 10 years customer security maintenance `from canonical/grafana`. [Request |
1143 | |
1144 | <!-- _Tags in italics are not available in public.ecr.aws/lts/grafana but are shown here for completeness._ --> |
1145 | |
1146 | -| Channel Tag | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
1147 | +| Channel Tags | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
1148 | |---|---|---|---|---| |
1149 | | _`track_risk`_ | |
1150 | |
1151 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
1152 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
1153 | |
1154 | ### Commercial use and Extended Security Maintenance channels |
1155 | -If your usage includes redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
1156 | - |
1157 | - |
1158 | -If your usage includes redistribution, please [contact Canonical](https://ubuntu.com/security/docker-images#get-in-touch). |
1159 | - |
1160 | -## Docker CLI |
1161 | - |
1162 | -Launch this image locally: |
1163 | - |
1164 | -```sh |
1165 | -docker run -d --name grafana-container -e TZ=UTC -p 30000:3000 public.ecr.aws/lts/grafana:latest |
1166 | -``` |
1167 | -Access your Grafana server at `localhost:30000`. |
1168 | - |
1169 | -#### Parameters |
1170 | - |
1171 | -| Parameter | Description | |
1172 | -|---|---| |
1173 | -| `-e TZ=UTC` | Timezone. | |
1174 | -| `-p 30000:3000` | Expose Grafana on `localhost:30000`. | |
1175 | -| `-v /path/to/grafana/provisioning/files/:/etc/grafana/provisioning/` | Pass a directory with files to provision a Grafana `datasource` and `dashboard` (see [documentation](https://grafana.com/docs/grafana/latest/administration/provisioning/)). | |
1176 | -| `-v /path/to/persisted/data:/var/lib/grafana` | Persist data with a voulme instead of initializing a new database for each newly launched container. | |
1177 | - |
1178 | - |
1179 | -#### Testing/Debugging |
1180 | - |
1181 | -To debug the container: |
1182 | - |
1183 | -```sh |
1184 | -docker logs -f grafana-container |
1185 | -``` |
1186 | - |
1187 | -To get an interactive shell: |
1188 | - |
1189 | -```sh |
1190 | -docker exec -it grafana-container /bin/bash |
1191 | -``` |
1192 | - |
1193 | - |
1194 | -## Deploy with Kubernetes |
1195 | - |
1196 | -Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
1197 | - |
1198 | -Download |
1199 | -[datasource.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/grafana/plain/examples/config/datasource.yml?h=8.2-22.04), [dashboard.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/grafana/plain/examples/config/dashboard.yml?h=8.2-22.04), [system-stats-dashboard.json](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/grafana/plain/examples/config/system-stats-dashboard.json?h=8.2-22.04) and |
1200 | -[grafana-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/grafana/plain/examples/grafana-deployment.yml?h=8.2-22.04) and set `containers.grafana.image` in `grafana-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/lts/grafana:latest`), then: |
1201 | - |
1202 | -```sh |
1203 | -kubectl create configmap grafana-config --from-file=grafana-datasource=datasource.yml --from-file=grafana-dashboard-definition=dashboard.yml --from-file=grafana-dashboard=system-stats-dashboard.json |
1204 | -kubectl apply -f grafana-deployment.yml |
1205 | -``` |
1206 | - |
1207 | -You will now be able to connect to the Grafana on `http://localhost:30000`. |
1208 | - |
1209 | -## Bugs and feature requests |
1210 | - |
1211 | -If you find a bug in our image or want to request a specific feature, please file a bug here: |
1212 | - |
1213 | -[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
1214 | - |
1215 | -Please title the bug "`grafana: <issue summary>`". Make sure to include the digest of the image you are using, from: |
1216 | - |
1217 | -```sh |
1218 | -docker images --no-trunc --quiet public.ecr.aws/lts/grafana:<tag> |
1219 | -``` |
1220 | +If your usage includes redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
1221 | |
1222 | diff --git a/docs/public.ecr.aws/lts/kafka.md b/docs/public.ecr.aws/lts/kafka.md |
1223 | index b5a607c..77bfa22 100644 |
1224 | --- a/docs/public.ecr.aws/lts/kafka.md |
1225 | +++ b/docs/public.ecr.aws/lts/kafka.md |
1226 | @@ -1,4 +1,4 @@ |
1227 | -# Apache Kafka LTS Docker Image |
1228 | +# Apache Kafka | Ubuntu |
1229 | **This repository has no LTS channel yet, please [get in touch](https://ubuntu.com/security/docker-images#get-in-touch) if you need one.** |
1230 | |
1231 | ## LTS Docker Image Portfolio |
1232 | @@ -18,78 +18,12 @@ Up to 10 years customer security maintenance `from canonical/kafka`. [Request ac |
1233 | |
1234 | <!-- _Tags in italics are not available in public.ecr.aws/lts/kafka but are shown here for completeness._ --> |
1235 | |
1236 | -| Channel Tag | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
1237 | +| Channel Tags | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
1238 | |---|---|---|---|---| |
1239 | | _`track_risk`_ | |
1240 | |
1241 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
1242 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
1243 | |
1244 | ### Commercial use and Extended Security Maintenance channels |
1245 | -If your usage includes redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
1246 | - |
1247 | - |
1248 | -If your usage includes redistribution, please [contact Canonical](https://ubuntu.com/security/docker-images#get-in-touch). |
1249 | - |
1250 | -## Docker CLI |
1251 | - |
1252 | -Launch this image locally: |
1253 | - |
1254 | -```sh |
1255 | -docker run -d --name kafka-container -e TZ=UTC -p 9092:9092 -e ZOOKEEPER_HOST=host.docker.internal public.ecr.aws/lts/kafka:latest |
1256 | -``` |
1257 | -Apache Kafka service is now exposed at `localhost:9092` (**You first need to run a Zookeeper instance**: `docker run -d -p 2181:2181 ubuntu/zookeeper:edge`). |
1258 | - |
1259 | - |
1260 | -#### Parameters |
1261 | - |
1262 | -| Parameter | Description | |
1263 | -|---|---| |
1264 | -| `-e TZ=UTC` | Timezone. | |
1265 | -| `-e ZOOKEEPER_HOST=172.17.0.1` | Hostname for the related Zookeeper instance (default value is set to the default IP for the Docker host (host.docker.internal)). | |
1266 | -| `-e ZOOKEEPER_PORT=2181` | Port for the related Zookeeper instance. | |
1267 | -| `-p 9092:9092` | Expose Apache Kafka service on `localhost:9092`. | |
1268 | -| `-p 2181:2181` | Expose Apache Zookeeper service on `localhost:2181`. | |
1269 | -| `CMD kafka-server-start.sh /etc/kafka/server.properties --override zookeeper.connect=host.docker.internal:2181` | Start a Kafka instance, connecting to the Zookeeper instance accessible at `host.docker.internal:2181` from within the Kafka instance container. | |
1270 | -| `CMD zookeeper-server-start.sh /etc/kafka/zookeeper.properties` | Start a Zookeeper instance. | |
1271 | - |
1272 | - |
1273 | -#### Testing/Debugging |
1274 | - |
1275 | -To debug the container: |
1276 | - |
1277 | -```sh |
1278 | -docker logs -f kafka-container |
1279 | -``` |
1280 | - |
1281 | -To get an interactive shell: |
1282 | - |
1283 | -```sh |
1284 | -docker exec -it kafka-container /bin/bash |
1285 | -``` |
1286 | - |
1287 | - |
1288 | -## Deploy with Kubernetes |
1289 | - |
1290 | -Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
1291 | - |
1292 | -Download |
1293 | -[kafka-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/kafka/plain/examples/kafka-deployment.yml?h=3.1-22.04) and set `containers.kafka.image` in `kafka-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/lts/kafka:latest`), then: |
1294 | - |
1295 | -```sh |
1296 | -kubectl apply -f kafka-deployment.yml |
1297 | -``` |
1298 | - |
1299 | -Apache Kafka will be available on the K8s cluster as a `kafka-service` Service. |
1300 | - |
1301 | -## Bugs and feature requests |
1302 | - |
1303 | -If you find a bug in our image or want to request a specific feature, please file a bug here: |
1304 | - |
1305 | -[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
1306 | - |
1307 | -Please title the bug "`kafka: <issue summary>`". Make sure to include the digest of the image you are using, from: |
1308 | - |
1309 | -```sh |
1310 | -docker images --no-trunc --quiet public.ecr.aws/lts/kafka:<tag> |
1311 | -``` |
1312 | +If your usage includes redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
1313 | |
1314 | diff --git a/docs/public.ecr.aws/lts/loki.md b/docs/public.ecr.aws/lts/loki.md |
1315 | index ecf492d..089eb82 100644 |
1316 | --- a/docs/public.ecr.aws/lts/loki.md |
1317 | +++ b/docs/public.ecr.aws/lts/loki.md |
1318 | @@ -1,4 +1,4 @@ |
1319 | -# Grafana Loki™ software LTS Docker Image |
1320 | +# Grafana Loki™ software | Ubuntu |
1321 | **This repository has no LTS channel yet, please [get in touch](https://ubuntu.com/security/docker-images#get-in-touch) if you need one.** |
1322 | |
1323 | ## LTS Docker Image Portfolio |
1324 | @@ -18,76 +18,12 @@ Up to 10 years customer security maintenance `from canonical/loki`. [Request acc |
1325 | |
1326 | <!-- _Tags in italics are not available in public.ecr.aws/lts/loki but are shown here for completeness._ --> |
1327 | |
1328 | -| Channel Tag | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
1329 | +| Channel Tags | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
1330 | |---|---|---|---|---| |
1331 | | _`track_risk`_ | |
1332 | |
1333 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
1334 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
1335 | |
1336 | ### Commercial use and Extended Security Maintenance channels |
1337 | -If your usage includes redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
1338 | - |
1339 | - |
1340 | -If your usage includes redistribution, please [contact Canonical](https://ubuntu.com/security/docker-images#get-in-touch). |
1341 | - |
1342 | -## Docker CLI |
1343 | - |
1344 | -Launch this image locally: |
1345 | - |
1346 | -```sh |
1347 | -docker run -d --name loki-container -e TZ=UTC -p 3100:3100 public.ecr.aws/lts/loki:latest |
1348 | -``` |
1349 | -You can now use your Loki instance exposed at `http://localhost:3100`. |
1350 | - |
1351 | -#### Parameters |
1352 | - |
1353 | -| Parameter | Description | |
1354 | -|---|---| |
1355 | -| `-e TZ=UTC` | Timezone. | |
1356 | -| `-p 3100:3100` | Expose Grafana Loki on `localhost:3100`. | |
1357 | -| `-v /local/path/to/config:/etc/loki/local-config.yaml` | Local Loki Promtail config file. Can be changed using CMD `--config.file=` argument. See an [example file](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/loki/plain/examples/config/promtail-local-config.yaml?h=2.4-22.04). | |
1358 | -| `-v lokidata:/loki` | Persist data in a docker volume named `lokidata`. | |
1359 | - |
1360 | - |
1361 | -#### Testing/Debugging |
1362 | - |
1363 | -To debug the container: |
1364 | - |
1365 | -```sh |
1366 | -docker logs -f loki-container |
1367 | -``` |
1368 | - |
1369 | -To get an interactive shell: |
1370 | - |
1371 | -```sh |
1372 | -docker exec -it loki-container /bin/bash |
1373 | -``` |
1374 | - |
1375 | - |
1376 | -## Deploy with Kubernetes |
1377 | - |
1378 | -Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
1379 | - |
1380 | -Download |
1381 | -[promtail-local-config-k8s.yaml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/loki/plain/examples/config/promtail-local-config-k8s.yaml?h=2.4-22.04) and |
1382 | -[loki-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/loki/plain/examples/loki-deployment.yml?h=2.4-22.04) and set `containers.loki.image` in `loki-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/lts/loki:latest`), then: |
1383 | - |
1384 | -```sh |
1385 | -kubectl create configmap promtail-config --from-file=promtail=promtail-local-config-k8s.yaml |
1386 | -kubectl apply -f loki-deployment.yml |
1387 | -``` |
1388 | - |
1389 | -You will now be able to connect to the Loki instance on `http://localhost:31000`. |
1390 | - |
1391 | -## Bugs and feature requests |
1392 | - |
1393 | -If you find a bug in our image or want to request a specific feature, please file a bug here: |
1394 | - |
1395 | -[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
1396 | - |
1397 | -Please title the bug "`loki: <issue summary>`". Make sure to include the digest of the image you are using, from: |
1398 | - |
1399 | -```sh |
1400 | -docker images --no-trunc --quiet public.ecr.aws/lts/loki:<tag> |
1401 | -``` |
1402 | +If your usage includes redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
1403 | |
1404 | diff --git a/docs/public.ecr.aws/lts/memcached.md b/docs/public.ecr.aws/lts/memcached.md |
1405 | index f1682e8..43073a7 100644 |
1406 | --- a/docs/public.ecr.aws/lts/memcached.md |
1407 | +++ b/docs/public.ecr.aws/lts/memcached.md |
1408 | @@ -1,4 +1,4 @@ |
1409 | -# Memcached LTS Docker Image |
1410 | +# Memcached | Ubuntu |
1411 | |
1412 | |
1413 | ## LTS Docker Image Portfolio |
1414 | @@ -18,106 +18,13 @@ Up to 10 years customer security maintenance `from canonical/memcached`. [Reques |
1415 | |
1416 | <!-- _Tags in italics are not available in public.ecr.aws/lts/memcached but are shown here for completeness._ --> |
1417 | |
1418 | -| Channel Tag | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
1419 | +| Channel Tags | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
1420 | |---|---|---|---|---| |
1421 | - | **`1.5-20.04_beta`** | 04/2025 | 04/2030 | Memcached 1.5.22 on Ubuntu 20.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
1422 | + | **`1.5-20.04_beta`** | 04/2025 | 04/2030 | Memcached 1.5.22 on Ubuntu 20.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
1423 | | _`track_risk`_ | |
1424 | |
1425 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
1426 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
1427 | |
1428 | ### Commercial use and Extended Security Maintenance channels |
1429 | -If your usage includes redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
1430 | - |
1431 | - |
1432 | -If your usage includes redistribution, please [contact Canonical](https://ubuntu.com/security/docker-images#get-in-touch). |
1433 | - |
1434 | -## Docker CLI |
1435 | - |
1436 | -Launch this image locally: |
1437 | - |
1438 | -```sh |
1439 | -docker run -d --name memcached-container -e TZ=UTC public.ecr.aws/lts/memcached:1.5-20.04_beta |
1440 | -``` |
1441 | - |
1442 | -#### Parameters |
1443 | - |
1444 | -| Parameter | Description | |
1445 | -|---|---| |
1446 | -| `-e TZ=UTC` | Timezone. | |
1447 | -| `-e MEMCACHED_CACHE_SIZE=64MB` | Determines the size of the cache. | |
1448 | -| `-e MEMCACHED_MAX_CONNECTIONS=1024` | Determines the maximum number of concurrent connections. | |
1449 | -| `-e MEMCACHED_THREADS=4` | Determines the number of threads to process requests. | |
1450 | -| `-e MEMCACHED_PASSWORD` | Define the password for the `root` user if another username is provided. By default the authentication is disabled but if this option is passed it becomes enabled. | |
1451 | -| `-e MEMCACHED_USERNAME` | Define a new user. If this option is passed a password is needed to authenticate the new user. | |
1452 | -| `-p 11211:11211` | Memcached is exposed inside the container on port `11211`. | |
1453 | - |
1454 | - |
1455 | -#### Testing/Debugging |
1456 | - |
1457 | -To debug the container: |
1458 | - |
1459 | -```sh |
1460 | -docker logs -f memcached-container |
1461 | -``` |
1462 | - |
1463 | -To get an interactive shell: |
1464 | - |
1465 | -```sh |
1466 | -docker exec -it memcached-container /bin/bash |
1467 | -``` |
1468 | - |
1469 | -<details> |
1470 | -<summary>You can access the Memcached instance with telnet from another container (click to expand).</summary> |
1471 | - |
1472 | -```sh |
1473 | -# Create a dedicated network |
1474 | -$ docker network create memcached-network |
1475 | -# Connect the main container to it |
1476 | -$ docker network connect memcached-network memcached-container |
1477 | -# Run an interactive container with the latest Ubuntu |
1478 | -$ docker run -it --rm --name telnet --network memcached-network ubuntu bash |
1479 | -# Install the telnet cli from within the container |
1480 | -> apt update && apt install telnet -y |
1481 | -# Connect to the memcached instance using telnet |
1482 | -> telnet memcached-container 11211 |
1483 | -Trying 172.30.0.2... |
1484 | -Connected to memcached. |
1485 | -Escape character is '^]'. |
1486 | -``` |
1487 | -From there you can run `memcached` commands, as documented in [their wiki](https://github.com/memcached/memcached/wiki/Commands). |
1488 | - |
1489 | -</details> |
1490 | - |
1491 | -```sh |
1492 | -$ telnet memcached-container 11211 |
1493 | -``` |
1494 | - |
1495 | -There are cases where one might want to pass some memcached command line flags that are not configurable via environment variables. |
1496 | -In this case you can append the flags themselves or a shell script to the run command. |
1497 | - |
1498 | - |
1499 | -## Deploy with Kubernetes |
1500 | - |
1501 | -Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
1502 | - |
1503 | -Download |
1504 | -[memcached-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/memcached/plain/examples/memcached-deployment.yml?h=1.6-22.04) and set `containers.memcached.image` in `memcached-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/lts/memcached:1.5-20.04_beta`), then: |
1505 | - |
1506 | -```sh |
1507 | -kubectl apply -f memcached-deployment.yml |
1508 | -``` |
1509 | - |
1510 | -Memcached will be listening on port `31211` in your host. |
1511 | - |
1512 | -## Bugs and feature requests |
1513 | - |
1514 | -If you find a bug in our image or want to request a specific feature, please file a bug here: |
1515 | - |
1516 | -[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
1517 | - |
1518 | -Please title the bug "`memcached: <issue summary>`". Make sure to include the digest of the image you are using, from: |
1519 | - |
1520 | -```sh |
1521 | -docker images --no-trunc --quiet public.ecr.aws/lts/memcached:<tag> |
1522 | -``` |
1523 | +If your usage includes redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
1524 | |
1525 | diff --git a/docs/public.ecr.aws/lts/mysql.md b/docs/public.ecr.aws/lts/mysql.md |
1526 | index 86d8d62..3f3f9e1 100644 |
1527 | --- a/docs/public.ecr.aws/lts/mysql.md |
1528 | +++ b/docs/public.ecr.aws/lts/mysql.md |
1529 | @@ -1,4 +1,4 @@ |
1530 | -# MySQL™ software LTS Docker Image |
1531 | +# MySQL™ software | Ubuntu |
1532 | |
1533 | |
1534 | ## LTS Docker Image Portfolio |
1535 | @@ -18,104 +18,14 @@ Up to 10 years customer security maintenance `from canonical/mysql`. [Request ac |
1536 | |
1537 | <!-- _Tags in italics are not available in public.ecr.aws/lts/mysql but are shown here for completeness._ --> |
1538 | |
1539 | -| Channel Tag | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
1540 | +| Channel Tags | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
1541 | |---|---|---|---|---| |
1542 | - | **`8.0-22.04_beta`** | 04/2027 | 04/2032 | MySQL™ software 8.0 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
1543 | - | `8.0-20.04_beta` | 04/2025 | 04/2030 | MySQL™ software 8.0.22 on Ubuntu 20.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
1544 | + | **`8.0-22.04_beta`** | 04/2027 | 04/2032 | MySQL™ software 8.0 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
1545 | + | `8.0-20.04_beta` | 04/2025 | 04/2030 | MySQL™ software 8.0.22 on Ubuntu 20.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
1546 | | _`track_risk`_ | |
1547 | |
1548 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
1549 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
1550 | |
1551 | ### Commercial use and Extended Security Maintenance channels |
1552 | -If your usage includes redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
1553 | - |
1554 | - |
1555 | -If your usage includes redistribution, please [contact Canonical](https://ubuntu.com/security/docker-images#get-in-touch). |
1556 | - |
1557 | -## Docker CLI |
1558 | - |
1559 | -Launch this image locally: |
1560 | - |
1561 | -```sh |
1562 | -docker run -d --name mysql-container -e TZ=UTC -p 30306:3306 -e MYSQL_ROOT_PASSWORD=My:S3cr3t/ public.ecr.aws/lts/mysql:8.0-22.04_beta |
1563 | -``` |
1564 | -Access your MySQL server at `localhost:30306`. |
1565 | - |
1566 | -#### Parameters |
1567 | - |
1568 | -| Parameter | Description | |
1569 | -|---|---| |
1570 | -| `-e TZ=UTC` | Timezone. | |
1571 | -| `-e MYSQL_ROOT_PASSWORD=secret_for_root` | Set the password for the `root` user. This option is **mandatory** and **must not be empty**. | |
1572 | -| `-e MYSQL_PASSWORD=secret` | Set the password for the `MYSQL_USER` user. | |
1573 | -| `-e MYSQL_USER=john` | Create a new user with superuser privileges. This is used in conjunction with `MYSQL_PASSWORD`. | |
1574 | -| `-e MYSQL_DATABASE=db_test` | Set the name of the default database. | |
1575 | -| `-e MYSQL_ALLOW_EMPTY_PASSWORD=yes` | Set up a blank password for the `root` user. **This is not recommended to be used in production, make sure you know what you are doing**. | |
1576 | -| `-e MYSQL_RANDOM_ROOT_PASSWORD=yes` | Generate a random initial password for the `root` user using `pwgen`. It will be printed in the logs, search for `GENERATED ROOT PASSWORD`. | |
1577 | -| `-e MYSQL_ONETIME_PASSWORD=yes` | Set `root` user as experide once initialization is complete, forcing a password change on first login. | |
1578 | -| `-e MYSQL_INITSB_SKIP_TZINFO=yes` | Timezone data is automatically loaded via entrypoint script, set this variable to any non-empty value to disable it. | |
1579 | -| `-p 30306:3306` | Expose MySQL server on `localhost:30306`. | |
1580 | -| `-v /path/to/data:/var/lib/mysql` | Persist data instead of initializing a new database every time you launch a new container. | |
1581 | -| `-v /path/to/config/files/:/etc/mysql/mysql.conf.d/` | Local [configuration files](https://dev.mysql.com/doc/refman/8.0/en/mysql-command-options.html) (try this [example my.cnf](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/mysql/plain/examples/config/my-custom.cnf?h=8.0-22.04)). | |
1582 | - |
1583 | -#### Initialization Scripts |
1584 | - |
1585 | -One can also add initialization scripts to their containers. This includes `*.sql`, `.sql.gz`, and `*.sh` scripts, and you just need to put them inside the `/docker-entrypoint-initdb.d` directory inside the container. After MySQL initialization is done and the default database and user are created, the scripts are executed in the following order: |
1586 | - |
1587 | -* Run any `*.sql` files in alphabetically order. By default the target database is specified via `MYSQL_DATABASE`. |
1588 | -* Run any executable `*.sh` scripts in alphabetically order. |
1589 | -* Source any non-executable `*.sh` scripts in alphabetically order. |
1590 | - |
1591 | -All of this is done before the MySQL service is started. Keep in mind if your database directory is not empty (contains pre-existing database) they will be left untouched. |
1592 | - |
1593 | - |
1594 | -#### Testing/Debugging |
1595 | - |
1596 | -To debug the container: |
1597 | - |
1598 | -```sh |
1599 | -docker logs -f mysql-container |
1600 | -``` |
1601 | - |
1602 | -To get an interactive shell: |
1603 | - |
1604 | -```sh |
1605 | -docker exec -it mysql-container /bin/bash |
1606 | -``` |
1607 | - |
1608 | -This image also includes the `mysql` client for interactive container use: |
1609 | - |
1610 | -```sh |
1611 | -$ docker network create mysql-network |
1612 | -$ docker network connect mysql-network mysql-container |
1613 | -$ docker run -it --rm --network mysql-network public.ecr.aws/lts/mysql:8.0-22.04_beta mysql -hmysql-container -uroot -p |
1614 | -``` |
1615 | -The password will be asked and you can enter `My:S3cr3t/`. Now, you are logged in and can enjoy your new instance. |
1616 | - |
1617 | -## Deploy with Kubernetes |
1618 | - |
1619 | -Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
1620 | - |
1621 | -Download |
1622 | -[my-custom.cnf](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/mysql/plain/examples/config/my-custom.cnf?h=8.0-22.04) and |
1623 | -[mysql-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/mysql/plain/examples/mysql-deployment.yml?h=8.0-22.04) and set `containers.mysql.image` in `mysql-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/lts/mysql:8.0-22.04_beta`), then: |
1624 | - |
1625 | -```sh |
1626 | -kubectl create configmap mysql-config --from-file=main-config=my-custom.cnf |
1627 | -kubectl apply -f mysql-deployment.yml |
1628 | -``` |
1629 | - |
1630 | -You will now be able to connect to the MySQL server on `localhost:30306`. |
1631 | - |
1632 | -## Bugs and feature requests |
1633 | - |
1634 | -If you find a bug in our image or want to request a specific feature, please file a bug here: |
1635 | - |
1636 | -[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
1637 | - |
1638 | -Please title the bug "`mysql: <issue summary>`". Make sure to include the digest of the image you are using, from: |
1639 | - |
1640 | -```sh |
1641 | -docker images --no-trunc --quiet public.ecr.aws/lts/mysql:<tag> |
1642 | -``` |
1643 | +If your usage includes redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
1644 | |
1645 | diff --git a/docs/public.ecr.aws/lts/nginx.md b/docs/public.ecr.aws/lts/nginx.md |
1646 | index d9a2b7e..b9be55f 100644 |
1647 | --- a/docs/public.ecr.aws/lts/nginx.md |
1648 | +++ b/docs/public.ecr.aws/lts/nginx.md |
1649 | @@ -1,4 +1,4 @@ |
1650 | -# Nginx LTS Docker Image |
1651 | +# Nginx | Ubuntu |
1652 | |
1653 | |
1654 | ## LTS Docker Image Portfolio |
1655 | @@ -18,79 +18,14 @@ Up to 10 years customer security maintenance `from canonical/nginx`. [Request ac |
1656 | |
1657 | <!-- _Tags in italics are not available in public.ecr.aws/lts/nginx but are shown here for completeness._ --> |
1658 | |
1659 | -| Channel Tag | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
1660 | +| Channel Tags | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
1661 | |---|---|---|---|---| |
1662 | - | **`1.18-22.04_beta`** | 04/2027 | 04/2032 | Nginx 1.18 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
1663 | - | `1.18-20.04_beta` | 04/2025 | 04/2030 | Nginx 1.18.0 on Ubuntu 20.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
1664 | + | **`1.18-22.04_beta`** | 04/2027 | 04/2032 | Nginx 1.18 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
1665 | + | `1.18-20.04_beta` | 04/2025 | 04/2030 | Nginx 1.18.0 on Ubuntu 20.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
1666 | | _`track_risk`_ | |
1667 | |
1668 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
1669 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
1670 | |
1671 | ### Commercial use and Extended Security Maintenance channels |
1672 | -If your usage includes redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
1673 | - |
1674 | - |
1675 | -If your usage includes redistribution, please [contact Canonical](https://ubuntu.com/security/docker-images#get-in-touch). |
1676 | - |
1677 | -## Docker CLI |
1678 | - |
1679 | -Launch this image locally: |
1680 | - |
1681 | -```sh |
1682 | -docker run -d --name nginx-container -e TZ=UTC -p 8080:80 public.ecr.aws/lts/nginx:1.18-22.04_beta |
1683 | -``` |
1684 | -Access your Nginx server at `http://localhost:8080`. |
1685 | - |
1686 | -#### Parameters |
1687 | - |
1688 | -| Parameter | Description | |
1689 | -|---|---| |
1690 | -| `-e TZ=UTC` | Timezone. | |
1691 | -| `-p 8080:80` | Expose Nginx on `localhost:8080`. | |
1692 | -| `-v /local/path/to/website:/var/www/html` | Mount and serve a local website. | |
1693 | -| `-v /path/to/conf.template:/etc/nginx/templates/conf.template` | Mount template files inside `/etc/nginx/templates`. They will be processed and the results will be placed at `/etc/nginx/conf.d`. (e.g. `listen ${NGINX_PORT};` will generate `listen 80;`). | |
1694 | -| `-v /path/to/nginx.conf:/etc/nginx/nginx.conf` | Local [configuration file](https://nginx.org/en/docs/) `nginx.conf` (try [this example](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/nginx/plain/examples/config/nginx.conf?h=1.18-22.04)). | |
1695 | - |
1696 | - |
1697 | -#### Testing/Debugging |
1698 | - |
1699 | -To debug the container: |
1700 | - |
1701 | -```sh |
1702 | -docker logs -f nginx-container |
1703 | -``` |
1704 | - |
1705 | -To get an interactive shell: |
1706 | - |
1707 | -```sh |
1708 | -docker exec -it nginx-container /bin/bash |
1709 | -``` |
1710 | - |
1711 | - |
1712 | -## Deploy with Kubernetes |
1713 | - |
1714 | -Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
1715 | - |
1716 | -Download |
1717 | -[nginx.conf](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/nginx/plain/examples/config/nginx.conf?h=1.18-22.04), [index.html](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/nginx/plain/examples/config/html/index.html?h=1.18-22.04) and |
1718 | -[nginx-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/nginx/plain/examples/nginx-deployment.yml?h=1.18-22.04) and set `containers.nginx.image` in `nginx-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/lts/nginx:1.18-22.04_beta`), then: |
1719 | - |
1720 | -```sh |
1721 | -kubectl create configmap nginx-config --from-file=nginx=nginx.conf --from-file=nginx-site=index.html |
1722 | -kubectl apply -f nginx-deployment.yml |
1723 | -``` |
1724 | - |
1725 | -You will now be able to connect to the nginx server on `http://localhost:31080`. |
1726 | - |
1727 | -## Bugs and feature requests |
1728 | - |
1729 | -If you find a bug in our image or want to request a specific feature, please file a bug here: |
1730 | - |
1731 | -[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
1732 | - |
1733 | -Please title the bug "`nginx: <issue summary>`". Make sure to include the digest of the image you are using, from: |
1734 | - |
1735 | -```sh |
1736 | -docker images --no-trunc --quiet public.ecr.aws/lts/nginx:<tag> |
1737 | -``` |
1738 | +If your usage includes redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
1739 | |
1740 | diff --git a/docs/public.ecr.aws/lts/postgres.md b/docs/public.ecr.aws/lts/postgres.md |
1741 | index fe2a004..3b02358 100644 |
1742 | --- a/docs/public.ecr.aws/lts/postgres.md |
1743 | +++ b/docs/public.ecr.aws/lts/postgres.md |
1744 | @@ -1,4 +1,4 @@ |
1745 | -# Postgres LTS Docker Image |
1746 | +# Postgres | Ubuntu |
1747 | |
1748 | |
1749 | ## LTS Docker Image Portfolio |
1750 | @@ -18,103 +18,14 @@ Up to 10 years customer security maintenance `from canonical/postgres`. [Request |
1751 | |
1752 | <!-- _Tags in italics are not available in public.ecr.aws/lts/postgres but are shown here for completeness._ --> |
1753 | |
1754 | -| Channel Tag | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
1755 | +| Channel Tags | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
1756 | |---|---|---|---|---| |
1757 | - | **`14-22.04_beta`** | 04/2027 | 04/2032 | Postgres 14 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
1758 | - | `12-20.04_beta` | 04/2025 | 04/2030 | Postgres 12.4 on Ubuntu 20.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
1759 | + | **`14-22.04_beta`** | 04/2027 | 04/2032 | Postgres 14 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
1760 | + | `12-20.04_beta` | 04/2025 | 04/2030 | Postgres 12.4 on Ubuntu 20.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
1761 | | _`track_risk`_ | |
1762 | |
1763 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
1764 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
1765 | |
1766 | ### Commercial use and Extended Security Maintenance channels |
1767 | -If your usage includes redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
1768 | - |
1769 | - |
1770 | -If your usage includes redistribution, please [contact Canonical](https://ubuntu.com/security/docker-images#get-in-touch). |
1771 | - |
1772 | -## Docker CLI |
1773 | - |
1774 | -Launch this image locally: |
1775 | - |
1776 | -```sh |
1777 | -docker run -d --name postgres-container -e TZ=UTC -p 30432:5432 -e POSTGRES_PASSWORD=My:s3Cr3t/ public.ecr.aws/lts/postgres:14-22.04_beta |
1778 | -``` |
1779 | -Access your PostgreSQL server at `localhost:30432`. |
1780 | - |
1781 | -#### Parameters |
1782 | - |
1783 | -| Parameter | Description | |
1784 | -|---|---| |
1785 | -| `-e TZ=UTC` | Timezone. | |
1786 | -| `-e POSTGRES_PASSWORD=secret` | Set the password for the superuser which is `postgres` by default. Bear in mind that to connect to the database in the same host the password is not needed but to access it via an external host (for instance another container) the password is needed. This option is **mandatory** and **must not be empty**. | |
1787 | -| `-e POSTGRES_USER=john` | Create a new user with superuser privileges. This is used in conjunction with `POSTGRES_PASSWORD`. | |
1788 | -| `-e POSTGRES_DB=db_test` | Set the name of the default database. | |
1789 | -| `-e POSTGRES_INITDB_ARGS="--data-checksums"` | Pass arguments to the `postgres initdb` call. | |
1790 | -| `-e POSTGRES_INITDB_WALDIR=/path/to/location` | Set the location of the Postgres transaction log. By default it is stored in a subdirectory of the main Postgres data folder (`PGDATA`). | |
1791 | -| `-e POSTGRES_HOST_AUTH_METHOD=trust` | Set the `auth-method` for `host` connections for `all` databases, `all` users, and `all` addresses. The following will be added to the `pg_hba.conf` if this option is passed: `host all all all $POSTGRES_HOST_AUTH_METHOD`. | |
1792 | -| `-e PGDATA=/path/to/location` | Set the location of the database files. The default is `/var/lib/postgresql/data`. | |
1793 | -| `-p 30432:5432` | Expose Postgres on `localhost:30432`. | |
1794 | -| `-v /path/to/postgresql.conf:/etc/postgresql/postgresql.conf` | Local [configuration file](https://www.postgresql.org/docs/12/index.html) `postgresql.conf` (try [this example](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/postgresql/plain/examples/config/postgresql.conf?h=14-22.04)). | |
1795 | -| `-v /path/to/persisted/data:/var/lib/postgresql/data` | Persist data instead of initializing a new database every time you launch a new container. | |
1796 | - |
1797 | -#### Initialization Scripts |
1798 | - |
1799 | -One can also add initialization scripts to their containers. This includes `*.sql`, `.sql.gz`, and `*.sh` scripts, and you just need to put them inside the `/docker-entrypoint-initdb.d` directory inside the container. After Postgres initialization is done and the default database and user are created, the scripts are executed in the following order: |
1800 | - |
1801 | -* Run any `*.sql` files in alphabetically order. It will be executed with `POSTGRES_USER`. |
1802 | -* Run any executable `*.sh` scripts in alphabetically order. |
1803 | -* Source any non-executable `*.sh` scripts in alphabetically order. |
1804 | - |
1805 | -All of this is done before the Postgres service is started. Keep in mind if your `PGDATA` directory is not empty (contains pre-existing database) they will be left untouched. |
1806 | - |
1807 | - |
1808 | -#### Testing/Debugging |
1809 | - |
1810 | -To debug the container: |
1811 | - |
1812 | -```sh |
1813 | -docker logs -f postgres-container |
1814 | -``` |
1815 | - |
1816 | -To get an interactive shell: |
1817 | - |
1818 | -```sh |
1819 | -docker exec -it postgres-container /bin/bash |
1820 | -``` |
1821 | - |
1822 | -This image also includes the `psql` client for interactive container use: |
1823 | - |
1824 | -```sh |
1825 | -$ docker network create postgres-network |
1826 | -$ docker network connect postgres-network postgres-container |
1827 | -$ docker run -it --rm --network postgres-network public.ecr.aws/lts/postgres:14-22.04_beta psql -h postgres-container -U postgres |
1828 | -``` |
1829 | -The password will be asked and you can enter `My:s3Cr3t/`. Now, you are logged in and can enjoy your new instance. |
1830 | - |
1831 | -## Deploy with Kubernetes |
1832 | - |
1833 | -Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
1834 | - |
1835 | -Download |
1836 | -[postgresql.conf](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/postgresql/plain/examples/config/postgresql.conf?h=14-22.04) and |
1837 | -[postgres-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/postgresql/plain/examples/postgres-deployment.yml?h=14-22.04) and set `containers.postgres.image` in `postgres-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/lts/postgres:14-22.04_beta`), then: |
1838 | - |
1839 | -```sh |
1840 | -kubectl create configmap postgres-config --from-file=main-config=postgresql.conf |
1841 | -kubectl apply -f postgres-deployment.yml |
1842 | -``` |
1843 | - |
1844 | -You will now be able to connect to the Postgres server on `localhost:30306`. |
1845 | - |
1846 | -## Bugs and feature requests |
1847 | - |
1848 | -If you find a bug in our image or want to request a specific feature, please file a bug here: |
1849 | - |
1850 | -[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
1851 | - |
1852 | -Please title the bug "`postgres: <issue summary>`". Make sure to include the digest of the image you are using, from: |
1853 | - |
1854 | -```sh |
1855 | -docker images --no-trunc --quiet public.ecr.aws/lts/postgres:<tag> |
1856 | -``` |
1857 | +If your usage includes redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
1858 | |
1859 | diff --git a/docs/public.ecr.aws/lts/prometheus-alertmanager.md b/docs/public.ecr.aws/lts/prometheus-alertmanager.md |
1860 | index abaebf4..55cd77f 100644 |
1861 | --- a/docs/public.ecr.aws/lts/prometheus-alertmanager.md |
1862 | +++ b/docs/public.ecr.aws/lts/prometheus-alertmanager.md |
1863 | @@ -1,4 +1,4 @@ |
1864 | -# Prometheus Alertmanager LTS Docker Image |
1865 | +# Prometheus Alertmanager | Ubuntu |
1866 | **This repository has no LTS channel yet, please [get in touch](https://ubuntu.com/security/docker-images#get-in-touch) if you need one.** |
1867 | |
1868 | ## LTS Docker Image Portfolio |
1869 | @@ -18,76 +18,12 @@ Up to 10 years customer security maintenance `from canonical/prometheus-alertman |
1870 | |
1871 | <!-- _Tags in italics are not available in public.ecr.aws/lts/prometheus-alertmanager but are shown here for completeness._ --> |
1872 | |
1873 | -| Channel Tag | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
1874 | +| Channel Tags | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
1875 | |---|---|---|---|---| |
1876 | | _`track_risk`_ | |
1877 | |
1878 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
1879 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
1880 | |
1881 | ### Commercial use and Extended Security Maintenance channels |
1882 | -If your usage includes redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
1883 | - |
1884 | - |
1885 | -If your usage includes redistribution, please [contact Canonical](https://ubuntu.com/security/docker-images#get-in-touch). |
1886 | - |
1887 | -## Docker CLI |
1888 | - |
1889 | -Launch this image locally: |
1890 | - |
1891 | -```sh |
1892 | -docker run -d --name prometheus-alertmanager-container -e TZ=UTC -p 30093:9093 public.ecr.aws/lts/prometheus-alertmanager:latest |
1893 | -``` |
1894 | -Access your Prometheus Alertmanager server at `localhost:30093`. |
1895 | - |
1896 | -#### Parameters |
1897 | - |
1898 | -| Parameter | Description | |
1899 | -|---|---| |
1900 | -| `-e TZ=UTC` | Timezone. | |
1901 | -| `-p 30093:9093` | Expose Prometheus Alertmanager on `localhost:30093`. | |
1902 | -| `-v /path/to/alertmanager.yml:/etc/prometheus/alertmanager.yml` | Local [configuration file](https://www.prometheus.io/docs/alerting/latest/configuration/) `alertmanager.yml` (try [this example](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/prometheus-alertmanager/plain/examples/config/alertmanager.yml?h=0.23-22.04)). | |
1903 | -| `-v /path/to/persisted/data:/alertmanager` | Persist data instead of initializing a new database for each newly launched container. **Important note**: the directory you will be using to persist the data needs to belong to `nogroup:nobody`. You can run `chown nogroup:nobody <path_to_persist_data>` before launching your container. | |
1904 | - |
1905 | - |
1906 | -#### Testing/Debugging |
1907 | - |
1908 | -To debug the container: |
1909 | - |
1910 | -```sh |
1911 | -docker logs -f prometheus-alertmanager-container |
1912 | -``` |
1913 | - |
1914 | -To get an interactive shell: |
1915 | - |
1916 | -```sh |
1917 | -docker exec -it prometheus-alertmanager-container /bin/bash |
1918 | -``` |
1919 | - |
1920 | - |
1921 | -## Deploy with Kubernetes |
1922 | - |
1923 | -Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
1924 | - |
1925 | -Download |
1926 | -[alertmanager.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/prometheus-alertmanager/plain/examples/config/alertmanager.yml?h=0.23-22.04) and |
1927 | -[prometheus-alertmanager-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/prometheus-alertmanager/plain/examples/alertmanager-deployment.yml?h=0.23-22.04) and set `containers.prometheus-alertmanager.image` in `prometheus-alertmanager-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/lts/prometheus-alertmanager:latest`), then: |
1928 | - |
1929 | -```sh |
1930 | -kubectl create configmap alertmanager-config --from-file=alertmanager=alertmanager.yml |
1931 | -kubectl apply -f prometheus-alertmanager-deployment.yml |
1932 | -``` |
1933 | - |
1934 | -You will now be able to connect to the Prometheus Alertmanager server on `localhost:30093`. |
1935 | - |
1936 | -## Bugs and feature requests |
1937 | - |
1938 | -If you find a bug in our image or want to request a specific feature, please file a bug here: |
1939 | - |
1940 | -[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
1941 | - |
1942 | -Please title the bug "`prometheus-alertmanager: <issue summary>`". Make sure to include the digest of the image you are using, from: |
1943 | - |
1944 | -```sh |
1945 | -docker images --no-trunc --quiet public.ecr.aws/lts/prometheus-alertmanager:<tag> |
1946 | -``` |
1947 | +If your usage includes redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
1948 | |
1949 | diff --git a/docs/public.ecr.aws/lts/prometheus.md b/docs/public.ecr.aws/lts/prometheus.md |
1950 | index d33d6d3..3321c8f 100644 |
1951 | --- a/docs/public.ecr.aws/lts/prometheus.md |
1952 | +++ b/docs/public.ecr.aws/lts/prometheus.md |
1953 | @@ -1,4 +1,4 @@ |
1954 | -# Prometheus LTS Docker Image |
1955 | +# Prometheus | Ubuntu |
1956 | **This repository has no LTS channel yet, please [get in touch](https://ubuntu.com/security/docker-images#get-in-touch) if you need one.** |
1957 | |
1958 | ## LTS Docker Image Portfolio |
1959 | @@ -18,76 +18,12 @@ Up to 10 years customer security maintenance `from canonical/prometheus`. [Reque |
1960 | |
1961 | <!-- _Tags in italics are not available in public.ecr.aws/lts/prometheus but are shown here for completeness._ --> |
1962 | |
1963 | -| Channel Tag | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
1964 | +| Channel Tags | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
1965 | |---|---|---|---|---| |
1966 | | _`track_risk`_ | |
1967 | |
1968 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
1969 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
1970 | |
1971 | ### Commercial use and Extended Security Maintenance channels |
1972 | -If your usage includes redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
1973 | - |
1974 | - |
1975 | -If your usage includes redistribution, please [contact Canonical](https://ubuntu.com/security/docker-images#get-in-touch). |
1976 | - |
1977 | -## Docker CLI |
1978 | - |
1979 | -Launch this image locally: |
1980 | - |
1981 | -```sh |
1982 | -docker run -d --name prometheus-container -e TZ=UTC -p 30090:9090 public.ecr.aws/lts/prometheus:latest |
1983 | -``` |
1984 | -Access your Prometheus server at `localhost:30090`. |
1985 | - |
1986 | -#### Parameters |
1987 | - |
1988 | -| Parameter | Description | |
1989 | -|---|---| |
1990 | -| `-e TZ=UTC` | Timezone. | |
1991 | -| `-p 30090:9090` | Expose Prometheus server on `localhost:30090`. | |
1992 | -| `-v /path/to/prometheus.yml:/etc/prometheus/prometheus.yml` | Local [configuration file](https://prometheus.io/docs/prometheus/2.20/configuration/configuration/) `prometheus.yml` (try [this example](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/prometheus/plain/examples/config/prometheus.yml?h=2.33-22.04)). | |
1993 | -| `-v /path/to/alerts.yml:/etc/prometheus/alerts.yml` | Local [alert configuration file](https://prometheus.io/docs/prometheus/2.20/configuration/configuration/) `alerts.yml` (try [this example](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/prometheus/plain/examples/config/alerts.yml?h=2.33-22.04)). | |
1994 | - |
1995 | - |
1996 | -#### Testing/Debugging |
1997 | - |
1998 | -To debug the container: |
1999 | - |
2000 | -```sh |
2001 | -docker logs -f prometheus-container |
2002 | -``` |
2003 | - |
2004 | -To get an interactive shell: |
2005 | - |
2006 | -```sh |
2007 | -docker exec -it prometheus-container /bin/bash |
2008 | -``` |
2009 | - |
2010 | - |
2011 | -## Deploy with Kubernetes |
2012 | - |
2013 | -Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
2014 | - |
2015 | -Download |
2016 | -[prometheus.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/prometheus/plain/examples/config/prometheus.yml?h=2.33-22.04), [alerts.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/prometheus/plain/examples/config/alerts.yml?h=2.33-22.04) and |
2017 | -[prometheus-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/prometheus/plain/examples/prometheus-deployment.yml?h=2.33-22.04) and set `containers.prometheus.image` in `prometheus-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/lts/prometheus:latest`), then: |
2018 | - |
2019 | -```sh |
2020 | -kubectl create configmap prometheus-config --from-file=prometheus=prometheus.yml --from-file=prometheus-alerts=alerts.yml |
2021 | -kubectl apply -f prometheus-deployment.yml |
2022 | -``` |
2023 | - |
2024 | -You will now be able to connect to the Prometheus on `http://localhost:30090`. |
2025 | - |
2026 | -## Bugs and feature requests |
2027 | - |
2028 | -If you find a bug in our image or want to request a specific feature, please file a bug here: |
2029 | - |
2030 | -[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
2031 | - |
2032 | -Please title the bug "`prometheus: <issue summary>`". Make sure to include the digest of the image you are using, from: |
2033 | - |
2034 | -```sh |
2035 | -docker images --no-trunc --quiet public.ecr.aws/lts/prometheus:<tag> |
2036 | -``` |
2037 | +If your usage includes redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
2038 | |
2039 | diff --git a/docs/public.ecr.aws/lts/redis.md b/docs/public.ecr.aws/lts/redis.md |
2040 | index 67893e5..e4180e3 100644 |
2041 | --- a/docs/public.ecr.aws/lts/redis.md |
2042 | +++ b/docs/public.ecr.aws/lts/redis.md |
2043 | @@ -1,4 +1,4 @@ |
2044 | -# Redis™ software LTS Docker Image |
2045 | +# Redis™ software | Ubuntu |
2046 | **This repository has no LTS channel yet, please [get in touch](https://ubuntu.com/security/docker-images#get-in-touch) if you need one.** |
2047 | |
2048 | ## LTS Docker Image Portfolio |
2049 | @@ -18,97 +18,12 @@ Up to 10 years customer security maintenance `from canonical/redis`. [Request ac |
2050 | |
2051 | <!-- _Tags in italics are not available in public.ecr.aws/lts/redis but are shown here for completeness._ --> |
2052 | |
2053 | -| Channel Tag | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
2054 | +| Channel Tags | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
2055 | |---|---|---|---|---| |
2056 | | _`track_risk`_ | |
2057 | |
2058 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
2059 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
2060 | |
2061 | ### Commercial use and Extended Security Maintenance channels |
2062 | -If your usage includes redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
2063 | - |
2064 | - |
2065 | -If your usage includes redistribution, please [contact Canonical](https://ubuntu.com/security/docker-images#get-in-touch). |
2066 | - |
2067 | -## Docker CLI |
2068 | - |
2069 | -Launch this image locally: |
2070 | - |
2071 | -```sh |
2072 | -docker run -d --name redis-container -e TZ=UTC -p 30073:6379 -e REDIS_PASSWORD=mypassword public.ecr.aws/lts/redis:latest |
2073 | -``` |
2074 | -Access your Redis server at `localhost:30073`. |
2075 | - |
2076 | -#### Parameters |
2077 | - |
2078 | -| Parameter | Description | |
2079 | -|---|---| |
2080 | -| `-e TZ=UTC` | Timezone. | |
2081 | -| `-e ALLOW_EMPTY_PASSWORD` | Set to `yes` to allow connections to `redis-server` without a password. **This setting is not recommended in production environments**. | |
2082 | -| `-e REDIS_PASSWORD` | Set the desired password to be used. | |
2083 | -| `-e REDIS_RANDOM_PASSWORD` | Set this variable to `1` if you would like the entrypoint script to generate a random password for you. You will be able to see the generated password in the logs (`docker logs`). | |
2084 | -| `-e REDIS_ALLOW_REMOTE_CONNECTIONS=yes` | Set to `no` to disallow remote connections to `redis-server` (i.e., make `redis-server` listen to `127.0.0.1` only). | |
2085 | -| `-e REDIS_EXTRA_FLAGS` | Specify extra flags to be passed to `redis-server` when initializing it. | |
2086 | -| `-p 30073:6379` | Expose redis on `localhost:30073`. | |
2087 | -| `-v /path/to/redis.conf:/etc/redis/redis.conf` | Local [configuration file](https://redis.io/topics/config) `redis.conf` (try [this example](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/redis/plain/examples/config/redis.conf?h=6.2-22.04)). **To enable TLS** mode, comment the `port 6379` line and uncomment the `# port 0` and `# tls-port 6379` lines. |
2088 | - | |
2089 | - |
2090 | - |
2091 | -#### Testing/Debugging |
2092 | - |
2093 | -To debug the container: |
2094 | - |
2095 | -```sh |
2096 | -docker logs -f redis-container |
2097 | -``` |
2098 | - |
2099 | -To get an interactive shell: |
2100 | - |
2101 | -```sh |
2102 | -docker exec -it redis-container /bin/bash |
2103 | -``` |
2104 | - |
2105 | -This image also includes the `redis-cli` client for interactive container use: |
2106 | - |
2107 | -```sh |
2108 | -$ docker network create redis-network |
2109 | -$ docker network connect redis-network redis-container |
2110 | -$ docker run -it --rm --network redis-network public.ecr.aws/lts/redis:latest redis-cli -h redis-container |
2111 | -``` |
2112 | -Now you can: |
2113 | -``` |
2114 | -redis:6379> AUTH mypassword |
2115 | -OK |
2116 | -redis:6379> PING |
2117 | -PONG |
2118 | -redis:6379> |
2119 | - |
2120 | -``` |
2121 | - |
2122 | -## Deploy with Kubernetes |
2123 | - |
2124 | -Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
2125 | - |
2126 | -Download |
2127 | -[redis.conf](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/redis/plain/examples/config/redis.conf?h=6.2-22.04) and |
2128 | -[redis-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/redis/plain/examples/redis-deployment.yml?h=6.2-22.04) and set `containers.redis.image` in `redis-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/lts/redis:latest`), then: |
2129 | - |
2130 | -```sh |
2131 | -kubectl create configmap redis-config --from-file=redis=redis.conf |
2132 | -kubectl apply -f redis-deployment.yml |
2133 | -``` |
2134 | - |
2135 | -You will now be able to connect to the Redis server on `localhost:30073`. |
2136 | - |
2137 | -## Bugs and feature requests |
2138 | - |
2139 | -If you find a bug in our image or want to request a specific feature, please file a bug here: |
2140 | - |
2141 | -[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
2142 | - |
2143 | -Please title the bug "`redis: <issue summary>`". Make sure to include the digest of the image you are using, from: |
2144 | - |
2145 | -```sh |
2146 | -docker images --no-trunc --quiet public.ecr.aws/lts/redis:<tag> |
2147 | -``` |
2148 | +If your usage includes redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
2149 | |
2150 | diff --git a/docs/public.ecr.aws/lts/squid.md b/docs/public.ecr.aws/lts/squid.md |
2151 | index 5ab66a1..7cab70f 100644 |
2152 | --- a/docs/public.ecr.aws/lts/squid.md |
2153 | +++ b/docs/public.ecr.aws/lts/squid.md |
2154 | @@ -1,4 +1,4 @@ |
2155 | -# Squid LTS Docker Image |
2156 | +# Squid | Ubuntu |
2157 | |
2158 | |
2159 | ## LTS Docker Image Portfolio |
2160 | @@ -18,80 +18,14 @@ Up to 10 years customer security maintenance `from canonical/squid`. [Request ac |
2161 | |
2162 | <!-- _Tags in italics are not available in public.ecr.aws/lts/squid but are shown here for completeness._ --> |
2163 | |
2164 | -| Channel Tag | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
2165 | +| Channel Tags | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
2166 | |---|---|---|---|---| |
2167 | - | **`5.2-22.04_beta`** | 04/2027 | 04/2032 | Squid 5.2 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
2168 | - | `4.10-20.04_beta` | 04/2025 | 04/2030 | Squid 4.10 on Ubuntu 20.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
2169 | + | **`5.2-22.04_beta`** | 04/2027 | 04/2032 | Squid 5.2 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
2170 | + | `4.10-20.04_beta` | 04/2025 | 04/2030 | Squid 4.10 on Ubuntu 20.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
2171 | | _`track_risk`_ | |
2172 | |
2173 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
2174 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
2175 | |
2176 | ### Commercial use and Extended Security Maintenance channels |
2177 | -If your usage includes redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
2178 | - |
2179 | - |
2180 | -If your usage includes redistribution, please [contact Canonical](https://ubuntu.com/security/docker-images#get-in-touch). |
2181 | - |
2182 | -## Docker CLI |
2183 | - |
2184 | -Launch this image locally: |
2185 | - |
2186 | -```sh |
2187 | -docker run -d --name squid-container -e TZ=UTC -p 3128:3128 public.ecr.aws/lts/squid:5.2-22.04_beta |
2188 | -``` |
2189 | -Access your Squid proxy at `localhost:3128`. |
2190 | - |
2191 | -#### Parameters |
2192 | - |
2193 | -| Parameter | Description | |
2194 | -|---|---| |
2195 | -| `-e TZ=UTC` | Timezone. | |
2196 | -| `-p 3128:3128` | Expose the proxy service | |
2197 | -| `-v /path/to/logs:/var/log/squid` | Volume to store squid logs | |
2198 | -| `-v /path/to/data:/var/spool/squid` | Volume to store the squid cache | |
2199 | -| `-v /path/to/main/config:/etc/squid/squid.conf` | Main squid configuration file | |
2200 | -| `-v /path/to/config/snippet:/etc/squid/conf.d/snippet.conf` | Configuration snippets included by squid.conf | |
2201 | - |
2202 | - |
2203 | -#### Testing/Debugging |
2204 | - |
2205 | -To debug the container: |
2206 | - |
2207 | -```sh |
2208 | -docker logs -f squid-container |
2209 | -``` |
2210 | - |
2211 | -To get an interactive shell: |
2212 | - |
2213 | -```sh |
2214 | -docker exec -it squid-container /bin/bash |
2215 | -``` |
2216 | - |
2217 | - |
2218 | -## Deploy with Kubernetes |
2219 | - |
2220 | -Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
2221 | - |
2222 | -Download |
2223 | -[squid.conf](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/squid/plain/examples/config/squid.conf?h=5.2-22.04) and |
2224 | -[squid-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/squid/plain/examples/squid-deployment.yml?h=5.2-22.04) and set `containers.squid.image` in `squid-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/lts/squid:5.2-22.04_beta`), then: |
2225 | - |
2226 | -```sh |
2227 | -kubectl create configmap squid-config --from-file=squid=squid.conf |
2228 | -kubectl apply -f squid-deployment.yml |
2229 | -``` |
2230 | - |
2231 | -You can now access the squid proxy on port 3128 |
2232 | - |
2233 | -## Bugs and feature requests |
2234 | - |
2235 | -If you find a bug in our image or want to request a specific feature, please file a bug here: |
2236 | - |
2237 | -[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
2238 | - |
2239 | -Please title the bug "`squid: <issue summary>`". Make sure to include the digest of the image you are using, from: |
2240 | - |
2241 | -```sh |
2242 | -docker images --no-trunc --quiet public.ecr.aws/lts/squid:<tag> |
2243 | -``` |
2244 | +If your usage includes redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
2245 | |
2246 | diff --git a/docs/public.ecr.aws/lts/telegraf.md b/docs/public.ecr.aws/lts/telegraf.md |
2247 | index a3bb9d5..382878a 100644 |
2248 | --- a/docs/public.ecr.aws/lts/telegraf.md |
2249 | +++ b/docs/public.ecr.aws/lts/telegraf.md |
2250 | @@ -1,4 +1,4 @@ |
2251 | -# Telegraf™ software LTS Docker Image |
2252 | +# Telegraf™ software | Ubuntu |
2253 | **This repository has no LTS channel yet, please [get in touch](https://ubuntu.com/security/docker-images#get-in-touch) if you need one.** |
2254 | |
2255 | ## LTS Docker Image Portfolio |
2256 | @@ -18,75 +18,12 @@ Up to 10 years customer security maintenance `from canonical/telegraf`. [Request |
2257 | |
2258 | <!-- _Tags in italics are not available in public.ecr.aws/lts/telegraf but are shown here for completeness._ --> |
2259 | |
2260 | -| Channel Tag | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
2261 | +| Channel Tags | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
2262 | |---|---|---|---|---| |
2263 | | _`track_risk`_ | |
2264 | |
2265 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
2266 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
2267 | |
2268 | ### Commercial use and Extended Security Maintenance channels |
2269 | -If your usage includes redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
2270 | - |
2271 | - |
2272 | -If your usage includes redistribution, please [contact Canonical](https://ubuntu.com/security/docker-images#get-in-touch). |
2273 | - |
2274 | -## Docker CLI |
2275 | - |
2276 | -Launch this image locally: |
2277 | - |
2278 | -```sh |
2279 | -docker run -d --name telegraf-container -e TZ=UTC -p 30273:9273 public.ecr.aws/lts/telegraf:latest |
2280 | -``` |
2281 | -Access your Telegraf server at `localhost:30273`. |
2282 | - |
2283 | -#### Parameters |
2284 | - |
2285 | -| Parameter | Description | |
2286 | -|---|---| |
2287 | -| `-e TZ=UTC` | Timezone. | |
2288 | -| `-p 30273:9273` | Expose Telegraf on `localhost:30273`. | |
2289 | -| `-v /path/to/telegraf.conf:/etc/telegraf/telegraf.conf` | Local [configuration file](https://docs.influxdata.com/telegraf/) `telegraf.conf` (try [this example](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/telegraf/plain/examples/config/telegraf.conf?h=1.21-22.04)). | |
2290 | - |
2291 | - |
2292 | -#### Testing/Debugging |
2293 | - |
2294 | -To debug the container: |
2295 | - |
2296 | -```sh |
2297 | -docker logs -f telegraf-container |
2298 | -``` |
2299 | - |
2300 | -To get an interactive shell: |
2301 | - |
2302 | -```sh |
2303 | -docker exec -it telegraf-container /bin/bash |
2304 | -``` |
2305 | - |
2306 | - |
2307 | -## Deploy with Kubernetes |
2308 | - |
2309 | -Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
2310 | - |
2311 | -Download |
2312 | -[telegraf.conf](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/telegraf/plain/examples/config/telegraf.conf?h=1.21-22.04) and |
2313 | -[telegraf-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/telegraf/plain/examples/telegraf-deployment.yml?h=1.21-22.04) and set `containers.telegraf.image` in `telegraf-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/lts/telegraf:latest`), then: |
2314 | - |
2315 | -```sh |
2316 | -kubectl create configmap telegraf-config --from-file=main-config=telegraf.conf |
2317 | -kubectl apply -f telegraf-deployment.yml |
2318 | -``` |
2319 | - |
2320 | -You will now be able to connect to the Telegraf server on `localhost:30073`. |
2321 | - |
2322 | -## Bugs and feature requests |
2323 | - |
2324 | -If you find a bug in our image or want to request a specific feature, please file a bug here: |
2325 | - |
2326 | -[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
2327 | - |
2328 | -Please title the bug "`telegraf: <issue summary>`". Make sure to include the digest of the image you are using, from: |
2329 | - |
2330 | -```sh |
2331 | -docker images --no-trunc --quiet public.ecr.aws/lts/telegraf:<tag> |
2332 | -``` |
2333 | +If your usage includes redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
2334 | |
2335 | diff --git a/docs/public.ecr.aws/lts/usage/apache2.md b/docs/public.ecr.aws/lts/usage/apache2.md |
2336 | new file mode 100644 |
2337 | index 0000000..c1329a3 |
2338 | --- /dev/null |
2339 | +++ b/docs/public.ecr.aws/lts/usage/apache2.md |
2340 | @@ -0,0 +1,68 @@ |
2341 | + |
2342 | + |
2343 | + |
2344 | + |
2345 | + |
2346 | + |
2347 | +## Docker CLI |
2348 | + |
2349 | +Launch this image locally: |
2350 | + |
2351 | +```sh |
2352 | +docker run -d --name apache2-container -e TZ=UTC -p 8080:80 public.ecr.aws/ubuntu/apache2:2.4-22.04_beta |
2353 | +``` |
2354 | +Access your Apache2 server at `http://localhost:8080`. |
2355 | + |
2356 | +#### Parameters |
2357 | + |
2358 | +| Parameter | Description | |
2359 | +|---|---| |
2360 | +| `-e TZ=UTC` | Timezone. | |
2361 | +| `-p 8080:80` | Expose Apache2 on `localhost:8080`. | |
2362 | +| `-v /local/path/to/website:/var/www/html` | Mount and serve a local website. | |
2363 | +| `-v /path/to/apache2.conf:/etc/apache2/apache2.conf` | Local [configuration file](https://httpd.apache.org/docs/2.4/) `apache2.conf` (try [this example](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/apache2/plain/examples/config/apache2.conf?h=2.4-22.04)). | |
2364 | + |
2365 | + |
2366 | +#### Testing/Debugging |
2367 | + |
2368 | +To debug the container: |
2369 | + |
2370 | +```sh |
2371 | +docker logs -f apache2-container |
2372 | +``` |
2373 | + |
2374 | +To get an interactive shell: |
2375 | + |
2376 | +```sh |
2377 | +docker exec -it apache2-container /bin/bash |
2378 | +``` |
2379 | + |
2380 | + |
2381 | +## Deploy with Kubernetes |
2382 | + |
2383 | +Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
2384 | + |
2385 | +Download |
2386 | +[apache2.conf](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/apache2/plain/examples/config/apache2.conf?h=2.4-22.04), [index.html](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/apache2/plain/examples/config/html/index.html?h=2.4-22.04) and |
2387 | +[apache2-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/apache2/plain/examples/apache2-deployment.yml?h=2.4-22.04) and set `containers.apache2.image` in `apache2-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/ubuntu/apache2:2.4-22.04_beta`), then: |
2388 | + |
2389 | +```sh |
2390 | +kubectl create configmap apache2-config --from-file=apache2=apache2.conf --from-file=apache2-site=index.html |
2391 | +kubectl apply -f apache2-deployment.yml |
2392 | +``` |
2393 | + |
2394 | +You will now be able to connect to the apache2 server on `http://localhost:30080`. |
2395 | + |
2396 | +## Bugs and feature requests |
2397 | + |
2398 | +If you find a bug in our image or want to request a specific feature, please file a bug here: |
2399 | + |
2400 | +[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
2401 | + |
2402 | +Please title the bug "`apache2: <issue summary>`". Make sure to include the digest of the image you are using, from: |
2403 | + |
2404 | +```sh |
2405 | +docker images --no-trunc --quiet public.ecr.aws/ubuntu/apache2:<tag> |
2406 | +``` |
2407 | + |
2408 | + |
2409 | diff --git a/docs/public.ecr.aws/lts/usage/bind9.md b/docs/public.ecr.aws/lts/usage/bind9.md |
2410 | new file mode 100644 |
2411 | index 0000000..9f6e4b5 |
2412 | --- /dev/null |
2413 | +++ b/docs/public.ecr.aws/lts/usage/bind9.md |
2414 | @@ -0,0 +1,68 @@ |
2415 | + |
2416 | + |
2417 | + |
2418 | + |
2419 | + |
2420 | + |
2421 | +## Docker CLI |
2422 | + |
2423 | +Launch this image locally: |
2424 | + |
2425 | +```sh |
2426 | +docker run -d --name bind9-container -e TZ=UTC -p 30053:53 public.ecr.aws/ubuntu/bind9:9.18-22.04_beta |
2427 | +``` |
2428 | +Access your Bind9 server at `localhost:30053` |
2429 | + |
2430 | +#### Parameters |
2431 | + |
2432 | +| Parameter | Description | |
2433 | +|---|---| |
2434 | +| `-e TZ=UTC` | Timezone. | |
2435 | +| `-p 30053:53` | Expose bind9 on `localhost:30053`. | |
2436 | +| `-e BIND9_USER=bind` | The user which will start the `named` process. | |
2437 | +| `-v /path/to/bind/configuration:/etc/bind/named.conf` | Local [configuration file](https://bind9.readthedocs.io/en/latest/reference.html) `named.conf` (try [this example](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/bind9/plain/examples/caching-nameserver/named.conf.options?h=9.18-22.04)). | |
2438 | +| `-v /path/to/cached/data:/var/cache/bind` | Location where locally cached data can be dumped. | |
2439 | +| `-v /path/to/resource/records:/var/lib/bind` | Location of Resource Records defining various domain information. | |
2440 | + |
2441 | + |
2442 | +#### Testing/Debugging |
2443 | + |
2444 | +To debug the container: |
2445 | + |
2446 | +```sh |
2447 | +docker logs -f bind9-container |
2448 | +``` |
2449 | + |
2450 | +To get an interactive shell: |
2451 | + |
2452 | +```sh |
2453 | +docker exec -it bind9-container /bin/bash |
2454 | +``` |
2455 | + |
2456 | + |
2457 | +## Deploy with Kubernetes |
2458 | + |
2459 | +Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
2460 | + |
2461 | +Download |
2462 | +[bind9-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/bind9/plain/examples/bind9-deployment.yml?h=9.18-22.04) and set `containers.bind9.image` in `bind9-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/ubuntu/bind9:9.18-22.04_beta`), then: |
2463 | + |
2464 | +```sh |
2465 | +kubectl apply -f bind9-deployment.yml |
2466 | +``` |
2467 | + |
2468 | +You will now be able to connect to the Bind9 server on localhost:30053`. |
2469 | + |
2470 | +## Bugs and feature requests |
2471 | + |
2472 | +If you find a bug in our image or want to request a specific feature, please file a bug here: |
2473 | + |
2474 | +[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
2475 | + |
2476 | +Please title the bug "`bind9: <issue summary>`". Make sure to include the digest of the image you are using, from: |
2477 | + |
2478 | +```sh |
2479 | +docker images --no-trunc --quiet public.ecr.aws/ubuntu/bind9:<tag> |
2480 | +``` |
2481 | + |
2482 | + |
2483 | diff --git a/docs/public.ecr.aws/lts/usage/cassandra.md b/docs/public.ecr.aws/lts/usage/cassandra.md |
2484 | new file mode 100644 |
2485 | index 0000000..5973c25 |
2486 | --- /dev/null |
2487 | +++ b/docs/public.ecr.aws/lts/usage/cassandra.md |
2488 | @@ -0,0 +1,67 @@ |
2489 | + |
2490 | + |
2491 | + |
2492 | +## Docker CLI |
2493 | + |
2494 | +Launch this image locally: |
2495 | + |
2496 | +```sh |
2497 | +docker run -d --name cassandra-container -e TZ=UTC -p 7000:7000 -p 7001:7001 -p 7199:7199 -p 9042:9042 -p 9160:9160 public.ecr.aws/ubuntu/cassandra:4.0-22.04_beta |
2498 | +``` |
2499 | +Access your Cassandra server with `cqlsh localhost 9042`. |
2500 | + |
2501 | +#### Parameters |
2502 | + |
2503 | +| Parameter | Description | |
2504 | +|---|---| |
2505 | +| `-e TZ=UTC` | Timezone. | |
2506 | +| `-p 7000:7000` | Expose itra-node communication | |
2507 | +| `-p 7001:7001` | Expose TLS itra-node communication | |
2508 | +| `-p 7199:7199` | Expose JMX | |
2509 | +| `-p 9042:9042` | Expose CQL | |
2510 | +| `-p 9160:9160` | Expose thrift service | |
2511 | +| `-v /local/path/to/data:/var/lib/cassandra` | Volume to store Cassandra data | |
2512 | +| `-v /path/to/logs:/var/log/cassandra` | Volume to store cassandra logs | |
2513 | + |
2514 | + |
2515 | +#### Testing/Debugging |
2516 | + |
2517 | +To debug the container: |
2518 | + |
2519 | +```sh |
2520 | +docker logs -f cassandra-container |
2521 | +``` |
2522 | + |
2523 | +To get an interactive shell: |
2524 | + |
2525 | +```sh |
2526 | +docker exec -it cassandra-container /bin/bash |
2527 | +``` |
2528 | + |
2529 | + |
2530 | +## Deploy with Kubernetes |
2531 | + |
2532 | +Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
2533 | + |
2534 | +Download |
2535 | +[cassandra-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/cassandra/plain/examples/cassandra-deployment.yml?h=4.0-22.04) and set `containers.cassandra.image` in `cassandra-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/ubuntu/cassandra:4.0-22.04_beta`), then: |
2536 | + |
2537 | +```sh |
2538 | +kubectl apply -f cassandra-deployment.yml |
2539 | +``` |
2540 | + |
2541 | +You can now access the cassandra server on port 9042 (e.g., cqlsh localhost 9042) |
2542 | + |
2543 | +## Bugs and feature requests |
2544 | + |
2545 | +If you find a bug in our image or want to request a specific feature, please file a bug here: |
2546 | + |
2547 | +[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
2548 | + |
2549 | +Please title the bug "`cassandra: <issue summary>`". Make sure to include the digest of the image you are using, from: |
2550 | + |
2551 | +```sh |
2552 | +docker images --no-trunc --quiet public.ecr.aws/ubuntu/cassandra:<tag> |
2553 | +``` |
2554 | + |
2555 | + |
2556 | diff --git a/docs/public.ecr.aws/lts/usage/cortex.md b/docs/public.ecr.aws/lts/usage/cortex.md |
2557 | new file mode 100644 |
2558 | index 0000000..4b874e6 |
2559 | --- /dev/null |
2560 | +++ b/docs/public.ecr.aws/lts/usage/cortex.md |
2561 | @@ -0,0 +1,64 @@ |
2562 | + |
2563 | + |
2564 | + |
2565 | +## Docker CLI |
2566 | + |
2567 | +Launch this image locally: |
2568 | + |
2569 | +```sh |
2570 | +docker run -d --name cortex-container -e TZ=UTC -p 32709:9009 public.ecr.aws/ubuntu/cortex:1.11-22.04_beta |
2571 | +``` |
2572 | +Access your Cortex server at `http://localhost:32709`. |
2573 | + |
2574 | +#### Parameters |
2575 | + |
2576 | +| Parameter | Description | |
2577 | +|---|---| |
2578 | +| `-e TZ=UTC` | Timezone. | |
2579 | +| `-p 32709:9009` | Expose Cortex on `localhost:32709`. | |
2580 | +| `-v /my/local/cortex.yaml:/etc/cortex/cortex.yaml` | Local [configuration file](https://cortexmetrics.io/docs/configuration/) `cortex.yaml` (try [this example](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/cortex/plain/oci/examples/config/cortex.yaml?h=1.11-22.04)). | |
2581 | + |
2582 | + |
2583 | +#### Testing/Debugging |
2584 | + |
2585 | +To debug the container: |
2586 | + |
2587 | +```sh |
2588 | +docker logs -f cortex-container |
2589 | +``` |
2590 | + |
2591 | +To get an interactive shell: |
2592 | + |
2593 | +```sh |
2594 | +docker exec -it cortex-container /bin/bash |
2595 | +``` |
2596 | + |
2597 | + |
2598 | +## Deploy with Kubernetes |
2599 | + |
2600 | +Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
2601 | + |
2602 | +Download |
2603 | +[cortex.yaml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/cortex/plain/oci/examples/config/cortex.yaml?h=1.11-22.04) and |
2604 | +[cortex-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/cortex/plain/oci/examples/cortex-deployment.yml?h=1.11-22.04) and set `containers.cortex.image` in `cortex-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/ubuntu/cortex:1.11-22.04_beta`), then: |
2605 | + |
2606 | +```sh |
2607 | +kubectl create configmap cortex-config --from-file=main-config=cortex.yaml |
2608 | +kubectl apply -f cortex-deployment.yml |
2609 | +``` |
2610 | + |
2611 | +You will now be able to connect to the Cortex server on `localhost:32709`. |
2612 | + |
2613 | +## Bugs and feature requests |
2614 | + |
2615 | +If you find a bug in our image or want to request a specific feature, please file a bug here: |
2616 | + |
2617 | +[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
2618 | + |
2619 | +Please title the bug "`cortex: <issue summary>`". Make sure to include the digest of the image you are using, from: |
2620 | + |
2621 | +```sh |
2622 | +docker images --no-trunc --quiet public.ecr.aws/ubuntu/cortex:<tag> |
2623 | +``` |
2624 | + |
2625 | + |
2626 | diff --git a/docs/public.ecr.aws/lts/usage/grafana.md b/docs/public.ecr.aws/lts/usage/grafana.md |
2627 | new file mode 100644 |
2628 | index 0000000..f143d00 |
2629 | --- /dev/null |
2630 | +++ b/docs/public.ecr.aws/lts/usage/grafana.md |
2631 | @@ -0,0 +1,65 @@ |
2632 | + |
2633 | + |
2634 | + |
2635 | +## Docker CLI |
2636 | + |
2637 | +Launch this image locally: |
2638 | + |
2639 | +```sh |
2640 | +docker run -d --name grafana-container -e TZ=UTC -p 30000:3000 public.ecr.aws/ubuntu/grafana:8.2-22.04_beta |
2641 | +``` |
2642 | +Access your Grafana server at `localhost:30000`. |
2643 | + |
2644 | +#### Parameters |
2645 | + |
2646 | +| Parameter | Description | |
2647 | +|---|---| |
2648 | +| `-e TZ=UTC` | Timezone. | |
2649 | +| `-p 30000:3000` | Expose Grafana on `localhost:30000`. | |
2650 | +| `-v /path/to/grafana/provisioning/files/:/etc/grafana/provisioning/` | Pass a directory with files to provision a Grafana `datasource` and `dashboard` (see [documentation](https://grafana.com/docs/grafana/latest/administration/provisioning/)). | |
2651 | +| `-v /path/to/persisted/data:/var/lib/grafana` | Persist data with a volume instead of initializing a new database for each newly launched container. | |
2652 | + |
2653 | + |
2654 | +#### Testing/Debugging |
2655 | + |
2656 | +To debug the container: |
2657 | + |
2658 | +```sh |
2659 | +docker logs -f grafana-container |
2660 | +``` |
2661 | + |
2662 | +To get an interactive shell: |
2663 | + |
2664 | +```sh |
2665 | +docker exec -it grafana-container /bin/bash |
2666 | +``` |
2667 | + |
2668 | + |
2669 | +## Deploy with Kubernetes |
2670 | + |
2671 | +Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
2672 | + |
2673 | +Download |
2674 | +[datasource.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/grafana/plain/examples/config/datasource.yml?h=8.2-22.04), [dashboard.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/grafana/plain/examples/config/dashboard.yml?h=8.2-22.04), [system-stats-dashboard.json](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/grafana/plain/examples/config/system-stats-dashboard.json?h=8.2-22.04) and |
2675 | +[grafana-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/grafana/plain/examples/grafana-deployment.yml?h=8.2-22.04) and set `containers.grafana.image` in `grafana-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/ubuntu/grafana:8.2-22.04_beta`), then: |
2676 | + |
2677 | +```sh |
2678 | +kubectl create configmap grafana-config --from-file=grafana-datasource=datasource.yml --from-file=grafana-dashboard-definition=dashboard.yml --from-file=grafana-dashboard=system-stats-dashboard.json |
2679 | +kubectl apply -f grafana-deployment.yml |
2680 | +``` |
2681 | + |
2682 | +You will now be able to connect to the Grafana on `http://localhost:30000`. |
2683 | + |
2684 | +## Bugs and feature requests |
2685 | + |
2686 | +If you find a bug in our image or want to request a specific feature, please file a bug here: |
2687 | + |
2688 | +[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
2689 | + |
2690 | +Please title the bug "`grafana: <issue summary>`". Make sure to include the digest of the image you are using, from: |
2691 | + |
2692 | +```sh |
2693 | +docker images --no-trunc --quiet public.ecr.aws/ubuntu/grafana:<tag> |
2694 | +``` |
2695 | + |
2696 | + |
2697 | diff --git a/docs/public.ecr.aws/lts/usage/kafka.md b/docs/public.ecr.aws/lts/usage/kafka.md |
2698 | new file mode 100644 |
2699 | index 0000000..5bcd66e |
2700 | --- /dev/null |
2701 | +++ b/docs/public.ecr.aws/lts/usage/kafka.md |
2702 | @@ -0,0 +1,67 @@ |
2703 | + |
2704 | + |
2705 | + |
2706 | +## Docker CLI |
2707 | + |
2708 | +Launch this image locally: |
2709 | + |
2710 | +```sh |
2711 | +docker run -d --name kafka-container -e TZ=UTC -p 9092:9092 -e ZOOKEEPER_HOST=host.docker.internal public.ecr.aws/ubuntu/kafka:3.1-22.04_beta |
2712 | +``` |
2713 | +Apache Kafka service is now exposed at `localhost:9092` (**You first need to run a Zookeeper instance**: `docker run -d -p 2181:2181 ubuntu/zookeeper:edge`). |
2714 | + |
2715 | + |
2716 | +#### Parameters |
2717 | + |
2718 | +| Parameter | Description | |
2719 | +|---|---| |
2720 | +| `-e TZ=UTC` | Timezone. | |
2721 | +| `-e ZOOKEEPER_HOST=172.17.0.1` | Hostname for the related Zookeeper instance (default value is set to the default IP for the Docker host (host.docker.internal)). | |
2722 | +| `-e ZOOKEEPER_PORT=2181` | Port for the related Zookeeper instance. | |
2723 | +| `-p 9092:9092` | Expose Apache Kafka service on `localhost:9092`. | |
2724 | +| `-p 2181:2181` | Expose Apache Zookeeper service on `localhost:2181`. | |
2725 | +| `CMD kafka-server-start.sh /etc/kafka/server.properties --override zookeeper.connect=host.docker.internal:2181` | Start a Kafka instance, connecting to the Zookeeper instance accessible at `host.docker.internal:2181` from within the Kafka instance container. | |
2726 | +| `CMD zookeeper-server-start.sh /etc/kafka/zookeeper.properties` | Start a Zookeeper instance. | |
2727 | + |
2728 | + |
2729 | +#### Testing/Debugging |
2730 | + |
2731 | +To debug the container: |
2732 | + |
2733 | +```sh |
2734 | +docker logs -f kafka-container |
2735 | +``` |
2736 | + |
2737 | +To get an interactive shell: |
2738 | + |
2739 | +```sh |
2740 | +docker exec -it kafka-container /bin/bash |
2741 | +``` |
2742 | + |
2743 | + |
2744 | +## Deploy with Kubernetes |
2745 | + |
2746 | +Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
2747 | + |
2748 | +Download |
2749 | +[kafka-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/kafka/plain/examples/kafka-deployment.yml?h=3.1-22.04) and set `containers.kafka.image` in `kafka-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/ubuntu/kafka:3.1-22.04_beta`), then: |
2750 | + |
2751 | +```sh |
2752 | +kubectl apply -f kafka-deployment.yml |
2753 | +``` |
2754 | + |
2755 | +Apache Kafka will be available on the K8s cluster as a `kafka-service` Service. |
2756 | + |
2757 | +## Bugs and feature requests |
2758 | + |
2759 | +If you find a bug in our image or want to request a specific feature, please file a bug here: |
2760 | + |
2761 | +[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
2762 | + |
2763 | +Please title the bug "`kafka: <issue summary>`". Make sure to include the digest of the image you are using, from: |
2764 | + |
2765 | +```sh |
2766 | +docker images --no-trunc --quiet public.ecr.aws/ubuntu/kafka:<tag> |
2767 | +``` |
2768 | + |
2769 | + |
2770 | diff --git a/docs/public.ecr.aws/lts/usage/loki.md b/docs/public.ecr.aws/lts/usage/loki.md |
2771 | new file mode 100644 |
2772 | index 0000000..fea14d4 |
2773 | --- /dev/null |
2774 | +++ b/docs/public.ecr.aws/lts/usage/loki.md |
2775 | @@ -0,0 +1,65 @@ |
2776 | + |
2777 | + |
2778 | + |
2779 | +## Docker CLI |
2780 | + |
2781 | +Launch this image locally: |
2782 | + |
2783 | +```sh |
2784 | +docker run -d --name loki-container -e TZ=UTC -p 3100:3100 public.ecr.aws/ubuntu/loki:2.4-22.04_beta |
2785 | +``` |
2786 | +You can now use your Loki instance exposed at `http://localhost:3100`. |
2787 | + |
2788 | +#### Parameters |
2789 | + |
2790 | +| Parameter | Description | |
2791 | +|---|---| |
2792 | +| `-e TZ=UTC` | Timezone. | |
2793 | +| `-p 3100:3100` | Expose Grafana Loki on `localhost:3100`. | |
2794 | +| `-v /local/path/to/config:/etc/loki/local-config.yaml` | Local Loki Promtail config file. Can be changed using CMD `--config.file=` argument. See an [example file](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/loki/plain/examples/config/promtail-local-config.yaml?h=2.4-22.04). | |
2795 | +| `-v lokidata:/loki` | Persist data in a docker volume named `lokidata`. | |
2796 | + |
2797 | + |
2798 | +#### Testing/Debugging |
2799 | + |
2800 | +To debug the container: |
2801 | + |
2802 | +```sh |
2803 | +docker logs -f loki-container |
2804 | +``` |
2805 | + |
2806 | +To get an interactive shell: |
2807 | + |
2808 | +```sh |
2809 | +docker exec -it loki-container /bin/bash |
2810 | +``` |
2811 | + |
2812 | + |
2813 | +## Deploy with Kubernetes |
2814 | + |
2815 | +Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
2816 | + |
2817 | +Download |
2818 | +[promtail-local-config-k8s.yaml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/loki/plain/examples/config/promtail-local-config-k8s.yaml?h=2.4-22.04) and |
2819 | +[loki-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/loki/plain/examples/loki-deployment.yml?h=2.4-22.04) and set `containers.loki.image` in `loki-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/ubuntu/loki:2.4-22.04_beta`), then: |
2820 | + |
2821 | +```sh |
2822 | +kubectl create configmap promtail-config --from-file=promtail=promtail-local-config-k8s.yaml |
2823 | +kubectl apply -f loki-deployment.yml |
2824 | +``` |
2825 | + |
2826 | +You will now be able to connect to the Loki instance on `http://localhost:31000`. |
2827 | + |
2828 | +## Bugs and feature requests |
2829 | + |
2830 | +If you find a bug in our image or want to request a specific feature, please file a bug here: |
2831 | + |
2832 | +[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
2833 | + |
2834 | +Please title the bug "`loki: <issue summary>`". Make sure to include the digest of the image you are using, from: |
2835 | + |
2836 | +```sh |
2837 | +docker images --no-trunc --quiet public.ecr.aws/ubuntu/loki:<tag> |
2838 | +``` |
2839 | + |
2840 | + |
2841 | diff --git a/docs/public.ecr.aws/lts/usage/memcached.md b/docs/public.ecr.aws/lts/usage/memcached.md |
2842 | new file mode 100644 |
2843 | index 0000000..e48dc7a |
2844 | --- /dev/null |
2845 | +++ b/docs/public.ecr.aws/lts/usage/memcached.md |
2846 | @@ -0,0 +1,96 @@ |
2847 | + |
2848 | + |
2849 | + |
2850 | + |
2851 | + |
2852 | +## Docker CLI |
2853 | + |
2854 | +Launch this image locally: |
2855 | + |
2856 | +```sh |
2857 | +docker run -d --name memcached-container -e TZ=UTC public.ecr.aws/ubuntu/memcached:1.5-20.04_beta |
2858 | +``` |
2859 | + |
2860 | +#### Parameters |
2861 | + |
2862 | +| Parameter | Description | |
2863 | +|---|---| |
2864 | +| `-e TZ=UTC` | Timezone. | |
2865 | +| `-e MEMCACHED_CACHE_SIZE=64MB` | Determines the size of the cache. | |
2866 | +| `-e MEMCACHED_MAX_CONNECTIONS=1024` | Determines the maximum number of concurrent connections. | |
2867 | +| `-e MEMCACHED_THREADS=4` | Determines the number of threads to process requests. | |
2868 | +| `-e MEMCACHED_PASSWORD` | Define the password for the `root` user if another username is provided. By default the authentication is disabled but if this option is passed it becomes enabled. | |
2869 | +| `-e MEMCACHED_USERNAME` | Define a new user. If this option is passed a password is needed to authenticate the new user. | |
2870 | +| `-p 11211:11211` | Memcached is exposed inside the container on port `11211`. | |
2871 | + |
2872 | + |
2873 | +#### Testing/Debugging |
2874 | + |
2875 | +To debug the container: |
2876 | + |
2877 | +```sh |
2878 | +docker logs -f memcached-container |
2879 | +``` |
2880 | + |
2881 | +To get an interactive shell: |
2882 | + |
2883 | +```sh |
2884 | +docker exec -it memcached-container /bin/bash |
2885 | +``` |
2886 | + |
2887 | +<details> |
2888 | +<summary>You can access the Memcached instance with telnet from another container (click to expand).</summary> |
2889 | + |
2890 | +```sh |
2891 | +# Create a dedicated network |
2892 | +$ docker network create memcached-network |
2893 | +# Connect the main container to it |
2894 | +$ docker network connect memcached-network memcached-container |
2895 | +# Run an interactive container with the latest Ubuntu |
2896 | +$ docker run -it --rm --name telnet --network memcached-network ubuntu bash |
2897 | +# Install the telnet cli from within the container |
2898 | +> apt update && apt install telnet -y |
2899 | +# Connect to the memcached instance using telnet |
2900 | +> telnet memcached-container 11211 |
2901 | +Trying 172.30.0.2... |
2902 | +Connected to memcached. |
2903 | +Escape character is '^]'. |
2904 | +``` |
2905 | +From there you can run `memcached` commands, as documented in [their wiki](https://github.com/memcached/memcached/wiki/Commands). |
2906 | + |
2907 | +</details> |
2908 | + |
2909 | +```sh |
2910 | +$ telnet memcached-container 11211 |
2911 | +``` |
2912 | + |
2913 | +There are cases where one might want to pass some memcached command line flags that are not configurable via environment variables. |
2914 | +In this case you can append the flags themselves or a shell script to the run command. |
2915 | + |
2916 | + |
2917 | +## Deploy with Kubernetes |
2918 | + |
2919 | +Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
2920 | + |
2921 | +Download |
2922 | +[memcached-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/memcached/plain/examples/memcached-deployment.yml?h=1.6-22.04) and set `containers.memcached.image` in `memcached-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/ubuntu/memcached:1.5-20.04_beta`), then: |
2923 | + |
2924 | +```sh |
2925 | +kubectl apply -f memcached-deployment.yml |
2926 | +``` |
2927 | + |
2928 | +Memcached will be listening on port `31211` in your host. |
2929 | + |
2930 | +## Bugs and feature requests |
2931 | + |
2932 | +If you find a bug in our image or want to request a specific feature, please file a bug here: |
2933 | + |
2934 | +[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
2935 | + |
2936 | +Please title the bug "`memcached: <issue summary>`". Make sure to include the digest of the image you are using, from: |
2937 | + |
2938 | +```sh |
2939 | +docker images --no-trunc --quiet public.ecr.aws/ubuntu/memcached:<tag> |
2940 | +``` |
2941 | + |
2942 | + |
2943 | diff --git a/docs/public.ecr.aws/lts/usage/mysql.md b/docs/public.ecr.aws/lts/usage/mysql.md |
2944 | new file mode 100644 |
2945 | index 0000000..463bedf |
2946 | --- /dev/null |
2947 | +++ b/docs/public.ecr.aws/lts/usage/mysql.md |
2948 | @@ -0,0 +1,94 @@ |
2949 | + |
2950 | + |
2951 | + |
2952 | + |
2953 | + |
2954 | + |
2955 | +## Docker CLI |
2956 | + |
2957 | +Launch this image locally: |
2958 | + |
2959 | +```sh |
2960 | +docker run -d --name mysql-container -e TZ=UTC -p 30306:3306 -e MYSQL_ROOT_PASSWORD=My:S3cr3t/ public.ecr.aws/ubuntu/mysql:8.0-22.04_beta |
2961 | +``` |
2962 | +Access your MySQL server at `localhost:30306`. |
2963 | + |
2964 | +#### Parameters |
2965 | + |
2966 | +| Parameter | Description | |
2967 | +|---|---| |
2968 | +| `-e TZ=UTC` | Timezone. | |
2969 | +| `-e MYSQL_ROOT_PASSWORD=secret_for_root` | Set the password for the `root` user. This option is **mandatory** and **must not be empty**. | |
2970 | +| `-e MYSQL_PASSWORD=secret` | Set the password for the `MYSQL_USER` user. | |
2971 | +| `-e MYSQL_USER=john` | Create a new user with superuser privileges. This is used in conjunction with `MYSQL_PASSWORD`. | |
2972 | +| `-e MYSQL_DATABASE=db_test` | Set the name of the default database. | |
2973 | +| `-e MYSQL_ALLOW_EMPTY_PASSWORD=yes` | Set up a blank password for the `root` user. **This is not recommended to be used in production, make sure you know what you are doing**. | |
2974 | +| `-e MYSQL_RANDOM_ROOT_PASSWORD=yes` | Generate a random initial password for the `root` user using `pwgen`. It will be printed in the logs, search for `GENERATED ROOT PASSWORD`. | |
2975 | +| `-e MYSQL_ONETIME_PASSWORD=yes` | Set `root` user as experide once initialization is complete, forcing a password change on first login. | |
2976 | +| `-e MYSQL_INITSB_SKIP_TZINFO=yes` | Timezone data is automatically loaded via entrypoint script, set this variable to any non-empty value to disable it. | |
2977 | +| `-p 30306:3306` | Expose MySQL server on `localhost:30306`. | |
2978 | +| `-v /path/to/data:/var/lib/mysql` | Persist data instead of initializing a new database every time you launch a new container. | |
2979 | +| `-v /path/to/config/files/:/etc/mysql/mysql.conf.d/` | Local [configuration files](https://dev.mysql.com/doc/refman/8.0/en/mysql-command-options.html) (try this [example my.cnf](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/mysql/plain/examples/config/my-custom.cnf?h=8.0-22.04)). | |
2980 | + |
2981 | +#### Initialization Scripts |
2982 | + |
2983 | +One can also add initialization scripts to their containers. This includes `*.sql`, `.sql.gz`, and `*.sh` scripts, and you just need to put them inside the `/docker-entrypoint-initdb.d` directory inside the container. After MySQL initialization is done and the default database and user are created, the scripts are executed in the following order: |
2984 | + |
2985 | +* Run any `*.sql` files in alphabetically order. By default the target database is specified via `MYSQL_DATABASE`. |
2986 | +* Run any executable `*.sh` scripts in alphabetically order. |
2987 | +* Source any non-executable `*.sh` scripts in alphabetically order. |
2988 | + |
2989 | +All of this is done before the MySQL service is started. Keep in mind if your database directory is not empty (contains pre-existing database) they will be left untouched. |
2990 | + |
2991 | + |
2992 | +#### Testing/Debugging |
2993 | + |
2994 | +To debug the container: |
2995 | + |
2996 | +```sh |
2997 | +docker logs -f mysql-container |
2998 | +``` |
2999 | + |
3000 | +To get an interactive shell: |
3001 | + |
3002 | +```sh |
3003 | +docker exec -it mysql-container /bin/bash |
3004 | +``` |
3005 | + |
3006 | +This image also includes the `mysql` client for interactive container use: |
3007 | + |
3008 | +```sh |
3009 | +$ docker network create mysql-network |
3010 | +$ docker network connect mysql-network mysql-container |
3011 | +$ docker run -it --rm --network mysql-network public.ecr.aws/ubuntu/mysql:8.0-22.04_beta mysql -hmysql-container -uroot -p |
3012 | +``` |
3013 | +The password will be asked and you can enter `My:S3cr3t/`. Now, you are logged in and can enjoy your new instance. |
3014 | + |
3015 | +## Deploy with Kubernetes |
3016 | + |
3017 | +Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
3018 | + |
3019 | +Download |
3020 | +[my-custom.cnf](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/mysql/plain/examples/config/my-custom.cnf?h=8.0-22.04) and |
3021 | +[mysql-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/mysql/plain/examples/mysql-deployment.yml?h=8.0-22.04) and set `containers.mysql.image` in `mysql-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/ubuntu/mysql:8.0-22.04_beta`), then: |
3022 | + |
3023 | +```sh |
3024 | +kubectl create configmap mysql-config --from-file=main-config=my-custom.cnf |
3025 | +kubectl apply -f mysql-deployment.yml |
3026 | +``` |
3027 | + |
3028 | +You will now be able to connect to the MySQL server on `localhost:30306`. |
3029 | + |
3030 | +## Bugs and feature requests |
3031 | + |
3032 | +If you find a bug in our image or want to request a specific feature, please file a bug here: |
3033 | + |
3034 | +[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
3035 | + |
3036 | +Please title the bug "`mysql: <issue summary>`". Make sure to include the digest of the image you are using, from: |
3037 | + |
3038 | +```sh |
3039 | +docker images --no-trunc --quiet public.ecr.aws/ubuntu/mysql:<tag> |
3040 | +``` |
3041 | + |
3042 | + |
3043 | diff --git a/docs/public.ecr.aws/lts/usage/nginx.md b/docs/public.ecr.aws/lts/usage/nginx.md |
3044 | new file mode 100644 |
3045 | index 0000000..fa2aa03 |
3046 | --- /dev/null |
3047 | +++ b/docs/public.ecr.aws/lts/usage/nginx.md |
3048 | @@ -0,0 +1,69 @@ |
3049 | + |
3050 | + |
3051 | + |
3052 | + |
3053 | + |
3054 | + |
3055 | +## Docker CLI |
3056 | + |
3057 | +Launch this image locally: |
3058 | + |
3059 | +```sh |
3060 | +docker run -d --name nginx-container -e TZ=UTC -p 8080:80 public.ecr.aws/ubuntu/nginx:1.18-22.04_beta |
3061 | +``` |
3062 | +Access your Nginx server at `http://localhost:8080`. |
3063 | + |
3064 | +#### Parameters |
3065 | + |
3066 | +| Parameter | Description | |
3067 | +|---|---| |
3068 | +| `-e TZ=UTC` | Timezone. | |
3069 | +| `-p 8080:80` | Expose Nginx on `localhost:8080`. | |
3070 | +| `-v /local/path/to/website:/var/www/html` | Mount and serve a local website. | |
3071 | +| `-v /path/to/conf.template:/etc/nginx/templates/conf.template` | Mount template files inside `/etc/nginx/templates`. They will be processed and the results will be placed at `/etc/nginx/conf.d`. (e.g. `listen ${NGINX_PORT};` will generate `listen 80;`). | |
3072 | +| `-v /path/to/nginx.conf:/etc/nginx/nginx.conf` | Local [configuration file](https://nginx.org/en/docs/) `nginx.conf` (try [this example](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/nginx/plain/examples/config/nginx.conf?h=1.18-22.04)). | |
3073 | + |
3074 | + |
3075 | +#### Testing/Debugging |
3076 | + |
3077 | +To debug the container: |
3078 | + |
3079 | +```sh |
3080 | +docker logs -f nginx-container |
3081 | +``` |
3082 | + |
3083 | +To get an interactive shell: |
3084 | + |
3085 | +```sh |
3086 | +docker exec -it nginx-container /bin/bash |
3087 | +``` |
3088 | + |
3089 | + |
3090 | +## Deploy with Kubernetes |
3091 | + |
3092 | +Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
3093 | + |
3094 | +Download |
3095 | +[nginx.conf](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/nginx/plain/examples/config/nginx.conf?h=1.18-22.04), [index.html](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/nginx/plain/examples/config/html/index.html?h=1.18-22.04) and |
3096 | +[nginx-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/nginx/plain/examples/nginx-deployment.yml?h=1.18-22.04) and set `containers.nginx.image` in `nginx-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/ubuntu/nginx:1.18-22.04_beta`), then: |
3097 | + |
3098 | +```sh |
3099 | +kubectl create configmap nginx-config --from-file=nginx=nginx.conf --from-file=nginx-site=index.html |
3100 | +kubectl apply -f nginx-deployment.yml |
3101 | +``` |
3102 | + |
3103 | +You will now be able to connect to the nginx server on `http://localhost:31080`. |
3104 | + |
3105 | +## Bugs and feature requests |
3106 | + |
3107 | +If you find a bug in our image or want to request a specific feature, please file a bug here: |
3108 | + |
3109 | +[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
3110 | + |
3111 | +Please title the bug "`nginx: <issue summary>`". Make sure to include the digest of the image you are using, from: |
3112 | + |
3113 | +```sh |
3114 | +docker images --no-trunc --quiet public.ecr.aws/ubuntu/nginx:<tag> |
3115 | +``` |
3116 | + |
3117 | + |
3118 | diff --git a/docs/public.ecr.aws/lts/usage/postgres.md b/docs/public.ecr.aws/lts/usage/postgres.md |
3119 | new file mode 100644 |
3120 | index 0000000..2df6b8d |
3121 | --- /dev/null |
3122 | +++ b/docs/public.ecr.aws/lts/usage/postgres.md |
3123 | @@ -0,0 +1,93 @@ |
3124 | + |
3125 | + |
3126 | + |
3127 | + |
3128 | + |
3129 | + |
3130 | +## Docker CLI |
3131 | + |
3132 | +Launch this image locally: |
3133 | + |
3134 | +```sh |
3135 | +docker run -d --name postgres-container -e TZ=UTC -p 30432:5432 -e POSTGRES_PASSWORD=My:s3Cr3t/ public.ecr.aws/ubuntu/postgres:14-22.04_beta |
3136 | +``` |
3137 | +Access your PostgreSQL server at `localhost:30432`. |
3138 | + |
3139 | +#### Parameters |
3140 | + |
3141 | +| Parameter | Description | |
3142 | +|---|---| |
3143 | +| `-e TZ=UTC` | Timezone. | |
3144 | +| `-e POSTGRES_PASSWORD=secret` | Set the password for the superuser which is `postgres` by default. Bear in mind that to connect to the database in the same host the password is not needed but to access it via an external host (for instance another container) the password is needed. This option is **mandatory** and **must not be empty**. | |
3145 | +| `-e POSTGRES_USER=john` | Create a new user with superuser privileges. This is used in conjunction with `POSTGRES_PASSWORD`. | |
3146 | +| `-e POSTGRES_DB=db_test` | Set the name of the default database. | |
3147 | +| `-e POSTGRES_INITDB_ARGS="--data-checksums"` | Pass arguments to the `postgres initdb` call. | |
3148 | +| `-e POSTGRES_INITDB_WALDIR=/path/to/location` | Set the location of the Postgres transaction log. By default it is stored in a subdirectory of the main Postgres data folder (`PGDATA`). | |
3149 | +| `-e POSTGRES_HOST_AUTH_METHOD=trust` | Set the `auth-method` for `host` connections for `all` databases, `all` users, and `all` addresses. The following will be added to the `pg_hba.conf` if this option is passed: `host all all all $POSTGRES_HOST_AUTH_METHOD`. | |
3150 | +| `-e PGDATA=/path/to/location` | Set the location of the database files. The default is `/var/lib/postgresql/data`. | |
3151 | +| `-p 30432:5432` | Expose Postgres on `localhost:30432`. | |
3152 | +| `-v /path/to/postgresql.conf:/etc/postgresql/postgresql.conf` | Local [configuration file](https://www.postgresql.org/docs/12/index.html) `postgresql.conf` (try [this example](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/postgresql/plain/examples/config/postgresql.conf?h=14-22.04)). | |
3153 | +| `-v /path/to/persisted/data:/var/lib/postgresql/data` | Persist data instead of initializing a new database every time you launch a new container. | |
3154 | + |
3155 | +#### Initialization Scripts |
3156 | + |
3157 | +One can also add initialization scripts to their containers. This includes `*.sql`, `.sql.gz`, and `*.sh` scripts, and you just need to put them inside the `/docker-entrypoint-initdb.d` directory inside the container. After Postgres initialization is done and the default database and user are created, the scripts are executed in the following order: |
3158 | + |
3159 | +* Run any `*.sql` files in alphabetically order. It will be executed with `POSTGRES_USER`. |
3160 | +* Run any executable `*.sh` scripts in alphabetically order. |
3161 | +* Source any non-executable `*.sh` scripts in alphabetically order. |
3162 | + |
3163 | +All of this is done before the Postgres service is started. Keep in mind if your `PGDATA` directory is not empty (contains pre-existing database) they will be left untouched. |
3164 | + |
3165 | + |
3166 | +#### Testing/Debugging |
3167 | + |
3168 | +To debug the container: |
3169 | + |
3170 | +```sh |
3171 | +docker logs -f postgres-container |
3172 | +``` |
3173 | + |
3174 | +To get an interactive shell: |
3175 | + |
3176 | +```sh |
3177 | +docker exec -it postgres-container /bin/bash |
3178 | +``` |
3179 | + |
3180 | +This image also includes the `psql` client for interactive container use: |
3181 | + |
3182 | +```sh |
3183 | +$ docker network create postgres-network |
3184 | +$ docker network connect postgres-network postgres-container |
3185 | +$ docker run -it --rm --network postgres-network public.ecr.aws/ubuntu/postgres:14-22.04_beta psql -h postgres-container -U postgres |
3186 | +``` |
3187 | +The password will be asked and you can enter `My:s3Cr3t/`. Now, you are logged in and can enjoy your new instance. |
3188 | + |
3189 | +## Deploy with Kubernetes |
3190 | + |
3191 | +Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
3192 | + |
3193 | +Download |
3194 | +[postgresql.conf](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/postgresql/plain/examples/config/postgresql.conf?h=14-22.04) and |
3195 | +[postgres-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/postgresql/plain/examples/postgres-deployment.yml?h=14-22.04) and set `containers.postgres.image` in `postgres-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/ubuntu/postgres:14-22.04_beta`), then: |
3196 | + |
3197 | +```sh |
3198 | +kubectl create configmap postgres-config --from-file=main-config=postgresql.conf |
3199 | +kubectl apply -f postgres-deployment.yml |
3200 | +``` |
3201 | + |
3202 | +You will now be able to connect to the Postgres server on `localhost:30306`. |
3203 | + |
3204 | +## Bugs and feature requests |
3205 | + |
3206 | +If you find a bug in our image or want to request a specific feature, please file a bug here: |
3207 | + |
3208 | +[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
3209 | + |
3210 | +Please title the bug "`postgres: <issue summary>`". Make sure to include the digest of the image you are using, from: |
3211 | + |
3212 | +```sh |
3213 | +docker images --no-trunc --quiet public.ecr.aws/ubuntu/postgres:<tag> |
3214 | +``` |
3215 | + |
3216 | + |
3217 | diff --git a/docs/public.ecr.aws/lts/usage/prometheus-alertmanager.md b/docs/public.ecr.aws/lts/usage/prometheus-alertmanager.md |
3218 | new file mode 100644 |
3219 | index 0000000..c065cce |
3220 | --- /dev/null |
3221 | +++ b/docs/public.ecr.aws/lts/usage/prometheus-alertmanager.md |
3222 | @@ -0,0 +1,65 @@ |
3223 | + |
3224 | + |
3225 | + |
3226 | +## Docker CLI |
3227 | + |
3228 | +Launch this image locally: |
3229 | + |
3230 | +```sh |
3231 | +docker run -d --name prometheus-alertmanager-container -e TZ=UTC -p 30093:9093 public.ecr.aws/ubuntu/prometheus-alertmanager:0.23-22.04_beta |
3232 | +``` |
3233 | +Access your Prometheus Alertmanager server at `localhost:30093`. |
3234 | + |
3235 | +#### Parameters |
3236 | + |
3237 | +| Parameter | Description | |
3238 | +|---|---| |
3239 | +| `-e TZ=UTC` | Timezone. | |
3240 | +| `-p 30093:9093` | Expose Prometheus Alertmanager on `localhost:30093`. | |
3241 | +| `-v /path/to/alertmanager.yml:/etc/prometheus/alertmanager.yml` | Local [configuration file](https://www.prometheus.io/docs/alerting/latest/configuration/) `alertmanager.yml` (try [this example](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/prometheus-alertmanager/plain/examples/config/alertmanager.yml?h=0.23-22.04)). | |
3242 | +| `-v /path/to/persisted/data:/alertmanager` | Persist data instead of initializing a new database for each newly launched container. **Important note**: the directory you will be using to persist the data needs to belong to `nogroup:nobody`. You can run `chown nogroup:nobody <path_to_persist_data>` before launching your container. | |
3243 | + |
3244 | + |
3245 | +#### Testing/Debugging |
3246 | + |
3247 | +To debug the container: |
3248 | + |
3249 | +```sh |
3250 | +docker logs -f prometheus-alertmanager-container |
3251 | +``` |
3252 | + |
3253 | +To get an interactive shell: |
3254 | + |
3255 | +```sh |
3256 | +docker exec -it prometheus-alertmanager-container /bin/bash |
3257 | +``` |
3258 | + |
3259 | + |
3260 | +## Deploy with Kubernetes |
3261 | + |
3262 | +Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
3263 | + |
3264 | +Download |
3265 | +[alertmanager.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/prometheus-alertmanager/plain/examples/config/alertmanager.yml?h=0.23-22.04) and |
3266 | +[prometheus-alertmanager-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/prometheus-alertmanager/plain/examples/alertmanager-deployment.yml?h=0.23-22.04) and set `containers.prometheus-alertmanager.image` in `prometheus-alertmanager-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/ubuntu/prometheus-alertmanager:0.23-22.04_beta`), then: |
3267 | + |
3268 | +```sh |
3269 | +kubectl create configmap alertmanager-config --from-file=alertmanager=alertmanager.yml |
3270 | +kubectl apply -f prometheus-alertmanager-deployment.yml |
3271 | +``` |
3272 | + |
3273 | +You will now be able to connect to the Prometheus Alertmanager server on `localhost:30093`. |
3274 | + |
3275 | +## Bugs and feature requests |
3276 | + |
3277 | +If you find a bug in our image or want to request a specific feature, please file a bug here: |
3278 | + |
3279 | +[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
3280 | + |
3281 | +Please title the bug "`prometheus-alertmanager: <issue summary>`". Make sure to include the digest of the image you are using, from: |
3282 | + |
3283 | +```sh |
3284 | +docker images --no-trunc --quiet public.ecr.aws/ubuntu/prometheus-alertmanager:<tag> |
3285 | +``` |
3286 | + |
3287 | + |
3288 | diff --git a/docs/public.ecr.aws/lts/usage/prometheus.md b/docs/public.ecr.aws/lts/usage/prometheus.md |
3289 | new file mode 100644 |
3290 | index 0000000..485e4c6 |
3291 | --- /dev/null |
3292 | +++ b/docs/public.ecr.aws/lts/usage/prometheus.md |
3293 | @@ -0,0 +1,65 @@ |
3294 | + |
3295 | + |
3296 | + |
3297 | +## Docker CLI |
3298 | + |
3299 | +Launch this image locally: |
3300 | + |
3301 | +```sh |
3302 | +docker run -d --name prometheus-container -e TZ=UTC -p 30090:9090 public.ecr.aws/ubuntu/prometheus:2.33-22.04_beta |
3303 | +``` |
3304 | +Access your Prometheus server at `localhost:30090`. |
3305 | + |
3306 | +#### Parameters |
3307 | + |
3308 | +| Parameter | Description | |
3309 | +|---|---| |
3310 | +| `-e TZ=UTC` | Timezone. | |
3311 | +| `-p 30090:9090` | Expose Prometheus server on `localhost:30090`. | |
3312 | +| `-v /path/to/prometheus.yml:/etc/prometheus/prometheus.yml` | Local [configuration file](https://prometheus.io/docs/prometheus/2.20/configuration/configuration/) `prometheus.yml` (try [this example](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/prometheus/plain/examples/config/prometheus.yml?h=2.33-22.04)). | |
3313 | +| `-v /path/to/alerts.yml:/etc/prometheus/alerts.yml` | Local [alert configuration file](https://prometheus.io/docs/prometheus/2.20/configuration/configuration/) `alerts.yml` (try [this example](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/prometheus/plain/examples/config/alerts.yml?h=2.33-22.04)). | |
3314 | + |
3315 | + |
3316 | +#### Testing/Debugging |
3317 | + |
3318 | +To debug the container: |
3319 | + |
3320 | +```sh |
3321 | +docker logs -f prometheus-container |
3322 | +``` |
3323 | + |
3324 | +To get an interactive shell: |
3325 | + |
3326 | +```sh |
3327 | +docker exec -it prometheus-container /bin/bash |
3328 | +``` |
3329 | + |
3330 | + |
3331 | +## Deploy with Kubernetes |
3332 | + |
3333 | +Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
3334 | + |
3335 | +Download |
3336 | +[prometheus.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/prometheus/plain/examples/config/prometheus.yml?h=2.33-22.04), [alerts.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/prometheus/plain/examples/config/alerts.yml?h=2.33-22.04) and |
3337 | +[prometheus-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/prometheus/plain/examples/prometheus-deployment.yml?h=2.33-22.04) and set `containers.prometheus.image` in `prometheus-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/ubuntu/prometheus:2.33-22.04_beta`), then: |
3338 | + |
3339 | +```sh |
3340 | +kubectl create configmap prometheus-config --from-file=prometheus=prometheus.yml --from-file=prometheus-alerts=alerts.yml |
3341 | +kubectl apply -f prometheus-deployment.yml |
3342 | +``` |
3343 | + |
3344 | +You will now be able to connect to the Prometheus on `http://localhost:30090`. |
3345 | + |
3346 | +## Bugs and feature requests |
3347 | + |
3348 | +If you find a bug in our image or want to request a specific feature, please file a bug here: |
3349 | + |
3350 | +[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
3351 | + |
3352 | +Please title the bug "`prometheus: <issue summary>`". Make sure to include the digest of the image you are using, from: |
3353 | + |
3354 | +```sh |
3355 | +docker images --no-trunc --quiet public.ecr.aws/ubuntu/prometheus:<tag> |
3356 | +``` |
3357 | + |
3358 | + |
3359 | diff --git a/docs/public.ecr.aws/lts/usage/redis.md b/docs/public.ecr.aws/lts/usage/redis.md |
3360 | new file mode 100644 |
3361 | index 0000000..fe20835 |
3362 | --- /dev/null |
3363 | +++ b/docs/public.ecr.aws/lts/usage/redis.md |
3364 | @@ -0,0 +1,87 @@ |
3365 | + |
3366 | + |
3367 | + |
3368 | + |
3369 | +## Docker CLI |
3370 | + |
3371 | +Launch this image locally: |
3372 | + |
3373 | +```sh |
3374 | +docker run -d --name redis-container -e TZ=UTC -p 30073:6379 -e REDIS_PASSWORD=mypassword public.ecr.aws/ubuntu/redis:6.0-21.10_beta |
3375 | +``` |
3376 | +Access your Redis server at `localhost:30073`. |
3377 | + |
3378 | +#### Parameters |
3379 | + |
3380 | +| Parameter | Description | |
3381 | +|---|---| |
3382 | +| `-e TZ=UTC` | Timezone. | |
3383 | +| `-e ALLOW_EMPTY_PASSWORD` | Set to `yes` to allow connections to `redis-server` without a password. **This setting is not recommended in production environments**. | |
3384 | +| `-e REDIS_PASSWORD` | Set the desired password to be used. | |
3385 | +| `-e REDIS_RANDOM_PASSWORD` | Set this variable to `1` if you would like the entrypoint script to generate a random password for you. You will be able to see the generated password in the logs (`docker logs`). | |
3386 | +| `-e REDIS_ALLOW_REMOTE_CONNECTIONS=yes` | Set to `no` to disallow remote connections to `redis-server` (i.e., make `redis-server` listen to `127.0.0.1` only). | |
3387 | +| `-e REDIS_EXTRA_FLAGS` | Specify extra flags to be passed to `redis-server` when initializing it. | |
3388 | +| `-p 30073:6379` | Expose redis on `localhost:30073`. | |
3389 | +| `-v /path/to/redis.conf:/etc/redis/redis.conf` | Local [configuration file](https://redis.io/topics/config) `redis.conf` (try [this example](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/redis/plain/examples/config/redis.conf?h=6.2-22.04)). **To enable TLS** mode, comment the `port 6379` line and uncomment the `# port 0` and `# tls-port 6379` lines. |
3390 | + | |
3391 | + |
3392 | + |
3393 | +#### Testing/Debugging |
3394 | + |
3395 | +To debug the container: |
3396 | + |
3397 | +```sh |
3398 | +docker logs -f redis-container |
3399 | +``` |
3400 | + |
3401 | +To get an interactive shell: |
3402 | + |
3403 | +```sh |
3404 | +docker exec -it redis-container /bin/bash |
3405 | +``` |
3406 | + |
3407 | +This image also includes the `redis-cli` client for interactive container use: |
3408 | + |
3409 | +```sh |
3410 | +$ docker network create redis-network |
3411 | +$ docker network connect redis-network redis-container |
3412 | +$ docker run -it --rm --network redis-network public.ecr.aws/ubuntu/redis:6.0-21.10_beta redis-cli -h redis-container |
3413 | +``` |
3414 | +Now you can: |
3415 | +``` |
3416 | +redis:6379> AUTH mypassword |
3417 | +OK |
3418 | +redis:6379> PING |
3419 | +PONG |
3420 | +redis:6379> |
3421 | + |
3422 | +``` |
3423 | + |
3424 | +## Deploy with Kubernetes |
3425 | + |
3426 | +Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
3427 | + |
3428 | +Download |
3429 | +[redis.conf](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/redis/plain/examples/config/redis.conf?h=6.2-22.04) and |
3430 | +[redis-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/redis/plain/examples/redis-deployment.yml?h=6.2-22.04) and set `containers.redis.image` in `redis-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/ubuntu/redis:6.0-21.10_beta`), then: |
3431 | + |
3432 | +```sh |
3433 | +kubectl create configmap redis-config --from-file=redis=redis.conf |
3434 | +kubectl apply -f redis-deployment.yml |
3435 | +``` |
3436 | + |
3437 | +You will now be able to connect to the Redis server on `localhost:30073`. |
3438 | + |
3439 | +## Bugs and feature requests |
3440 | + |
3441 | +If you find a bug in our image or want to request a specific feature, please file a bug here: |
3442 | + |
3443 | +[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
3444 | + |
3445 | +Please title the bug "`redis: <issue summary>`". Make sure to include the digest of the image you are using, from: |
3446 | + |
3447 | +```sh |
3448 | +docker images --no-trunc --quiet public.ecr.aws/ubuntu/redis:<tag> |
3449 | +``` |
3450 | + |
3451 | + |
3452 | diff --git a/docs/public.ecr.aws/lts/usage/squid.md b/docs/public.ecr.aws/lts/usage/squid.md |
3453 | new file mode 100644 |
3454 | index 0000000..f36124d |
3455 | --- /dev/null |
3456 | +++ b/docs/public.ecr.aws/lts/usage/squid.md |
3457 | @@ -0,0 +1,70 @@ |
3458 | + |
3459 | + |
3460 | + |
3461 | + |
3462 | + |
3463 | + |
3464 | +## Docker CLI |
3465 | + |
3466 | +Launch this image locally: |
3467 | + |
3468 | +```sh |
3469 | +docker run -d --name squid-container -e TZ=UTC -p 3128:3128 public.ecr.aws/ubuntu/squid:5.2-22.04_beta |
3470 | +``` |
3471 | +Access your Squid proxy at `localhost:3128`. |
3472 | + |
3473 | +#### Parameters |
3474 | + |
3475 | +| Parameter | Description | |
3476 | +|---|---| |
3477 | +| `-e TZ=UTC` | Timezone. | |
3478 | +| `-p 3128:3128` | Expose the proxy service | |
3479 | +| `-v /path/to/logs:/var/log/squid` | Volume to store squid logs | |
3480 | +| `-v /path/to/data:/var/spool/squid` | Volume to store the squid cache | |
3481 | +| `-v /path/to/main/config:/etc/squid/squid.conf` | Main squid configuration file | |
3482 | +| `-v /path/to/config/snippet:/etc/squid/conf.d/snippet.conf` | Configuration snippets included by squid.conf | |
3483 | + |
3484 | + |
3485 | +#### Testing/Debugging |
3486 | + |
3487 | +To debug the container: |
3488 | + |
3489 | +```sh |
3490 | +docker logs -f squid-container |
3491 | +``` |
3492 | + |
3493 | +To get an interactive shell: |
3494 | + |
3495 | +```sh |
3496 | +docker exec -it squid-container /bin/bash |
3497 | +``` |
3498 | + |
3499 | + |
3500 | +## Deploy with Kubernetes |
3501 | + |
3502 | +Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
3503 | + |
3504 | +Download |
3505 | +[squid.conf](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/squid/plain/examples/config/squid.conf?h=5.2-22.04) and |
3506 | +[squid-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/squid/plain/examples/squid-deployment.yml?h=5.2-22.04) and set `containers.squid.image` in `squid-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/ubuntu/squid:5.2-22.04_beta`), then: |
3507 | + |
3508 | +```sh |
3509 | +kubectl create configmap squid-config --from-file=squid=squid.conf |
3510 | +kubectl apply -f squid-deployment.yml |
3511 | +``` |
3512 | + |
3513 | +You can now access the squid proxy on port 3128 |
3514 | + |
3515 | +## Bugs and feature requests |
3516 | + |
3517 | +If you find a bug in our image or want to request a specific feature, please file a bug here: |
3518 | + |
3519 | +[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
3520 | + |
3521 | +Please title the bug "`squid: <issue summary>`". Make sure to include the digest of the image you are using, from: |
3522 | + |
3523 | +```sh |
3524 | +docker images --no-trunc --quiet public.ecr.aws/ubuntu/squid:<tag> |
3525 | +``` |
3526 | + |
3527 | + |
3528 | diff --git a/docs/public.ecr.aws/lts/usage/telegraf.md b/docs/public.ecr.aws/lts/usage/telegraf.md |
3529 | new file mode 100644 |
3530 | index 0000000..618bd5c |
3531 | --- /dev/null |
3532 | +++ b/docs/public.ecr.aws/lts/usage/telegraf.md |
3533 | @@ -0,0 +1,65 @@ |
3534 | + |
3535 | + |
3536 | + |
3537 | + |
3538 | +## Docker CLI |
3539 | + |
3540 | +Launch this image locally: |
3541 | + |
3542 | +```sh |
3543 | +docker run -d --name telegraf-container -e TZ=UTC -p 30273:9273 public.ecr.aws/ubuntu/telegraf:1.19-21.10_beta |
3544 | +``` |
3545 | +Access your Telegraf server at `localhost:30273`. |
3546 | + |
3547 | +#### Parameters |
3548 | + |
3549 | +| Parameter | Description | |
3550 | +|---|---| |
3551 | +| `-e TZ=UTC` | Timezone. | |
3552 | +| `-p 30273:9273` | Expose Telegraf on `localhost:30273`. | |
3553 | +| `-v /path/to/telegraf.conf:/etc/telegraf/telegraf.conf` | Local [configuration file](https://docs.influxdata.com/telegraf/) `telegraf.conf` (try [this example](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/telegraf/plain/examples/config/telegraf.conf?h=1.21-22.04)). | |
3554 | + |
3555 | + |
3556 | +#### Testing/Debugging |
3557 | + |
3558 | +To debug the container: |
3559 | + |
3560 | +```sh |
3561 | +docker logs -f telegraf-container |
3562 | +``` |
3563 | + |
3564 | +To get an interactive shell: |
3565 | + |
3566 | +```sh |
3567 | +docker exec -it telegraf-container /bin/bash |
3568 | +``` |
3569 | + |
3570 | + |
3571 | +## Deploy with Kubernetes |
3572 | + |
3573 | +Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
3574 | + |
3575 | +Download |
3576 | +[telegraf.conf](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/telegraf/plain/examples/config/telegraf.conf?h=1.21-22.04) and |
3577 | +[telegraf-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/telegraf/plain/examples/telegraf-deployment.yml?h=1.21-22.04) and set `containers.telegraf.image` in `telegraf-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/ubuntu/telegraf:1.19-21.10_beta`), then: |
3578 | + |
3579 | +```sh |
3580 | +kubectl create configmap telegraf-config --from-file=main-config=telegraf.conf |
3581 | +kubectl apply -f telegraf-deployment.yml |
3582 | +``` |
3583 | + |
3584 | +You will now be able to connect to the Telegraf server on `localhost:30073`. |
3585 | + |
3586 | +## Bugs and feature requests |
3587 | + |
3588 | +If you find a bug in our image or want to request a specific feature, please file a bug here: |
3589 | + |
3590 | +[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
3591 | + |
3592 | +Please title the bug "`telegraf: <issue summary>`". Make sure to include the digest of the image you are using, from: |
3593 | + |
3594 | +```sh |
3595 | +docker images --no-trunc --quiet public.ecr.aws/ubuntu/telegraf:<tag> |
3596 | +``` |
3597 | + |
3598 | + |
3599 | diff --git a/docs/public.ecr.aws/lts/usage/zookeeper.md b/docs/public.ecr.aws/lts/usage/zookeeper.md |
3600 | new file mode 100644 |
3601 | index 0000000..89f8c82 |
3602 | --- /dev/null |
3603 | +++ b/docs/public.ecr.aws/lts/usage/zookeeper.md |
3604 | @@ -0,0 +1,62 @@ |
3605 | + |
3606 | + |
3607 | + |
3608 | +## Docker CLI |
3609 | + |
3610 | +Launch this image locally: |
3611 | + |
3612 | +```sh |
3613 | +docker run -d --name zookeeper-container -e TZ=UTC -p 2181:2181 public.ecr.aws/ubuntu/zookeeper:3.1-22.04_beta |
3614 | +``` |
3615 | +Zookeeper instance available at `localhost:2181`. |
3616 | + |
3617 | +#### Parameters |
3618 | + |
3619 | +| Parameter | Description | |
3620 | +|---|---| |
3621 | +| `-e TZ=UTC` | Timezone. | |
3622 | +| `-p 2181:2181` | Expose Apache Zookeeper service on `localhost:2181`. | |
3623 | +| `-v /etc/kafka/zookeeper.properties` | Zookeeper config (file path within the container can also be set by overriding the CMD). | |
3624 | + |
3625 | + |
3626 | +#### Testing/Debugging |
3627 | + |
3628 | +To debug the container: |
3629 | + |
3630 | +```sh |
3631 | +docker logs -f zookeeper-container |
3632 | +``` |
3633 | + |
3634 | +To get an interactive shell: |
3635 | + |
3636 | +```sh |
3637 | +docker exec -it zookeeper-container /bin/bash |
3638 | +``` |
3639 | + |
3640 | + |
3641 | +## Deploy with Kubernetes |
3642 | + |
3643 | +Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
3644 | + |
3645 | +Download |
3646 | +[zookeeper-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/kafka/plain/examples/kafka-deployment.yml?h=3.1-22.04) and set `containers.zookeeper.image` in `zookeeper-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/ubuntu/zookeeper:3.1-22.04_beta`), then: |
3647 | + |
3648 | +```sh |
3649 | +kubectl apply -f zookeeper-deployment.yml |
3650 | +``` |
3651 | + |
3652 | +Apache Kafka will be available on the K8s cluster as a `kafka-service` Service. |
3653 | + |
3654 | +## Bugs and feature requests |
3655 | + |
3656 | +If you find a bug in our image or want to request a specific feature, please file a bug here: |
3657 | + |
3658 | +[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
3659 | + |
3660 | +Please title the bug "`zookeeper: <issue summary>`". Make sure to include the digest of the image you are using, from: |
3661 | + |
3662 | +```sh |
3663 | +docker images --no-trunc --quiet public.ecr.aws/ubuntu/zookeeper:<tag> |
3664 | +``` |
3665 | + |
3666 | + |
3667 | diff --git a/docs/public.ecr.aws/lts/zookeeper.md b/docs/public.ecr.aws/lts/zookeeper.md |
3668 | index 9a6c415..972d375 100644 |
3669 | --- a/docs/public.ecr.aws/lts/zookeeper.md |
3670 | +++ b/docs/public.ecr.aws/lts/zookeeper.md |
3671 | @@ -1,4 +1,4 @@ |
3672 | -# Apache ZooKeeper LTS Docker Image |
3673 | +# Apache ZooKeeper | Ubuntu |
3674 | **This repository has no LTS channel yet, please [get in touch](https://ubuntu.com/security/docker-images#get-in-touch) if you need one.** |
3675 | |
3676 | ## LTS Docker Image Portfolio |
3677 | @@ -18,73 +18,12 @@ Up to 10 years customer security maintenance `from canonical/zookeeper`. [Reques |
3678 | |
3679 | <!-- _Tags in italics are not available in public.ecr.aws/lts/zookeeper but are shown here for completeness._ --> |
3680 | |
3681 | -| Channel Tag | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
3682 | +| Channel Tags | ![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17) until | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) until | Currently | Architectures | |
3683 | |---|---|---|---|---| |
3684 | | _`track_risk`_ | |
3685 | |
3686 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
3687 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
3688 | |
3689 | ### Commercial use and Extended Security Maintenance channels |
3690 | -If your usage includes redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
3691 | - |
3692 | - |
3693 | -If your usage includes redistribution, please [contact Canonical](https://ubuntu.com/security/docker-images#get-in-touch). |
3694 | - |
3695 | -## Docker CLI |
3696 | - |
3697 | -Launch this image locally: |
3698 | - |
3699 | -```sh |
3700 | -docker run -d --name zookeeper-container -e TZ=UTC -p 2181:2181 public.ecr.aws/lts/zookeeper:latest |
3701 | -``` |
3702 | -Zookeeper instance available at `localhost:2181`. |
3703 | - |
3704 | -#### Parameters |
3705 | - |
3706 | -| Parameter | Description | |
3707 | -|---|---| |
3708 | -| `-e TZ=UTC` | Timezone. | |
3709 | -| `-p 2181:2181` | Expose Apache Zookeeper service on `localhost:2181`. | |
3710 | -| `-v /etc/kafka/zookeeper.properties` | Zookeeper config (file path within the container can also be set by overriding the CMD). | |
3711 | - |
3712 | - |
3713 | -#### Testing/Debugging |
3714 | - |
3715 | -To debug the container: |
3716 | - |
3717 | -```sh |
3718 | -docker logs -f zookeeper-container |
3719 | -``` |
3720 | - |
3721 | -To get an interactive shell: |
3722 | - |
3723 | -```sh |
3724 | -docker exec -it zookeeper-container /bin/bash |
3725 | -``` |
3726 | - |
3727 | - |
3728 | -## Deploy with Kubernetes |
3729 | - |
3730 | -Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
3731 | - |
3732 | -Download |
3733 | -[zookeeper-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/kafka/plain/examples/kafka-deployment.yml?h=3.1-22.04) and set `containers.zookeeper.image` in `zookeeper-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/lts/zookeeper:latest`), then: |
3734 | - |
3735 | -```sh |
3736 | -kubectl apply -f zookeeper-deployment.yml |
3737 | -``` |
3738 | - |
3739 | -Apache Kafka will be available on the K8s cluster as a `kafka-service` Service. |
3740 | - |
3741 | -## Bugs and feature requests |
3742 | - |
3743 | -If you find a bug in our image or want to request a specific feature, please file a bug here: |
3744 | - |
3745 | -[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
3746 | - |
3747 | -Please title the bug "`zookeeper: <issue summary>`". Make sure to include the digest of the image you are using, from: |
3748 | - |
3749 | -```sh |
3750 | -docker images --no-trunc --quiet public.ecr.aws/lts/zookeeper:<tag> |
3751 | -``` |
3752 | +If your usage includes redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
3753 | |
3754 | diff --git a/docs/public.ecr.aws/ubuntu/apache2.md b/docs/public.ecr.aws/ubuntu/apache2.md |
3755 | index f247eb4..0f701c3 100644 |
3756 | --- a/docs/public.ecr.aws/ubuntu/apache2.md |
3757 | +++ b/docs/public.ecr.aws/ubuntu/apache2.md |
3758 | @@ -15,26 +15,26 @@ Up to 5 years free security maintenance [from public.ecr.aws/lts/apache2](https: |
3759 | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) |
3760 | Up to 10 years customer security maintenance `from canonical/apache2`. [Request access](https://ubuntu.com/security/docker-images#get-in-touch). |
3761 | |
3762 | -| Channel Tag | | | Currently | Architectures | |
3763 | +| Channel Tags | | | Currently | Architectures | |
3764 | |---|---|---|---|---| |
3765 | - | _**`2.4-22.04_beta`** _ | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/apache2) | [![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17)](https://gallery.ecr.aws/lts/apache2) | Apache2 2.4 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
3766 | - | `2.4-21.10_beta` | [](https://gallery.ecr.aws/lts/apache2) | [](https://gallery.ecr.aws/lts/apache2) | Apache2 2.4.48 on Ubuntu 21.10 | `amd64`, `arm64`, `ppc64el`, `s390x` | |
3767 | + | **`2.4-22.04_beta`** | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/apache2) | [![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17)](https://gallery.ecr.aws/lts/apache2) | Apache2 2.4 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
3768 | + | `2.4-21.10_beta` | [-](https://gallery.ecr.aws/lts/apache2) | [-](https://gallery.ecr.aws/lts/apache2) | Apache2 2.4.48 on Ubuntu 21.10 | `amd64`, `arm64`, `ppc64el`, `s390x` | |
3769 | | _`track_risk`_ | |
3770 | |
3771 | -_The following tags are not available in public.ecr.aws/ubuntu/apache2 but are shown here for completeness:_ |
3772 | +_The following tags might not be available in public.ecr.aws/ubuntu/apache2 but are shown here for completeness:_ |
3773 | |
3774 | -| Channel Tag | | | Currently | Architectures | |
3775 | +| Channel Tags | | | Currently | Architectures | |
3776 | |---|---|---|---|---| |
3777 | - | _**`2.4-22.04_beta`** _ | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/apache2) | [![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17)](https://gallery.ecr.aws/lts/apache2) | Apache2 2.4 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
3778 | - | _`2.4-20.04_beta` _ | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/apache2) | [![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17)](https://gallery.ecr.aws/lts/apache2) | Apache2 2.4.41 on Ubuntu 20.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
3779 | + | _**`2.4-22.04_beta`** _ | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/apache2) | [![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17)](https://gallery.ecr.aws/lts/apache2) | Apache2 2.4 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
3780 | + | _`2.4-20.04_beta` _ | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/apache2) | [![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17)](https://gallery.ecr.aws/lts/apache2) | Apache2 2.4.41 on Ubuntu 20.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
3781 | | _`track_risk`_ | |
3782 | |
3783 | |
3784 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
3785 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
3786 | |
3787 | |
3788 | ### Commercial use and Extended Security Maintenance channels |
3789 | -If your usage includes commercial redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
3790 | +If your usage includes commercial redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
3791 | |
3792 | ## Deprecated channels & tags |
3793 | These channels (tags) are not updated anymore. Please upgrade to newer channels, or [reach out](https://ubuntu.com/security/docker-images#get-in-touch) if you can't upgrade. |
3794 | @@ -44,66 +44,3 @@ These channels (tags) are not updated anymore. Please upgrade to newer channels, |
3795 | | ~~2.4-21.04~~ | Apache2 2.4.46 on Ubuntu 21.04 | 01/2022 | 2.4-21.10_beta | |
3796 | | _`track`_ | |
3797 | |
3798 | - |
3799 | -## Docker CLI |
3800 | - |
3801 | -Launch this image locally: |
3802 | - |
3803 | -```sh |
3804 | -docker run -d --name apache2-container -e TZ=UTC -p 8080:80 public.ecr.aws/ubuntu/apache2:2.4-21.04 |
3805 | -``` |
3806 | -Access your Apache2 server at `http://localhost:8080`. |
3807 | - |
3808 | -#### Parameters |
3809 | - |
3810 | -| Parameter | Description | |
3811 | -|---|---| |
3812 | -| `-e TZ=UTC` | Timezone. | |
3813 | -| `-p 8080:80` | Expose Apache2 on `localhost:8080`. | |
3814 | -| `-v /local/path/to/website:/var/www/html` | Mount and serve a local website. | |
3815 | -| `-v /path/to/apache2.conf:/etc/apache2/apache2.conf` | Local [configuration file](https://httpd.apache.org/docs/2.4/) `apache2.conf` (try [this example](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/apache2/plain/examples/config/apache2.conf?h=2.4-22.04)). | |
3816 | - |
3817 | - |
3818 | -#### Testing/Debugging |
3819 | - |
3820 | -To debug the container: |
3821 | - |
3822 | -```sh |
3823 | -docker logs -f apache2-container |
3824 | -``` |
3825 | - |
3826 | -To get an interactive shell: |
3827 | - |
3828 | -```sh |
3829 | -docker exec -it apache2-container /bin/bash |
3830 | -``` |
3831 | - |
3832 | - |
3833 | -## Deploy with Kubernetes |
3834 | - |
3835 | -Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
3836 | - |
3837 | -Download |
3838 | -[apache2.conf](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/apache2/plain/examples/config/apache2.conf?h=2.4-22.04), [index.html](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/apache2/plain/examples/config/html/index.html?h=2.4-22.04) and |
3839 | -[apache2-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/apache2/plain/examples/apache2-deployment.yml?h=2.4-22.04) and set `containers.apache2.image` in `apache2-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/ubuntu/apache2:2.4-21.04`), then: |
3840 | - |
3841 | -```sh |
3842 | -kubectl create configmap apache2-config --from-file=apache2=apache2.conf --from-file=apache2-site=index.html |
3843 | -kubectl apply -f apache2-deployment.yml |
3844 | -``` |
3845 | - |
3846 | -You will now be able to connect to the apache2 server on `http://localhost:30080`. |
3847 | - |
3848 | -## Bugs and feature requests |
3849 | - |
3850 | -If you find a bug in our image or want to request a specific feature, please file a bug here: |
3851 | - |
3852 | -[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
3853 | - |
3854 | -Please title the bug "`apache2: <issue summary>`". Make sure to include the digest of the image you are using, from: |
3855 | - |
3856 | -```sh |
3857 | -docker images --no-trunc --quiet public.ecr.aws/ubuntu/apache2:<tag> |
3858 | -``` |
3859 | - |
3860 | - |
3861 | diff --git a/docs/public.ecr.aws/ubuntu/bind9.md b/docs/public.ecr.aws/ubuntu/bind9.md |
3862 | index 3533670..d82f16c 100644 |
3863 | --- a/docs/public.ecr.aws/ubuntu/bind9.md |
3864 | +++ b/docs/public.ecr.aws/ubuntu/bind9.md |
3865 | @@ -15,26 +15,26 @@ Up to 5 years free security maintenance [from public.ecr.aws/lts/bind9](https:// |
3866 | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) |
3867 | Up to 10 years customer security maintenance `from canonical/bind9`. [Request access](https://ubuntu.com/security/docker-images#get-in-touch). |
3868 | |
3869 | -| Channel Tag | | | Currently | Architectures | |
3870 | +| Channel Tags | | | Currently | Architectures | |
3871 | |---|---|---|---|---| |
3872 | - | _**`9.18-22.04_beta`** _ | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/bind9) | [![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17)](https://gallery.ecr.aws/lts/bind9) | Bind9 9.18 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
3873 | - | `9.16-21.10_beta` | [](https://gallery.ecr.aws/lts/bind9) | [](https://gallery.ecr.aws/lts/bind9) | Bind9 9.16.15 on Ubuntu 21.10 | `amd64`, `arm64`, `ppc64el`, `s390x` | |
3874 | + | **`9.18-22.04_beta`** | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/bind9) | [![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17)](https://gallery.ecr.aws/lts/bind9) | Bind9 9.18 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
3875 | + | `9.16-21.10_beta` | [-](https://gallery.ecr.aws/lts/bind9) | [-](https://gallery.ecr.aws/lts/bind9) | Bind9 9.16.15 on Ubuntu 21.10 | `amd64`, `arm64`, `ppc64el`, `s390x` | |
3876 | | _`track_risk`_ | |
3877 | |
3878 | -_The following tags are not available in public.ecr.aws/ubuntu/bind9 but are shown here for completeness:_ |
3879 | +_The following tags might not be available in public.ecr.aws/ubuntu/bind9 but are shown here for completeness:_ |
3880 | |
3881 | -| Channel Tag | | | Currently | Architectures | |
3882 | +| Channel Tags | | | Currently | Architectures | |
3883 | |---|---|---|---|---| |
3884 | - | _**`9.18-22.04_beta`** _ | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/bind9) | [![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17)](https://gallery.ecr.aws/lts/bind9) | Bind9 9.18 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
3885 | - | _`9.16-20.04_beta` _ | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/bind9) | [![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17)](https://gallery.ecr.aws/lts/bind9) | Bind9 9.16.1 on Ubuntu 20.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
3886 | + | _**`9.18-22.04_beta`** _ | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/bind9) | [![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17)](https://gallery.ecr.aws/lts/bind9) | Bind9 9.18 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
3887 | + | _`9.16-20.04_beta` _ | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/bind9) | [![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17)](https://gallery.ecr.aws/lts/bind9) | Bind9 9.16.1 on Ubuntu 20.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
3888 | | _`track_risk`_ | |
3889 | |
3890 | |
3891 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
3892 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
3893 | |
3894 | |
3895 | ### Commercial use and Extended Security Maintenance channels |
3896 | -If your usage includes commercial redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
3897 | +If your usage includes commercial redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
3898 | |
3899 | ## Deprecated channels & tags |
3900 | These channels (tags) are not updated anymore. Please upgrade to newer channels, or [reach out](https://ubuntu.com/security/docker-images#get-in-touch) if you can't upgrade. |
3901 | @@ -43,66 +43,3 @@ These channels (tags) are not updated anymore. Please upgrade to newer channels, |
3902 | |---|---|---|---| |
3903 | | _`track`_ | |
3904 | |
3905 | - |
3906 | -## Docker CLI |
3907 | - |
3908 | -Launch this image locally: |
3909 | - |
3910 | -```sh |
3911 | -docker run -d --name bind9-container -e TZ=UTC -p 30053:53 public.ecr.aws/ubuntu/bind9:9.18-22.04_beta |
3912 | -``` |
3913 | -Access your Bind9 server at `localhost:30053` |
3914 | - |
3915 | -#### Parameters |
3916 | - |
3917 | -| Parameter | Description | |
3918 | -|---|---| |
3919 | -| `-e TZ=UTC` | Timezone. | |
3920 | -| `-p 30053:53` | Expose bind9 on `localhost:30053`. | |
3921 | -| `-e BIND9_USER=bind` | The user which will start the `named` process. | |
3922 | -| `-v /path/to/bind/configuration:/etc/bind/named.conf` | Local [configuration file](https://bind9.readthedocs.io/en/latest/reference.html) `named.conf` (try [this example](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/bind9/plain/examples/caching-nameserver/named.conf.options?h=9.18-22.04)). | |
3923 | -| `-v /path/to/cached/data:/var/cache/bind` | Location where locally cached data can be dumped. | |
3924 | -| `-v /path/to/resource/records:/var/lib/bind` | Location of Resource Records defining various domain information. | |
3925 | - |
3926 | - |
3927 | -#### Testing/Debugging |
3928 | - |
3929 | -To debug the container: |
3930 | - |
3931 | -```sh |
3932 | -docker logs -f bind9-container |
3933 | -``` |
3934 | - |
3935 | -To get an interactive shell: |
3936 | - |
3937 | -```sh |
3938 | -docker exec -it bind9-container /bin/bash |
3939 | -``` |
3940 | - |
3941 | - |
3942 | -## Deploy with Kubernetes |
3943 | - |
3944 | -Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
3945 | - |
3946 | -Download |
3947 | -[bind9-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/bind9/plain/examples/bind9-deployment.yml?h=9.18-22.04) and set `containers.bind9.image` in `bind9-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/ubuntu/bind9:9.18-22.04_beta`), then: |
3948 | - |
3949 | -```sh |
3950 | -kubectl apply -f bind9-deployment.yml |
3951 | -``` |
3952 | - |
3953 | -You will now be able to connect to the Bind9 server on localhost:30053`. |
3954 | - |
3955 | -## Bugs and feature requests |
3956 | - |
3957 | -If you find a bug in our image or want to request a specific feature, please file a bug here: |
3958 | - |
3959 | -[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
3960 | - |
3961 | -Please title the bug "`bind9: <issue summary>`". Make sure to include the digest of the image you are using, from: |
3962 | - |
3963 | -```sh |
3964 | -docker images --no-trunc --quiet public.ecr.aws/ubuntu/bind9:<tag> |
3965 | -``` |
3966 | - |
3967 | - |
3968 | diff --git a/docs/public.ecr.aws/ubuntu/cassandra.md b/docs/public.ecr.aws/ubuntu/cassandra.md |
3969 | index c029246..c5dc089 100644 |
3970 | --- a/docs/public.ecr.aws/ubuntu/cassandra.md |
3971 | +++ b/docs/public.ecr.aws/ubuntu/cassandra.md |
3972 | @@ -25,17 +25,17 @@ Up to 5 years free security maintenance. [Request access](https://ubuntu.com/sec |
3973 | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) |
3974 | Up to 10 years customer security maintenance `from canonical/cassandra`. [Request access](https://ubuntu.com/security/docker-images#get-in-touch). |
3975 | |
3976 | -| Channel Tag | | | Currently | Architectures | |
3977 | +| Channel Tags | | | Currently | Architectures | |
3978 | |---|---|---|---|---| |
3979 | - | **`4.0-22.04_beta`** | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/cassandra) | [](https://gallery.ecr.aws/lts/cassandra) | Apache Cassandra 4.0 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
3980 | + | **`4.0-22.04_beta`** | [-](https://gallery.ecr.aws/lts/cassandra) | [-](https://gallery.ecr.aws/lts/cassandra) | Apache Cassandra 4.0 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
3981 | | _`track_risk`_ | |
3982 | |
3983 | |
3984 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
3985 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
3986 | |
3987 | |
3988 | ### Commercial use and Extended Security Maintenance channels |
3989 | -If your usage includes commercial redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). **This repository has no LTS channel yet, please get in touch if you need one.** |
3990 | +If your usage includes commercial redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). **This repository has no LTS channel yet, please get in touch if you need one.** |
3991 | |
3992 | ## Deprecated channels & tags |
3993 | These channels (tags) are not updated anymore. Please upgrade to newer channels, or [reach out](https://ubuntu.com/security/docker-images#get-in-touch) if you can't upgrade. |
3994 | @@ -47,68 +47,3 @@ These channels (tags) are not updated anymore. Please upgrade to newer channels, |
3995 | | ~~4.0-20.04~~ | Apache Cassandra 4.0 on Ubuntu 20.04 LTS | 01/2021 | ~~4.0-21.04~~ | |
3996 | | _`track`_ | |
3997 | |
3998 | - |
3999 | -## Docker CLI |
4000 | - |
4001 | -Launch this image locally: |
4002 | - |
4003 | -```sh |
4004 | -docker run -d --name cassandra-container -e TZ=UTC -p 7000:7000 -p 7001:7001 -p 7199:7199 -p 9042:9042 -p 9160:9160 public.ecr.aws/ubuntu/cassandra:4.0-21.10 |
4005 | -``` |
4006 | -Access your Cassandra server with `cqlsh localhost 9042`. |
4007 | - |
4008 | -#### Parameters |
4009 | - |
4010 | -| Parameter | Description | |
4011 | -|---|---| |
4012 | -| `-e TZ=UTC` | Timezone. | |
4013 | -| `-p 7000:7000` | Expose itra-node communication | |
4014 | -| `-p 7001:7001` | Expose TLS itra-node communication | |
4015 | -| `-p 7199:7199` | Expose JMX | |
4016 | -| `-p 9042:9042` | Expose CQL | |
4017 | -| `-p 9160:9160` | Expose thrift service | |
4018 | -| `-v /local/path/to/data:/var/lib/cassandra` | Volume to store Cassandra data | |
4019 | -| `-v /path/to/logs:/var/log/cassandra` | Volume to store cassandra logs | |
4020 | - |
4021 | - |
4022 | -#### Testing/Debugging |
4023 | - |
4024 | -To debug the container: |
4025 | - |
4026 | -```sh |
4027 | -docker logs -f cassandra-container |
4028 | -``` |
4029 | - |
4030 | -To get an interactive shell: |
4031 | - |
4032 | -```sh |
4033 | -docker exec -it cassandra-container /bin/bash |
4034 | -``` |
4035 | - |
4036 | - |
4037 | -## Deploy with Kubernetes |
4038 | - |
4039 | -Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
4040 | - |
4041 | -Download |
4042 | -[cassandra-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/cassandra/plain/examples/cassandra-deployment.yml?h=4.0-22.04) and set `containers.cassandra.image` in `cassandra-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/ubuntu/cassandra:4.0-21.10`), then: |
4043 | - |
4044 | -```sh |
4045 | -kubectl apply -f cassandra-deployment.yml |
4046 | -``` |
4047 | - |
4048 | -You can now access the cassandra server on port 9042 (e.g., cqlsh localhost 9042) |
4049 | - |
4050 | -## Bugs and feature requests |
4051 | - |
4052 | -If you find a bug in our image or want to request a specific feature, please file a bug here: |
4053 | - |
4054 | -[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
4055 | - |
4056 | -Please title the bug "`cassandra: <issue summary>`". Make sure to include the digest of the image you are using, from: |
4057 | - |
4058 | -```sh |
4059 | -docker images --no-trunc --quiet public.ecr.aws/ubuntu/cassandra:<tag> |
4060 | -``` |
4061 | - |
4062 | - |
4063 | diff --git a/docs/public.ecr.aws/ubuntu/cortex.md b/docs/public.ecr.aws/ubuntu/cortex.md |
4064 | index 2fac18a..9ad439c 100644 |
4065 | --- a/docs/public.ecr.aws/ubuntu/cortex.md |
4066 | +++ b/docs/public.ecr.aws/ubuntu/cortex.md |
4067 | @@ -21,17 +21,17 @@ Up to 5 years free security maintenance. [Request access](https://ubuntu.com/sec |
4068 | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) |
4069 | Up to 10 years customer security maintenance `from canonical/cortex`. [Request access](https://ubuntu.com/security/docker-images#get-in-touch). |
4070 | |
4071 | -| Channel Tag | | | Currently | Architectures | |
4072 | +| Channel Tags | | | Currently | Architectures | |
4073 | |---|---|---|---|---| |
4074 | - | **`1.11-22.04_beta`** | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/cortex) | [](https://gallery.ecr.aws/lts/cortex) | Cortex 1.11 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
4075 | + | **`1.11-22.04_beta`** | [-](https://gallery.ecr.aws/lts/cortex) | [-](https://gallery.ecr.aws/lts/cortex) | Cortex 1.11 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
4076 | | _`track_risk`_ | |
4077 | |
4078 | |
4079 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
4080 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
4081 | |
4082 | |
4083 | ### Commercial use and Extended Security Maintenance channels |
4084 | -If your usage includes commercial redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). **This repository has no LTS channel yet, please get in touch if you need one.** |
4085 | +If your usage includes commercial redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). **This repository has no LTS channel yet, please get in touch if you need one.** |
4086 | |
4087 | ## Deprecated channels & tags |
4088 | These channels (tags) are not updated anymore. Please upgrade to newer channels, or [reach out](https://ubuntu.com/security/docker-images#get-in-touch) if you can't upgrade. |
4089 | @@ -43,65 +43,3 @@ These channels (tags) are not updated anymore. Please upgrade to newer channels, |
4090 | | ~~1.4-20.04~~ | Cortex 1.4.0 on Ubuntu 20.04 LTS | 01/2021 | ~~1.7-21.04~~ | |
4091 | | _`track`_ | |
4092 | |
4093 | - |
4094 | -## Docker CLI |
4095 | - |
4096 | -Launch this image locally: |
4097 | - |
4098 | -```sh |
4099 | -docker run -d --name cortex-container -e TZ=UTC -p 32709:9009 public.ecr.aws/ubuntu/cortex:1.10-21.10 |
4100 | -``` |
4101 | -Access your Cortex server at `http://localhost:32709`. |
4102 | - |
4103 | -#### Parameters |
4104 | - |
4105 | -| Parameter | Description | |
4106 | -|---|---| |
4107 | -| `-e TZ=UTC` | Timezone. | |
4108 | -| `-p 32709:9009` | Expose Cortex on `localhost:32709`. | |
4109 | -| `-v /my/local/cortex.yaml:/etc/cortex/cortex.yaml` | Local [configuration file](https://cortexmetrics.io/docs/configuration/) `cortex.yaml` (try [this example](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/cortex/plain/oci/examples/config/cortex.yaml?h=1.11-22.04)). | |
4110 | - |
4111 | - |
4112 | -#### Testing/Debugging |
4113 | - |
4114 | -To debug the container: |
4115 | - |
4116 | -```sh |
4117 | -docker logs -f cortex-container |
4118 | -``` |
4119 | - |
4120 | -To get an interactive shell: |
4121 | - |
4122 | -```sh |
4123 | -docker exec -it cortex-container /bin/bash |
4124 | -``` |
4125 | - |
4126 | - |
4127 | -## Deploy with Kubernetes |
4128 | - |
4129 | -Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
4130 | - |
4131 | -Download |
4132 | -[cortex.yaml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/cortex/plain/oci/examples/config/cortex.yaml?h=1.11-22.04) and |
4133 | -[cortex-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/cortex/plain/oci/examples/cortex-deployment.yml?h=1.11-22.04) and set `containers.cortex.image` in `cortex-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/ubuntu/cortex:1.10-21.10`), then: |
4134 | - |
4135 | -```sh |
4136 | -kubectl create configmap cortex-config --from-file=main-config=cortex.yaml |
4137 | -kubectl apply -f cortex-deployment.yml |
4138 | -``` |
4139 | - |
4140 | -You will now be able to connect to the Cortex server on `localhost:32709`. |
4141 | - |
4142 | -## Bugs and feature requests |
4143 | - |
4144 | -If you find a bug in our image or want to request a specific feature, please file a bug here: |
4145 | - |
4146 | -[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
4147 | - |
4148 | -Please title the bug "`cortex: <issue summary>`". Make sure to include the digest of the image you are using, from: |
4149 | - |
4150 | -```sh |
4151 | -docker images --no-trunc --quiet public.ecr.aws/ubuntu/cortex:<tag> |
4152 | -``` |
4153 | - |
4154 | - |
4155 | diff --git a/docs/public.ecr.aws/ubuntu/grafana.md b/docs/public.ecr.aws/ubuntu/grafana.md |
4156 | index 1108fcb..48aed51 100644 |
4157 | --- a/docs/public.ecr.aws/ubuntu/grafana.md |
4158 | +++ b/docs/public.ecr.aws/ubuntu/grafana.md |
4159 | @@ -14,17 +14,17 @@ Up to 5 years free security maintenance. [Request access](https://ubuntu.com/sec |
4160 | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) |
4161 | Up to 10 years customer security maintenance `from canonical/grafana`. [Request access](https://ubuntu.com/security/docker-images#get-in-touch). |
4162 | |
4163 | -| Channel Tag | | | Currently | Architectures | |
4164 | +| Channel Tags | | | Currently | Architectures | |
4165 | |---|---|---|---|---| |
4166 | - | **`8.2-22.04_beta`** | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/grafana) | [](https://gallery.ecr.aws/lts/grafana) | Grafana™ software 8.2 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
4167 | + | **`8.2-22.04_beta`** | [-](https://gallery.ecr.aws/lts/grafana) | [-](https://gallery.ecr.aws/lts/grafana) | Grafana™ software 8.2 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
4168 | | _`track_risk`_ | |
4169 | |
4170 | |
4171 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
4172 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
4173 | |
4174 | |
4175 | ### Commercial use and Extended Security Maintenance channels |
4176 | -If your usage includes commercial redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). **This repository has no LTS channel yet, please get in touch if you need one.** |
4177 | +If your usage includes commercial redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). **This repository has no LTS channel yet, please get in touch if you need one.** |
4178 | |
4179 | ## Deprecated channels & tags |
4180 | These channels (tags) are not updated anymore. Please upgrade to newer channels, or [reach out](https://ubuntu.com/security/docker-images#get-in-touch) if you can't upgrade. |
4181 | @@ -36,66 +36,3 @@ These channels (tags) are not updated anymore. Please upgrade to newer channels, |
4182 | | ~~7.2-20.04~~ | Grafana™ software 7.2.0 on Ubuntu 20.04 LTS | 01/2021 | ~~7.4-21.04~~ | |
4183 | | _`track`_ | |
4184 | |
4185 | - |
4186 | -## Docker CLI |
4187 | - |
4188 | -Launch this image locally: |
4189 | - |
4190 | -```sh |
4191 | -docker run -d --name grafana-container -e TZ=UTC -p 30000:3000 public.ecr.aws/ubuntu/grafana:8.1-21.10 |
4192 | -``` |
4193 | -Access your Grafana server at `localhost:30000`. |
4194 | - |
4195 | -#### Parameters |
4196 | - |
4197 | -| Parameter | Description | |
4198 | -|---|---| |
4199 | -| `-e TZ=UTC` | Timezone. | |
4200 | -| `-p 30000:3000` | Expose Grafana on `localhost:30000`. | |
4201 | -| `-v /path/to/grafana/provisioning/files/:/etc/grafana/provisioning/` | Pass a directory with files to provision a Grafana `datasource` and `dashboard` (see [documentation](https://grafana.com/docs/grafana/latest/administration/provisioning/)). | |
4202 | -| `-v /path/to/persisted/data:/var/lib/grafana` | Persist data with a voulme instead of initializing a new database for each newly launched container. | |
4203 | - |
4204 | - |
4205 | -#### Testing/Debugging |
4206 | - |
4207 | -To debug the container: |
4208 | - |
4209 | -```sh |
4210 | -docker logs -f grafana-container |
4211 | -``` |
4212 | - |
4213 | -To get an interactive shell: |
4214 | - |
4215 | -```sh |
4216 | -docker exec -it grafana-container /bin/bash |
4217 | -``` |
4218 | - |
4219 | - |
4220 | -## Deploy with Kubernetes |
4221 | - |
4222 | -Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
4223 | - |
4224 | -Download |
4225 | -[datasource.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/grafana/plain/examples/config/datasource.yml?h=8.2-22.04), [dashboard.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/grafana/plain/examples/config/dashboard.yml?h=8.2-22.04), [system-stats-dashboard.json](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/grafana/plain/examples/config/system-stats-dashboard.json?h=8.2-22.04) and |
4226 | -[grafana-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/grafana/plain/examples/grafana-deployment.yml?h=8.2-22.04) and set `containers.grafana.image` in `grafana-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/ubuntu/grafana:8.1-21.10`), then: |
4227 | - |
4228 | -```sh |
4229 | -kubectl create configmap grafana-config --from-file=grafana-datasource=datasource.yml --from-file=grafana-dashboard-definition=dashboard.yml --from-file=grafana-dashboard=system-stats-dashboard.json |
4230 | -kubectl apply -f grafana-deployment.yml |
4231 | -``` |
4232 | - |
4233 | -You will now be able to connect to the Grafana on `http://localhost:30000`. |
4234 | - |
4235 | -## Bugs and feature requests |
4236 | - |
4237 | -If you find a bug in our image or want to request a specific feature, please file a bug here: |
4238 | - |
4239 | -[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
4240 | - |
4241 | -Please title the bug "`grafana: <issue summary>`". Make sure to include the digest of the image you are using, from: |
4242 | - |
4243 | -```sh |
4244 | -docker images --no-trunc --quiet public.ecr.aws/ubuntu/grafana:<tag> |
4245 | -``` |
4246 | - |
4247 | - |
4248 | diff --git a/docs/public.ecr.aws/ubuntu/kafka.md b/docs/public.ecr.aws/ubuntu/kafka.md |
4249 | index 59a4554..83042f1 100644 |
4250 | --- a/docs/public.ecr.aws/ubuntu/kafka.md |
4251 | +++ b/docs/public.ecr.aws/ubuntu/kafka.md |
4252 | @@ -14,17 +14,17 @@ Up to 5 years free security maintenance. [Request access](https://ubuntu.com/sec |
4253 | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) |
4254 | Up to 10 years customer security maintenance `from canonical/kafka`. [Request access](https://ubuntu.com/security/docker-images#get-in-touch). |
4255 | |
4256 | -| Channel Tag | | | Currently | Architectures | |
4257 | +| Channel Tags | | | Currently | Architectures | |
4258 | |---|---|---|---|---| |
4259 | - | **`3.1-22.04_beta`** | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/kafka) | [](https://gallery.ecr.aws/lts/kafka) | Apache Kafka 3.1.0 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
4260 | + | **`3.1-22.04_beta`** | [-](https://gallery.ecr.aws/lts/kafka) | [-](https://gallery.ecr.aws/lts/kafka) | Apache Kafka 3.1.0 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
4261 | | _`track_risk`_ | |
4262 | |
4263 | |
4264 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
4265 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
4266 | |
4267 | |
4268 | ### Commercial use and Extended Security Maintenance channels |
4269 | -If your usage includes commercial redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). **This repository has no LTS channel yet, please get in touch if you need one.** |
4270 | +If your usage includes commercial redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). **This repository has no LTS channel yet, please get in touch if you need one.** |
4271 | |
4272 | ## Deprecated channels & tags |
4273 | These channels (tags) are not updated anymore. Please upgrade to newer channels, or [reach out](https://ubuntu.com/security/docker-images#get-in-touch) if you can't upgrade. |
4274 | @@ -33,68 +33,3 @@ These channels (tags) are not updated anymore. Please upgrade to newer channels, |
4275 | |---|---|---|---| |
4276 | | _`track`_ | |
4277 | |
4278 | - |
4279 | -## Docker CLI |
4280 | - |
4281 | -Launch this image locally: |
4282 | - |
4283 | -```sh |
4284 | -docker run -d --name kafka-container -e TZ=UTC -p 9092:9092 -e ZOOKEEPER_HOST=host.docker.internal public.ecr.aws/ubuntu/kafka:3.1-22.04_beta |
4285 | -``` |
4286 | -Apache Kafka service is now exposed at `localhost:9092` (**You first need to run a Zookeeper instance**: `docker run -d -p 2181:2181 ubuntu/zookeeper:edge`). |
4287 | - |
4288 | - |
4289 | -#### Parameters |
4290 | - |
4291 | -| Parameter | Description | |
4292 | -|---|---| |
4293 | -| `-e TZ=UTC` | Timezone. | |
4294 | -| `-e ZOOKEEPER_HOST=172.17.0.1` | Hostname for the related Zookeeper instance (default value is set to the default IP for the Docker host (host.docker.internal)). | |
4295 | -| `-e ZOOKEEPER_PORT=2181` | Port for the related Zookeeper instance. | |
4296 | -| `-p 9092:9092` | Expose Apache Kafka service on `localhost:9092`. | |
4297 | -| `-p 2181:2181` | Expose Apache Zookeeper service on `localhost:2181`. | |
4298 | -| `CMD kafka-server-start.sh /etc/kafka/server.properties --override zookeeper.connect=host.docker.internal:2181` | Start a Kafka instance, connecting to the Zookeeper instance accessible at `host.docker.internal:2181` from within the Kafka instance container. | |
4299 | -| `CMD zookeeper-server-start.sh /etc/kafka/zookeeper.properties` | Start a Zookeeper instance. | |
4300 | - |
4301 | - |
4302 | -#### Testing/Debugging |
4303 | - |
4304 | -To debug the container: |
4305 | - |
4306 | -```sh |
4307 | -docker logs -f kafka-container |
4308 | -``` |
4309 | - |
4310 | -To get an interactive shell: |
4311 | - |
4312 | -```sh |
4313 | -docker exec -it kafka-container /bin/bash |
4314 | -``` |
4315 | - |
4316 | - |
4317 | -## Deploy with Kubernetes |
4318 | - |
4319 | -Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
4320 | - |
4321 | -Download |
4322 | -[kafka-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/kafka/plain/examples/kafka-deployment.yml?h=3.1-22.04) and set `containers.kafka.image` in `kafka-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/ubuntu/kafka:3.1-22.04_beta`), then: |
4323 | - |
4324 | -```sh |
4325 | -kubectl apply -f kafka-deployment.yml |
4326 | -``` |
4327 | - |
4328 | -Apache Kafka will be available on the K8s cluster as a `kafka-service` Service. |
4329 | - |
4330 | -## Bugs and feature requests |
4331 | - |
4332 | -If you find a bug in our image or want to request a specific feature, please file a bug here: |
4333 | - |
4334 | -[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
4335 | - |
4336 | -Please title the bug "`kafka: <issue summary>`". Make sure to include the digest of the image you are using, from: |
4337 | - |
4338 | -```sh |
4339 | -docker images --no-trunc --quiet public.ecr.aws/ubuntu/kafka:<tag> |
4340 | -``` |
4341 | - |
4342 | - |
4343 | diff --git a/docs/public.ecr.aws/ubuntu/loki.md b/docs/public.ecr.aws/ubuntu/loki.md |
4344 | index 4346232..cf98aef 100644 |
4345 | --- a/docs/public.ecr.aws/ubuntu/loki.md |
4346 | +++ b/docs/public.ecr.aws/ubuntu/loki.md |
4347 | @@ -14,17 +14,17 @@ Up to 5 years free security maintenance. [Request access](https://ubuntu.com/sec |
4348 | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) |
4349 | Up to 10 years customer security maintenance `from canonical/loki`. [Request access](https://ubuntu.com/security/docker-images#get-in-touch). |
4350 | |
4351 | -| Channel Tag | | | Currently | Architectures | |
4352 | +| Channel Tags | | | Currently | Architectures | |
4353 | |---|---|---|---|---| |
4354 | - | **`2.4-22.04_beta`** | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/loki) | [](https://gallery.ecr.aws/lts/loki) | Grafana Loki™ software 2.4.2 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
4355 | + | **`2.4-22.04_beta`** | [-](https://gallery.ecr.aws/lts/loki) | [-](https://gallery.ecr.aws/lts/loki) | Grafana Loki™ software 2.4.2 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
4356 | | _`track_risk`_ | |
4357 | |
4358 | |
4359 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
4360 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
4361 | |
4362 | |
4363 | ### Commercial use and Extended Security Maintenance channels |
4364 | -If your usage includes commercial redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). **This repository has no LTS channel yet, please get in touch if you need one.** |
4365 | +If your usage includes commercial redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). **This repository has no LTS channel yet, please get in touch if you need one.** |
4366 | |
4367 | ## Deprecated channels & tags |
4368 | These channels (tags) are not updated anymore. Please upgrade to newer channels, or [reach out](https://ubuntu.com/security/docker-images#get-in-touch) if you can't upgrade. |
4369 | @@ -33,66 +33,3 @@ These channels (tags) are not updated anymore. Please upgrade to newer channels, |
4370 | |---|---|---|---| |
4371 | | _`track`_ | |
4372 | |
4373 | - |
4374 | -## Docker CLI |
4375 | - |
4376 | -Launch this image locally: |
4377 | - |
4378 | -```sh |
4379 | -docker run -d --name loki-container -e TZ=UTC -p 3100:3100 public.ecr.aws/ubuntu/loki:2.4-22.04_beta |
4380 | -``` |
4381 | -You can now use your Loki instance exposed at `http://localhost:3100`. |
4382 | - |
4383 | -#### Parameters |
4384 | - |
4385 | -| Parameter | Description | |
4386 | -|---|---| |
4387 | -| `-e TZ=UTC` | Timezone. | |
4388 | -| `-p 3100:3100` | Expose Grafana Loki on `localhost:3100`. | |
4389 | -| `-v /local/path/to/config:/etc/loki/local-config.yaml` | Local Loki Promtail config file. Can be changed using CMD `--config.file=` argument. See an [example file](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/loki/plain/examples/config/promtail-local-config.yaml?h=2.4-22.04). | |
4390 | -| `-v lokidata:/loki` | Persist data in a docker volume named `lokidata`. | |
4391 | - |
4392 | - |
4393 | -#### Testing/Debugging |
4394 | - |
4395 | -To debug the container: |
4396 | - |
4397 | -```sh |
4398 | -docker logs -f loki-container |
4399 | -``` |
4400 | - |
4401 | -To get an interactive shell: |
4402 | - |
4403 | -```sh |
4404 | -docker exec -it loki-container /bin/bash |
4405 | -``` |
4406 | - |
4407 | - |
4408 | -## Deploy with Kubernetes |
4409 | - |
4410 | -Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
4411 | - |
4412 | -Download |
4413 | -[promtail-local-config-k8s.yaml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/loki/plain/examples/config/promtail-local-config-k8s.yaml?h=2.4-22.04) and |
4414 | -[loki-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/loki/plain/examples/loki-deployment.yml?h=2.4-22.04) and set `containers.loki.image` in `loki-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/ubuntu/loki:2.4-22.04_beta`), then: |
4415 | - |
4416 | -```sh |
4417 | -kubectl create configmap promtail-config --from-file=promtail=promtail-local-config-k8s.yaml |
4418 | -kubectl apply -f loki-deployment.yml |
4419 | -``` |
4420 | - |
4421 | -You will now be able to connect to the Loki instance on `http://localhost:31000`. |
4422 | - |
4423 | -## Bugs and feature requests |
4424 | - |
4425 | -If you find a bug in our image or want to request a specific feature, please file a bug here: |
4426 | - |
4427 | -[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
4428 | - |
4429 | -Please title the bug "`loki: <issue summary>`". Make sure to include the digest of the image you are using, from: |
4430 | - |
4431 | -```sh |
4432 | -docker images --no-trunc --quiet public.ecr.aws/ubuntu/loki:<tag> |
4433 | -``` |
4434 | - |
4435 | - |
4436 | diff --git a/docs/public.ecr.aws/ubuntu/memcached.md b/docs/public.ecr.aws/ubuntu/memcached.md |
4437 | index 213ef3c..4487878 100644 |
4438 | --- a/docs/public.ecr.aws/ubuntu/memcached.md |
4439 | +++ b/docs/public.ecr.aws/ubuntu/memcached.md |
4440 | @@ -15,25 +15,25 @@ Up to 5 years free security maintenance [from public.ecr.aws/lts/memcached](http |
4441 | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) |
4442 | Up to 10 years customer security maintenance `from canonical/memcached`. [Request access](https://ubuntu.com/security/docker-images#get-in-touch). |
4443 | |
4444 | -| Channel Tag | | | Currently | Architectures | |
4445 | +| Channel Tags | | | Currently | Architectures | |
4446 | |---|---|---|---|---| |
4447 | - | **`1.6-22.04_beta`** | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/memcached) | [](https://gallery.ecr.aws/lts/memcached) | Memcached 1.6 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
4448 | - | `1.6-21.10_beta` | [](https://gallery.ecr.aws/lts/memcached) | [](https://gallery.ecr.aws/lts/memcached) | Memcached 1.6.9 on Ubuntu 21.10 | `amd64`, `arm64`, `ppc64el`, `s390x` | |
4449 | + | **`1.6-22.04_beta`** | [-](https://gallery.ecr.aws/lts/memcached) | [-](https://gallery.ecr.aws/lts/memcached) | Memcached 1.6 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
4450 | + | `1.6-21.10_beta` | [-](https://gallery.ecr.aws/lts/memcached) | [-](https://gallery.ecr.aws/lts/memcached) | Memcached 1.6.9 on Ubuntu 21.10 | `amd64`, `arm64`, `ppc64el`, `s390x` | |
4451 | | _`track_risk`_ | |
4452 | |
4453 | -_The following tags are not available in public.ecr.aws/ubuntu/memcached but are shown here for completeness:_ |
4454 | +_The following tags might not be available in public.ecr.aws/ubuntu/memcached but are shown here for completeness:_ |
4455 | |
4456 | -| Channel Tag | | | Currently | Architectures | |
4457 | +| Channel Tags | | | Currently | Architectures | |
4458 | |---|---|---|---|---| |
4459 | - | _**`1.5-20.04_beta`** _ | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/memcached) | [![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17)](https://gallery.ecr.aws/lts/memcached) | Memcached 1.5.22 on Ubuntu 20.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
4460 | + | _**`1.5-20.04_beta`** _ | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/memcached) | [![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17)](https://gallery.ecr.aws/lts/memcached) | Memcached 1.5.22 on Ubuntu 20.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
4461 | | _`track_risk`_ | |
4462 | |
4463 | |
4464 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
4465 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
4466 | |
4467 | |
4468 | ### Commercial use and Extended Security Maintenance channels |
4469 | -If your usage includes commercial redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
4470 | +If your usage includes commercial redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
4471 | |
4472 | ## Deprecated channels & tags |
4473 | These channels (tags) are not updated anymore. Please upgrade to newer channels, or [reach out](https://ubuntu.com/security/docker-images#get-in-touch) if you can't upgrade. |
4474 | @@ -43,95 +43,3 @@ These channels (tags) are not updated anymore. Please upgrade to newer channels, |
4475 | | ~~1.6-21.04~~ | Memcached 1.6.9 on Ubuntu 21.04 | 01/2022 | 1.6-21.10_beta | |
4476 | | _`track`_ | |
4477 | |
4478 | - |
4479 | -## Docker CLI |
4480 | - |
4481 | -Launch this image locally: |
4482 | - |
4483 | -```sh |
4484 | -docker run -d --name memcached-container -e TZ=UTC public.ecr.aws/ubuntu/memcached:1.6-21.04 |
4485 | -``` |
4486 | - |
4487 | -#### Parameters |
4488 | - |
4489 | -| Parameter | Description | |
4490 | -|---|---| |
4491 | -| `-e TZ=UTC` | Timezone. | |
4492 | -| `-e MEMCACHED_CACHE_SIZE=64MB` | Determines the size of the cache. | |
4493 | -| `-e MEMCACHED_MAX_CONNECTIONS=1024` | Determines the maximum number of concurrent connections. | |
4494 | -| `-e MEMCACHED_THREADS=4` | Determines the number of threads to process requests. | |
4495 | -| `-e MEMCACHED_PASSWORD` | Define the password for the `root` user if another username is provided. By default the authentication is disabled but if this option is passed it becomes enabled. | |
4496 | -| `-e MEMCACHED_USERNAME` | Define a new user. If this option is passed a password is needed to authenticate the new user. | |
4497 | -| `-p 11211:11211` | Memcached is exposed inside the container on port `11211`. | |
4498 | - |
4499 | - |
4500 | -#### Testing/Debugging |
4501 | - |
4502 | -To debug the container: |
4503 | - |
4504 | -```sh |
4505 | -docker logs -f memcached-container |
4506 | -``` |
4507 | - |
4508 | -To get an interactive shell: |
4509 | - |
4510 | -```sh |
4511 | -docker exec -it memcached-container /bin/bash |
4512 | -``` |
4513 | - |
4514 | -<details> |
4515 | -<summary>You can access the Memcached instance with telnet from another container (click to expand).</summary> |
4516 | - |
4517 | -```sh |
4518 | -# Create a dedicated network |
4519 | -$ docker network create memcached-network |
4520 | -# Connect the main container to it |
4521 | -$ docker network connect memcached-network memcached-container |
4522 | -# Run an interactive container with the latest Ubuntu |
4523 | -$ docker run -it --rm --name telnet --network memcached-network ubuntu bash |
4524 | -# Install the telnet cli from within the container |
4525 | -> apt update && apt install telnet -y |
4526 | -# Connect to the memcached instance using telnet |
4527 | -> telnet memcached-container 11211 |
4528 | -Trying 172.30.0.2... |
4529 | -Connected to memcached. |
4530 | -Escape character is '^]'. |
4531 | -``` |
4532 | -From there you can run `memcached` commands, as documented in [their wiki](https://github.com/memcached/memcached/wiki/Commands). |
4533 | - |
4534 | -</details> |
4535 | - |
4536 | -```sh |
4537 | -$ telnet memcached-container 11211 |
4538 | -``` |
4539 | - |
4540 | -There are cases where one might want to pass some memcached command line flags that are not configurable via environment variables. |
4541 | -In this case you can append the flags themselves or a shell script to the run command. |
4542 | - |
4543 | - |
4544 | -## Deploy with Kubernetes |
4545 | - |
4546 | -Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
4547 | - |
4548 | -Download |
4549 | -[memcached-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/memcached/plain/examples/memcached-deployment.yml?h=1.6-22.04) and set `containers.memcached.image` in `memcached-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/ubuntu/memcached:1.6-21.04`), then: |
4550 | - |
4551 | -```sh |
4552 | -kubectl apply -f memcached-deployment.yml |
4553 | -``` |
4554 | - |
4555 | -Memcached will be listening on port `31211` in your host. |
4556 | - |
4557 | -## Bugs and feature requests |
4558 | - |
4559 | -If you find a bug in our image or want to request a specific feature, please file a bug here: |
4560 | - |
4561 | -[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
4562 | - |
4563 | -Please title the bug "`memcached: <issue summary>`". Make sure to include the digest of the image you are using, from: |
4564 | - |
4565 | -```sh |
4566 | -docker images --no-trunc --quiet public.ecr.aws/ubuntu/memcached:<tag> |
4567 | -``` |
4568 | - |
4569 | - |
4570 | diff --git a/docs/public.ecr.aws/ubuntu/mysql.md b/docs/public.ecr.aws/ubuntu/mysql.md |
4571 | index 42fe55e..0346a6f 100644 |
4572 | --- a/docs/public.ecr.aws/ubuntu/mysql.md |
4573 | +++ b/docs/public.ecr.aws/ubuntu/mysql.md |
4574 | @@ -15,26 +15,26 @@ Up to 5 years free security maintenance [from public.ecr.aws/lts/mysql](https:// |
4575 | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) |
4576 | Up to 10 years customer security maintenance `from canonical/mysql`. [Request access](https://ubuntu.com/security/docker-images#get-in-touch). |
4577 | |
4578 | -| Channel Tag | | | Currently | Architectures | |
4579 | +| Channel Tags | | | Currently | Architectures | |
4580 | |---|---|---|---|---| |
4581 | - | _**`8.0-22.04_beta`** _ | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/mysql) | [![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17)](https://gallery.ecr.aws/lts/mysql) | MySQL™ software 8.0 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
4582 | - | `8.0-21.10_beta` | [](https://gallery.ecr.aws/lts/mysql) | [](https://gallery.ecr.aws/lts/mysql) | MySQL™ software 8.0.27 on Ubuntu 21.10 | `amd64`, `arm64`, `ppc64el`, `s390x` | |
4583 | + | **`8.0-22.04_beta`** | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/mysql) | [![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17)](https://gallery.ecr.aws/lts/mysql) | MySQL™ software 8.0 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
4584 | + | `8.0-21.10_beta` | [-](https://gallery.ecr.aws/lts/mysql) | [-](https://gallery.ecr.aws/lts/mysql) | MySQL™ software 8.0.27 on Ubuntu 21.10 | `amd64`, `arm64`, `ppc64el`, `s390x` | |
4585 | | _`track_risk`_ | |
4586 | |
4587 | -_The following tags are not available in public.ecr.aws/ubuntu/mysql but are shown here for completeness:_ |
4588 | +_The following tags might not be available in public.ecr.aws/ubuntu/mysql but are shown here for completeness:_ |
4589 | |
4590 | -| Channel Tag | | | Currently | Architectures | |
4591 | +| Channel Tags | | | Currently | Architectures | |
4592 | |---|---|---|---|---| |
4593 | - | _**`8.0-22.04_beta`** _ | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/mysql) | [![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17)](https://gallery.ecr.aws/lts/mysql) | MySQL™ software 8.0 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
4594 | - | _`8.0-20.04_beta` _ | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/mysql) | [![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17)](https://gallery.ecr.aws/lts/mysql) | MySQL™ software 8.0.22 on Ubuntu 20.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
4595 | + | _**`8.0-22.04_beta`** _ | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/mysql) | [![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17)](https://gallery.ecr.aws/lts/mysql) | MySQL™ software 8.0 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
4596 | + | _`8.0-20.04_beta` _ | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/mysql) | [![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17)](https://gallery.ecr.aws/lts/mysql) | MySQL™ software 8.0.22 on Ubuntu 20.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
4597 | | _`track_risk`_ | |
4598 | |
4599 | |
4600 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
4601 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
4602 | |
4603 | |
4604 | ### Commercial use and Extended Security Maintenance channels |
4605 | -If your usage includes commercial redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
4606 | +If your usage includes commercial redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
4607 | |
4608 | ## Deprecated channels & tags |
4609 | These channels (tags) are not updated anymore. Please upgrade to newer channels, or [reach out](https://ubuntu.com/security/docker-images#get-in-touch) if you can't upgrade. |
4610 | @@ -44,92 +44,3 @@ These channels (tags) are not updated anymore. Please upgrade to newer channels, |
4611 | | ~~8.0-21.04~~ | MySQL™ software 8.0.27 on Ubuntu 21.04 | 01/2022 | 8.0-21.10_beta | |
4612 | | _`track`_ | |
4613 | |
4614 | - |
4615 | -## Docker CLI |
4616 | - |
4617 | -Launch this image locally: |
4618 | - |
4619 | -```sh |
4620 | -docker run -d --name mysql-container -e TZ=UTC -p 30306:3306 -e MYSQL_ROOT_PASSWORD=My:S3cr3t/ public.ecr.aws/ubuntu/mysql:8.0-21.04 |
4621 | -``` |
4622 | -Access your MySQL server at `localhost:30306`. |
4623 | - |
4624 | -#### Parameters |
4625 | - |
4626 | -| Parameter | Description | |
4627 | -|---|---| |
4628 | -| `-e TZ=UTC` | Timezone. | |
4629 | -| `-e MYSQL_ROOT_PASSWORD=secret_for_root` | Set the password for the `root` user. This option is **mandatory** and **must not be empty**. | |
4630 | -| `-e MYSQL_PASSWORD=secret` | Set the password for the `MYSQL_USER` user. | |
4631 | -| `-e MYSQL_USER=john` | Create a new user with superuser privileges. This is used in conjunction with `MYSQL_PASSWORD`. | |
4632 | -| `-e MYSQL_DATABASE=db_test` | Set the name of the default database. | |
4633 | -| `-e MYSQL_ALLOW_EMPTY_PASSWORD=yes` | Set up a blank password for the `root` user. **This is not recommended to be used in production, make sure you know what you are doing**. | |
4634 | -| `-e MYSQL_RANDOM_ROOT_PASSWORD=yes` | Generate a random initial password for the `root` user using `pwgen`. It will be printed in the logs, search for `GENERATED ROOT PASSWORD`. | |
4635 | -| `-e MYSQL_ONETIME_PASSWORD=yes` | Set `root` user as experide once initialization is complete, forcing a password change on first login. | |
4636 | -| `-e MYSQL_INITSB_SKIP_TZINFO=yes` | Timezone data is automatically loaded via entrypoint script, set this variable to any non-empty value to disable it. | |
4637 | -| `-p 30306:3306` | Expose MySQL server on `localhost:30306`. | |
4638 | -| `-v /path/to/data:/var/lib/mysql` | Persist data instead of initializing a new database every time you launch a new container. | |
4639 | -| `-v /path/to/config/files/:/etc/mysql/mysql.conf.d/` | Local [configuration files](https://dev.mysql.com/doc/refman/8.0/en/mysql-command-options.html) (try this [example my.cnf](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/mysql/plain/examples/config/my-custom.cnf?h=8.0-22.04)). | |
4640 | - |
4641 | -#### Initialization Scripts |
4642 | - |
4643 | -One can also add initialization scripts to their containers. This includes `*.sql`, `.sql.gz`, and `*.sh` scripts, and you just need to put them inside the `/docker-entrypoint-initdb.d` directory inside the container. After MySQL initialization is done and the default database and user are created, the scripts are executed in the following order: |
4644 | - |
4645 | -* Run any `*.sql` files in alphabetically order. By default the target database is specified via `MYSQL_DATABASE`. |
4646 | -* Run any executable `*.sh` scripts in alphabetically order. |
4647 | -* Source any non-executable `*.sh` scripts in alphabetically order. |
4648 | - |
4649 | -All of this is done before the MySQL service is started. Keep in mind if your database directory is not empty (contains pre-existing database) they will be left untouched. |
4650 | - |
4651 | - |
4652 | -#### Testing/Debugging |
4653 | - |
4654 | -To debug the container: |
4655 | - |
4656 | -```sh |
4657 | -docker logs -f mysql-container |
4658 | -``` |
4659 | - |
4660 | -To get an interactive shell: |
4661 | - |
4662 | -```sh |
4663 | -docker exec -it mysql-container /bin/bash |
4664 | -``` |
4665 | - |
4666 | -This image also includes the `mysql` client for interactive container use: |
4667 | - |
4668 | -```sh |
4669 | -$ docker network create mysql-network |
4670 | -$ docker network connect mysql-network mysql-container |
4671 | -$ docker run -it --rm --network mysql-network public.ecr.aws/ubuntu/mysql:8.0-21.04 mysql -hmysql-container -uroot -p |
4672 | -``` |
4673 | -The password will be asked and you can enter `My:S3cr3t/`. Now, you are logged in and can enjoy your new instance. |
4674 | - |
4675 | -## Deploy with Kubernetes |
4676 | - |
4677 | -Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
4678 | - |
4679 | -Download |
4680 | -[my-custom.cnf](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/mysql/plain/examples/config/my-custom.cnf?h=8.0-22.04) and |
4681 | -[mysql-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/mysql/plain/examples/mysql-deployment.yml?h=8.0-22.04) and set `containers.mysql.image` in `mysql-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/ubuntu/mysql:8.0-21.04`), then: |
4682 | - |
4683 | -```sh |
4684 | -kubectl create configmap mysql-config --from-file=main-config=my-custom.cnf |
4685 | -kubectl apply -f mysql-deployment.yml |
4686 | -``` |
4687 | - |
4688 | -You will now be able to connect to the MySQL server on `localhost:30306`. |
4689 | - |
4690 | -## Bugs and feature requests |
4691 | - |
4692 | -If you find a bug in our image or want to request a specific feature, please file a bug here: |
4693 | - |
4694 | -[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
4695 | - |
4696 | -Please title the bug "`mysql: <issue summary>`". Make sure to include the digest of the image you are using, from: |
4697 | - |
4698 | -```sh |
4699 | -docker images --no-trunc --quiet public.ecr.aws/ubuntu/mysql:<tag> |
4700 | -``` |
4701 | - |
4702 | - |
4703 | diff --git a/docs/public.ecr.aws/ubuntu/nginx.md b/docs/public.ecr.aws/ubuntu/nginx.md |
4704 | index e34f14b..78ce0c9 100644 |
4705 | --- a/docs/public.ecr.aws/ubuntu/nginx.md |
4706 | +++ b/docs/public.ecr.aws/ubuntu/nginx.md |
4707 | @@ -15,26 +15,26 @@ Up to 5 years free security maintenance [from public.ecr.aws/lts/nginx](https:// |
4708 | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) |
4709 | Up to 10 years customer security maintenance `from canonical/nginx`. [Request access](https://ubuntu.com/security/docker-images#get-in-touch). |
4710 | |
4711 | -| Channel Tag | | | Currently | Architectures | |
4712 | +| Channel Tags | | | Currently | Architectures | |
4713 | |---|---|---|---|---| |
4714 | - | _**`1.18-22.04_beta`** _ | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/nginx) | [![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17)](https://gallery.ecr.aws/lts/nginx) | Nginx 1.18 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
4715 | - | `1.18-21.10_beta` | [](https://gallery.ecr.aws/lts/nginx) | [](https://gallery.ecr.aws/lts/nginx) | Nginx 1.18.0 on Ubuntu 21.10 | `amd64`, `arm64`, `ppc64el`, `s390x` | |
4716 | + | **`1.18-22.04_beta`** | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/nginx) | [![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17)](https://gallery.ecr.aws/lts/nginx) | Nginx 1.18 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
4717 | + | `1.18-21.10_beta` | [-](https://gallery.ecr.aws/lts/nginx) | [-](https://gallery.ecr.aws/lts/nginx) | Nginx 1.18.0 on Ubuntu 21.10 | `amd64`, `arm64`, `ppc64el`, `s390x` | |
4718 | | _`track_risk`_ | |
4719 | |
4720 | -_The following tags are not available in public.ecr.aws/ubuntu/nginx but are shown here for completeness:_ |
4721 | +_The following tags might not be available in public.ecr.aws/ubuntu/nginx but are shown here for completeness:_ |
4722 | |
4723 | -| Channel Tag | | | Currently | Architectures | |
4724 | +| Channel Tags | | | Currently | Architectures | |
4725 | |---|---|---|---|---| |
4726 | - | _**`1.18-22.04_beta`** _ | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/nginx) | [![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17)](https://gallery.ecr.aws/lts/nginx) | Nginx 1.18 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
4727 | - | _`1.18-20.04_beta` _ | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/nginx) | [![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17)](https://gallery.ecr.aws/lts/nginx) | Nginx 1.18.0 on Ubuntu 20.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
4728 | + | _**`1.18-22.04_beta`** _ | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/nginx) | [![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17)](https://gallery.ecr.aws/lts/nginx) | Nginx 1.18 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
4729 | + | _`1.18-20.04_beta` _ | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/nginx) | [![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17)](https://gallery.ecr.aws/lts/nginx) | Nginx 1.18.0 on Ubuntu 20.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
4730 | | _`track_risk`_ | |
4731 | |
4732 | |
4733 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
4734 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
4735 | |
4736 | |
4737 | ### Commercial use and Extended Security Maintenance channels |
4738 | -If your usage includes commercial redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
4739 | +If your usage includes commercial redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
4740 | |
4741 | ## Deprecated channels & tags |
4742 | These channels (tags) are not updated anymore. Please upgrade to newer channels, or [reach out](https://ubuntu.com/security/docker-images#get-in-touch) if you can't upgrade. |
4743 | @@ -44,67 +44,3 @@ These channels (tags) are not updated anymore. Please upgrade to newer channels, |
4744 | | ~~1.18-21.04~~ | Nginx 1.18.0 on Ubuntu 21.04 | 01/2022 | 1.18-21.10_beta | |
4745 | | _`track`_ | |
4746 | |
4747 | - |
4748 | -## Docker CLI |
4749 | - |
4750 | -Launch this image locally: |
4751 | - |
4752 | -```sh |
4753 | -docker run -d --name nginx-container -e TZ=UTC -p 8080:80 public.ecr.aws/ubuntu/nginx:1.18-21.04 |
4754 | -``` |
4755 | -Access your Nginx server at `http://localhost:8080`. |
4756 | - |
4757 | -#### Parameters |
4758 | - |
4759 | -| Parameter | Description | |
4760 | -|---|---| |
4761 | -| `-e TZ=UTC` | Timezone. | |
4762 | -| `-p 8080:80` | Expose Nginx on `localhost:8080`. | |
4763 | -| `-v /local/path/to/website:/var/www/html` | Mount and serve a local website. | |
4764 | -| `-v /path/to/conf.template:/etc/nginx/templates/conf.template` | Mount template files inside `/etc/nginx/templates`. They will be processed and the results will be placed at `/etc/nginx/conf.d`. (e.g. `listen ${NGINX_PORT};` will generate `listen 80;`). | |
4765 | -| `-v /path/to/nginx.conf:/etc/nginx/nginx.conf` | Local [configuration file](https://nginx.org/en/docs/) `nginx.conf` (try [this example](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/nginx/plain/examples/config/nginx.conf?h=1.18-22.04)). | |
4766 | - |
4767 | - |
4768 | -#### Testing/Debugging |
4769 | - |
4770 | -To debug the container: |
4771 | - |
4772 | -```sh |
4773 | -docker logs -f nginx-container |
4774 | -``` |
4775 | - |
4776 | -To get an interactive shell: |
4777 | - |
4778 | -```sh |
4779 | -docker exec -it nginx-container /bin/bash |
4780 | -``` |
4781 | - |
4782 | - |
4783 | -## Deploy with Kubernetes |
4784 | - |
4785 | -Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
4786 | - |
4787 | -Download |
4788 | -[nginx.conf](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/nginx/plain/examples/config/nginx.conf?h=1.18-22.04), [index.html](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/nginx/plain/examples/config/html/index.html?h=1.18-22.04) and |
4789 | -[nginx-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/nginx/plain/examples/nginx-deployment.yml?h=1.18-22.04) and set `containers.nginx.image` in `nginx-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/ubuntu/nginx:1.18-21.04`), then: |
4790 | - |
4791 | -```sh |
4792 | -kubectl create configmap nginx-config --from-file=nginx=nginx.conf --from-file=nginx-site=index.html |
4793 | -kubectl apply -f nginx-deployment.yml |
4794 | -``` |
4795 | - |
4796 | -You will now be able to connect to the nginx server on `http://localhost:31080`. |
4797 | - |
4798 | -## Bugs and feature requests |
4799 | - |
4800 | -If you find a bug in our image or want to request a specific feature, please file a bug here: |
4801 | - |
4802 | -[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
4803 | - |
4804 | -Please title the bug "`nginx: <issue summary>`". Make sure to include the digest of the image you are using, from: |
4805 | - |
4806 | -```sh |
4807 | -docker images --no-trunc --quiet public.ecr.aws/ubuntu/nginx:<tag> |
4808 | -``` |
4809 | - |
4810 | - |
4811 | diff --git a/docs/public.ecr.aws/ubuntu/postgres.md b/docs/public.ecr.aws/ubuntu/postgres.md |
4812 | index 9981a38..9a1d5ee 100644 |
4813 | --- a/docs/public.ecr.aws/ubuntu/postgres.md |
4814 | +++ b/docs/public.ecr.aws/ubuntu/postgres.md |
4815 | @@ -15,26 +15,26 @@ Up to 5 years free security maintenance [from public.ecr.aws/lts/postgres](https |
4816 | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) |
4817 | Up to 10 years customer security maintenance `from canonical/postgres`. [Request access](https://ubuntu.com/security/docker-images#get-in-touch). |
4818 | |
4819 | -| Channel Tag | | | Currently | Architectures | |
4820 | +| Channel Tags | | | Currently | Architectures | |
4821 | |---|---|---|---|---| |
4822 | - | _**`14-22.04_beta`** _ | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/postgres) | [![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17)](https://gallery.ecr.aws/lts/postgres) | Postgres 14 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
4823 | - | `13-21.10_beta` | [](https://gallery.ecr.aws/lts/postgres) | [](https://gallery.ecr.aws/lts/postgres) | Postgres 13.1 on Ubuntu 21.10 | `amd64`, `arm64`, `ppc64el`, `s390x` | |
4824 | + | **`14-22.04_beta`** | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/postgres) | [![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17)](https://gallery.ecr.aws/lts/postgres) | Postgres 14 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
4825 | + | `13-21.10_beta` | [-](https://gallery.ecr.aws/lts/postgres) | [-](https://gallery.ecr.aws/lts/postgres) | Postgres 13.1 on Ubuntu 21.10 | `amd64`, `arm64`, `ppc64el`, `s390x` | |
4826 | | _`track_risk`_ | |
4827 | |
4828 | -_The following tags are not available in public.ecr.aws/ubuntu/postgres but are shown here for completeness:_ |
4829 | +_The following tags might not be available in public.ecr.aws/ubuntu/postgres but are shown here for completeness:_ |
4830 | |
4831 | -| Channel Tag | | | Currently | Architectures | |
4832 | +| Channel Tags | | | Currently | Architectures | |
4833 | |---|---|---|---|---| |
4834 | - | _**`14-22.04_beta`** _ | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/postgres) | [![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17)](https://gallery.ecr.aws/lts/postgres) | Postgres 14 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
4835 | - | _`12-20.04_beta` _ | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/postgres) | [![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17)](https://gallery.ecr.aws/lts/postgres) | Postgres 12.4 on Ubuntu 20.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
4836 | + | _**`14-22.04_beta`** _ | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/postgres) | [![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17)](https://gallery.ecr.aws/lts/postgres) | Postgres 14 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
4837 | + | _`12-20.04_beta` _ | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/postgres) | [![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17)](https://gallery.ecr.aws/lts/postgres) | Postgres 12.4 on Ubuntu 20.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
4838 | | _`track_risk`_ | |
4839 | |
4840 | |
4841 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
4842 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
4843 | |
4844 | |
4845 | ### Commercial use and Extended Security Maintenance channels |
4846 | -If your usage includes commercial redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
4847 | +If your usage includes commercial redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). |
4848 | |
4849 | ## Deprecated channels & tags |
4850 | These channels (tags) are not updated anymore. Please upgrade to newer channels, or [reach out](https://ubuntu.com/security/docker-images#get-in-touch) if you can't upgrade. |
4851 | @@ -44,91 +44,3 @@ These channels (tags) are not updated anymore. Please upgrade to newer channels, |
4852 | | ~~13-21.04~~ | Postgres 13.1 on Ubuntu 21.04 | 01/2022 | ~~13.1-21.10~~ | |
4853 | | _`track`_ | |
4854 | |
4855 | - |
4856 | -## Docker CLI |
4857 | - |
4858 | -Launch this image locally: |
4859 | - |
4860 | -```sh |
4861 | -docker run -d --name postgres-container -e TZ=UTC -p 30432:5432 -e POSTGRES_PASSWORD=My:s3Cr3t/ public.ecr.aws/ubuntu/postgres:13-21.04 |
4862 | -``` |
4863 | -Access your PostgreSQL server at `localhost:30432`. |
4864 | - |
4865 | -#### Parameters |
4866 | - |
4867 | -| Parameter | Description | |
4868 | -|---|---| |
4869 | -| `-e TZ=UTC` | Timezone. | |
4870 | -| `-e POSTGRES_PASSWORD=secret` | Set the password for the superuser which is `postgres` by default. Bear in mind that to connect to the database in the same host the password is not needed but to access it via an external host (for instance another container) the password is needed. This option is **mandatory** and **must not be empty**. | |
4871 | -| `-e POSTGRES_USER=john` | Create a new user with superuser privileges. This is used in conjunction with `POSTGRES_PASSWORD`. | |
4872 | -| `-e POSTGRES_DB=db_test` | Set the name of the default database. | |
4873 | -| `-e POSTGRES_INITDB_ARGS="--data-checksums"` | Pass arguments to the `postgres initdb` call. | |
4874 | -| `-e POSTGRES_INITDB_WALDIR=/path/to/location` | Set the location of the Postgres transaction log. By default it is stored in a subdirectory of the main Postgres data folder (`PGDATA`). | |
4875 | -| `-e POSTGRES_HOST_AUTH_METHOD=trust` | Set the `auth-method` for `host` connections for `all` databases, `all` users, and `all` addresses. The following will be added to the `pg_hba.conf` if this option is passed: `host all all all $POSTGRES_HOST_AUTH_METHOD`. | |
4876 | -| `-e PGDATA=/path/to/location` | Set the location of the database files. The default is `/var/lib/postgresql/data`. | |
4877 | -| `-p 30432:5432` | Expose Postgres on `localhost:30432`. | |
4878 | -| `-v /path/to/postgresql.conf:/etc/postgresql/postgresql.conf` | Local [configuration file](https://www.postgresql.org/docs/12/index.html) `postgresql.conf` (try [this example](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/postgresql/plain/examples/config/postgresql.conf?h=14-22.04)). | |
4879 | -| `-v /path/to/persisted/data:/var/lib/postgresql/data` | Persist data instead of initializing a new database every time you launch a new container. | |
4880 | - |
4881 | -#### Initialization Scripts |
4882 | - |
4883 | -One can also add initialization scripts to their containers. This includes `*.sql`, `.sql.gz`, and `*.sh` scripts, and you just need to put them inside the `/docker-entrypoint-initdb.d` directory inside the container. After Postgres initialization is done and the default database and user are created, the scripts are executed in the following order: |
4884 | - |
4885 | -* Run any `*.sql` files in alphabetically order. It will be executed with `POSTGRES_USER`. |
4886 | -* Run any executable `*.sh` scripts in alphabetically order. |
4887 | -* Source any non-executable `*.sh` scripts in alphabetically order. |
4888 | - |
4889 | -All of this is done before the Postgres service is started. Keep in mind if your `PGDATA` directory is not empty (contains pre-existing database) they will be left untouched. |
4890 | - |
4891 | - |
4892 | -#### Testing/Debugging |
4893 | - |
4894 | -To debug the container: |
4895 | - |
4896 | -```sh |
4897 | -docker logs -f postgres-container |
4898 | -``` |
4899 | - |
4900 | -To get an interactive shell: |
4901 | - |
4902 | -```sh |
4903 | -docker exec -it postgres-container /bin/bash |
4904 | -``` |
4905 | - |
4906 | -This image also includes the `psql` client for interactive container use: |
4907 | - |
4908 | -```sh |
4909 | -$ docker network create postgres-network |
4910 | -$ docker network connect postgres-network postgres-container |
4911 | -$ docker run -it --rm --network postgres-network public.ecr.aws/ubuntu/postgres:13-21.04 psql -h postgres-container -U postgres |
4912 | -``` |
4913 | -The password will be asked and you can enter `My:s3Cr3t/`. Now, you are logged in and can enjoy your new instance. |
4914 | - |
4915 | -## Deploy with Kubernetes |
4916 | - |
4917 | -Works with any Kubernetes; if you don't have one, we recommend you [install MicroK8s](https://microk8s.io/) and `microk8s.enable dns storage` then `snap alias microk8s.kubectl kubectl`. |
4918 | - |
4919 | -Download |
4920 | -[postgresql.conf](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/postgresql/plain/examples/config/postgresql.conf?h=14-22.04) and |
4921 | -[postgres-deployment.yml](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/postgresql/plain/examples/postgres-deployment.yml?h=14-22.04) and set `containers.postgres.image` in `postgres-deployment.yml` to your chosen channel tag (e.g. `public.ecr.aws/ubuntu/postgres:13-21.04`), then: |
4922 | - |
4923 | -```sh |
4924 | -kubectl create configmap postgres-config --from-file=main-config=postgresql.conf |
4925 | -kubectl apply -f postgres-deployment.yml |
4926 | -``` |
4927 | - |
4928 | -You will now be able to connect to the Postgres server on `localhost:30306`. |
4929 | - |
4930 | -## Bugs and feature requests |
4931 | - |
4932 | -If you find a bug in our image or want to request a specific feature, please file a bug here: |
4933 | - |
4934 | -[https://bugs.launchpad.net/ubuntu-docker-images/+filebug](https://bugs.launchpad.net/ubuntu-docker-images/+filebug) |
4935 | - |
4936 | -Please title the bug "`postgres: <issue summary>`". Make sure to include the digest of the image you are using, from: |
4937 | - |
4938 | -```sh |
4939 | -docker images --no-trunc --quiet public.ecr.aws/ubuntu/postgres:<tag> |
4940 | -``` |
4941 | - |
4942 | - |
4943 | diff --git a/docs/public.ecr.aws/ubuntu/prometheus-alertmanager.md b/docs/public.ecr.aws/ubuntu/prometheus-alertmanager.md |
4944 | index a5b1127..e6d19b0 100644 |
4945 | --- a/docs/public.ecr.aws/ubuntu/prometheus-alertmanager.md |
4946 | +++ b/docs/public.ecr.aws/ubuntu/prometheus-alertmanager.md |
4947 | @@ -14,17 +14,17 @@ Up to 5 years free security maintenance. [Request access](https://ubuntu.com/sec |
4948 | ![ESM](https://assets.ubuntu.com/v1/572f3fbd-ESM%402x.png?h=17) |
4949 | Up to 10 years customer security maintenance `from canonical/prometheus-alertmanager`. [Request access](https://ubuntu.com/security/docker-images#get-in-touch). |
4950 | |
4951 | -| Channel Tag | | | Currently | Architectures | |
4952 | +| Channel Tags | | | Currently | Architectures | |
4953 | |---|---|---|---|---| |
4954 | - | **`0.23-22.04_beta`** | [![LTS](https://assets.ubuntu.com/v1/0a5ff561-LTS%402x.png?h=17)](https://gallery.ecr.aws/lts/prometheus-alertmanager) | [](https://gallery.ecr.aws/lts/prometheus-alertmanager) | Prometheus Alertmanager 0.23 on Ubuntu 22.04 LTS| `amd64`, `arm64`, `ppc64el`, `s390x` | |
4955 | + | **`0.23-22.04_beta`** | [-](https://gallery.ecr.aws/lts/prometheus-alertmanager) | [-](https://gallery.ecr.aws/lts/prometheus-alertmanager) | Prometheus Alertmanager 0.23 on Ubuntu 22.04 LTS | `amd64`, `arm64`, `ppc64el`, `s390x` | |
4956 | | _`track_risk`_ | |
4957 | |
4958 | |
4959 | -Channel Tag shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
4960 | +Channel Tags shows the most stable channel for that track ordered `stable`, `candidate`, `beta`, `edge`. More risky channels are always implicitly available. So if `beta` is listed, you can also pull `edge`. If `candidate` is listed, you can pull `beta` and `edge`. When `stable` is listed, all four are available. Images are guaranteed to progress through the sequence `edge`, `beta`, `candidate` before `stable`. |
4961 | |
4962 | |
4963 | ### Commercial use and Extended Security Maintenance channels |
4964 | -If your usage includes commercial redistribution or requires unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). **This repository has no LTS channel yet, please get in touch if you need one.** |
4965 | +If your usage includes commercial redistribution, or requires ESM or unavailable channels/versions, please [get in touch with the Canonical team](https://ubuntu.com/security/docker-images#get-in-touch) (or using rocks@canonical.com). **This repository has no LTS channel yet, please get in touch if you need one.** |
4966 | |
4967 | ## Deprecated channels & tags |
4968 | These channels (tags) are not updated anymore. Please upgrade to newer channels, or [reach out](https://ubuntu.com/security/docker-images#get-in-touch) if you can't upgrade. |
4969 | @@ -36,66 +36,3 @@ These channels (tags) are not updated anymore. Please upgrade to newer channels, |
4970 | | ~~0.21-20.04~~ | Prometheus Alertmanager 0.21.0 on Ubuntu 20.04 LTS | 01/2021 | ~~0.21-21.04~~ | |
4971 | | _`track`_ | |
4972 | |
4973 | - |
4974 | -## Docker CLI |
4975 | - |
4976 | -Launch this image locally: |
4977 | - |
4978 | -```sh |
4979 | -docker run -d --name prometheus-alertmanager-container -e TZ=UTC -p 30093:9093 public.ecr.aws/ubuntu/prometheus-alertmanager:0.22-21.10 |
4980 | -``` |
4981 | -Access your Prometheus Alertmanager server at `localhost:30093`. |
4982 | - |
4983 | -#### Parameters |
4984 | - |
4985 | -| Parameter | Description | |
4986 | -|---|---| |
4987 | -| `-e TZ=UTC` | Timezone. | |
4988 | -| `-p 30093:9093` | Expose Prometheus Alertmanager on `localhost:30093`. | |
4989 | -| `-v /path/to/alertmanager.yml:/etc/prometheus/alertmanager.yml` | Local [configuration file](https://www.prometheus.io/docs/alerting/latest/configuration/) `alertmanager.yml` (try [this example](https://git.launchpad.net/~canonical-server/ubuntu-docker-images/+git/prometheus-alertmanager/plain/examples/config/alertmanager.yml?h=0.23-22.04)). | |
4990 | -| `-v /path/to/persisted/data:/alertmanager` | Persist data instead of initializing a new database for each newly launched container. **Important note**: the directory you will be using to persist the data needs to belong to `nogroup:nobody`. You can run `chown nogroup:nobody <path_to_persist_data>` before launching your container. | |
4991 | - |
4992 | - |
4993 | -#### Testing/Debugging |
4994 | - |
4995 | -To debug the container: |
4996 | - |
4997 | -```sh |
4998 | -docker logs -f prometheus-alertmanager-container |
4999 | -``` |
5000 | - |
The diff has been truncated for viewing.
Simon, Paulo, Athos, Sergio, Valentin and Samir:
please have a look at this MP if possible.
The goal is to use these templates to automate the creation and injection of the ubuntu base image docs into the registries.
For this to be possible, some changes were required, both in terms of content alignment and design.
I believe none of the app-specific docs were disrupted, apart from some minor changes.