Skip to main content

How to install Docker on Fedora 31

 This tutorial will provide you with simple to follow steps on how to install Docker on Fedora 31 Linux.

In this tutorial you will learn:

  • How to add Docker repository
  • How to install Docker
Docker on Fedora 31
Docker on Fedora 31

Software Requirements and Conventions Used

Software Requirements and Linux Command Line Conventions
Category Requirements, Conventions or Software Version Used
System Fedora 31
Software Docker CE
Other Privileged access to your Linux system as root or via the sudo command.
Conventions # - requires given linux commands to be executed with root privileges either directly as a root user or by use of sudo command
$ - requires given linux commands to be executed as a regular non-privileged user

How to install Docker on Fedora 31 step by step instructions

  1. Revert back to cgroup v1. Please consider whether this step does not negatively affect your any of the other services running on your system:
    $ sudo dnf install -y grubby
    $ sudo grubby --update-kernel=ALL --args="systemd.unified_cgroup_hierarchy=0"
    $ sudo reboot
    
  2. Next, step is to enable 3rd-party docker repository:
    $ sudo dnf config-manager --add-repo=https://download.docker.com/linux/fedora/docker-ce.repo
    

  3. SUBSCRIBE TO NEWSLETTER
    Subscribe to Linux Career NEWSLETTER and receive latest Linux news, jobs, career advice and tutorials.


  4. Once the Docker repository is enabled enter the following command to install the docker-ce package:
    $ sudo dnf install docker-ce
    
  5. Start and enable Docker on your Fedora 31 system:
    $ sudo systemctl enable --now docker
    Created symlink /etc/systemd/system/multi-user.target.wants/docker.service → /usr/lib/systemd/system/docker.service.
    
  6. Confirm that Docker is up and running:
    $ systemctl enable --now docker
    Created symlink /etc/systemd/system/multi-user.target.wants/docker.service → /usr/lib/systemd/system/docker.service.
    [root@localhost ~]# systemctl status docker
    ● docker.service - Docker Application Container Engine
       Loaded: loaded (/usr/lib/systemd/system/docker.service; enabled; vendor preset: disabled)
       Active: active (running) since Fri 2019-10-18 14:11:18 AEDT; 47s ago
         Docs: https://docs.docker.com
     Main PID: 4081 (dockerd)
        Tasks: 13
       Memory: 40.5M
          CPU: 524ms
       CGroup: /system.slice/docker.service
               └─4081 /usr/bin/dockerd -H fd:// --containerd=/run/containerd/containerd.sock
    


  7. Enable regular user to perform Docker administration tasks. First, create the docker group:
    $ sudo groupadd docker
    
    Once the group is created give your user administrative privileges:
    $ sudo usermod -aG docker USERNAME
    

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...