6.4.12 | docker pull icr.io/ibmz/jupyter-notebook@sha256:d88a17511b43497ceecd55ee6cd387d8c98874beffb5005886a15a11cd35b64b | Vulnerability Report | 11-22-2024 | 6.5.3 | docker pull icr.io/ibmz/jupyter-notebook@sha256:c78550b436c26286ddcb0afc45342022c87ce8c85235c81756195851e675c913 | Vulnerability Report | 11-22-2024 | 6.4.5 | docker pull icr.io/ibmz/jupyter-notebook@sha256:c0e44546ecbfbfae306550aa97beeb03e7c36f75e6dad73ba929a6daf579f948 | Vulnerability Report | 11-22-2024 | v7.0.0a2 | docker pull icr.io/ibmz/jupyter-notebook@sha256:42bff78ca394db7649f66da77024be7173e9d8b973f7fece4606ce3a547be23c | Vulnerability Report | 04-05-2022 | 6.4.8 | docker pull icr.io/ibmz/jupyter-notebook@sha256:21ed6e1d7512a47c9dc4d45de201e6254f368a424bacd67fe019efc2ab7d21da | Vulnerability Report | 11-22-2024 |
Version | Pull String | Security (IBM Cloud) | Created |
---|---|---|---|
8888
so these ports must be exposed when issuing the docker run:
docker run --rm -it -p 8888:8888 icr.io/ibmz/jupyter-notebook:6.4.5 -ip 0.0.0.0
The server should now be accessible at the IP of your system on port 8888, but will require an authorization token to log in. By checking the logs you can find the access token to use.
http://YOUR_SYSTEM_IP:8888/?token=4af405f0407002fe3d636e8727cd0939bef99ca4a2176dad
It is worth noting that the ip flag is not specified here, as it's assumed that 'localhost' has been replaced in the mounted config
docker run --rm -it -p 8888:8888 -v myvolume:/home/notebooks icr.io/ibmz/jupyter-notebook:6.4.5
docker run --rm -it -p 8888:8888 -e NBDIR=/home/ANOTHERDIR icr.io/ibmz/jupyter-notebook:6.4.5 -ip 0.0.0.0