Showing posts with label Containers. Show all posts
Showing posts with label Containers. Show all posts

Monday, November 1, 2021

Docker and Containers - Everything you should know

Much has been discussed about Docker, containers, virtualization, microservices and distributed applications. On this post let's recap the essential concepts and review related technologies.
Photo by chuttersnap on Unsplash

Much has been discussed about Docker, microservices, virtualization and containerized applications. So much, that most people probably didn't catch up. As the ecosystem matures and new technologies and standards come and go, the container ecosystem can be confusing at times. On this post we will recap the essential concepts and a solid reference for the future.

Virtualization

So let's start with a bit of history. More a less 20 years ago the industry saw a big growth in processing power, memory, storage and a significant decrease in hardware prices. Engineers realized that their applications weren't utilizing the resources effectively so they developed Virtual machines (VMs) and hypervisors to run multiple operating systems in parallel on the same server.
Source: Resellers Panel
A hypervisor is computer software, firmware or hardware that creates and runs virtual machines. The computer where the hypervisor runs is called the host, and the VM is called a guest.

The first container technologies

As virtualization grew, engineers realized that VMs were difficult to scale, hard to secure, utilized a lot of redundant resources and maxed out at a dozen per server. Those limitations led to the first containerization tools listed below.
  • FreeBSD Jails: FreeBSD jails appeared in 2000 allowing the partitioning of a FreeBSD system into multiple subsystems. Jails was developed so that the same server could be sharded with multiple users without securely. 
  • Google's lmctfy: Google also had their own container implementation called lmcty (Let Me Contain That For You). According to the project page, lmctfy used to be Google’s container stack which now seems to be moved to runc. 
  • rkt: rkt was another container engine for Linux. rkt has ended and with CoreOS transitioning into Fedora CoreOS. Most of the efforts on that front should be happening into Podman now. 
  • LXC: released on 2008, the Linux Containers project (LXC) is another container solution for Linux. LXC provides a CLI, tools, libraries and a reference specification that's followed by Docker, LXD, systemd-nspawn and Podman/Buildah. 
  • Podman/Buildah: Podman and Buildah are also tools to create and manage containers. Podman provides an equivalent Docker CLI and improves on Docker by neither requiring a daemon (service) nor requiring root privileges. Podman's available by default on RH-based distros (RHEL, CentOS and Fedora). 
  • LXD: LXD is another system container manager. Developed by Canonical, Ubuntu's parent company, it offers pre-made images for multiple Linux distributions and is built around a REST API. Clients, such as the command line tool provided with LXD itself then do everything through that REST API. 

Docker

Docker first appeared in 2008 as dotCloud and became open-source in 2013. Docker is by far the most used container implementation. According to Docker Inc., more than 3.5 million Docker applications have been deployed and over 37 billion containerized applications downloaded.

Docker grew so fast because it allowed developers to easily pull, run and share containers remotely on Docker Hub as simple as:
docker run -it nginx /bin/bash

Differences between containers and VMs

So what's the difference between containers and VMs? While each VM has to have their own kernel, applications, libraries and services, containers don't as they share some of the host's resources. VMs are also slower to build, provision, deploy and restore. Since containers also provide a way to run isolated services, are lightweight (some are only a few MBs), start fast and are easier to deploy and scale, containers became the standard today.

The image below shows a visual comparison between VMs and Containers:
Source: ZDNnet

Why Containers?

Here are guidelines that could help you decide if you should be using containers instead of VMs:
  • containers share the operating system's kernel with other containers
  • containers are designed to run one main process, VMs manage multiple sets of processes
  • containers maximize the host's resource utilization 
  • containers faster to run, download and start
  • containers are easier to scale
  • containers are more portable than VMs
  • containers are usually more secure due to the reduced attack surface
  • containers are easier to deploy 
  • containers can be very lightweight (some are just a few MBs)
Containers are not only advantages. They also bring many technical challenges and will require you to not only rethink how your system is designed but also to use different tools. Look at the Ecosystem section below to understand.

Usage of Containers

And how much are containers being used? According to the a Cloud Native Computing Foundation survey, 84% of companies today use containers in production, a 15% increase from last year. Another good metric is provided by the Docker Index:

Open Collaboration

As the ecosystem stabilized, companies such as Amazon, Google, Microsoft and Red Hat collaborated on a shared format under Open Container Initiative (OCI). OCI was created from standards and technologies developed by Docker such as libcontainer. The standardization means that today you can run Docker and other LXC-based containers such as Podman on any OS.

The Cloud Native Computing Foundation (CNCF), part of the Linux Foundation is another significant entity in the area. CNF hosts many of the fastest-growing open source projects, including Kubernetes, Prometheus, and Envoy. CNCF's mission is to promote, monitor and hosts critical components of the global technology infrastructure.

The Technologies

Now let's dive into the technologies used by Docker (and OCI containers in general). The image below shows a detailed overview of the internals of a container. For clarity, we'll break the discussion in user and kernel space.

User space technologies

In usersland, Docker and other OCI containers utilize essentially these technologies:
  • runc: runc is a CLI tool for spawning and running containers. runc is a fork of libcontainer, a library developed by Docker that was donated to the OCI and includes all modifications needed to make it run independently of Docker. 
  • containerd: containerd is a project developed by Docker and donated to the CNCF that builds on top of runc adding features, such as image transfer, storage, execution, network and more.
  • CRI: CRI is the containerd plugin for the Kubernetes Container Runtime Interface. With it, you could run Kubernetes using containerd as the container runtime. 
  • Prometheus: Prometheus is an open-source systems monitoring and alerting toolkit. Prometheus is an independent project and member of the Cloud Native Computing Foundation.
  • gRPC: gRPC is an open source remote procedure call system developed by Google. It uses HTTP/2 for transport, Protocol Buffers as the interface description language, and provides features such as authentication, bidirectional streaming and flow control, blocking or nonblocking bindings, and cancellation and timeouts.
  • Go: yes, some of the tools are developed in C but Go shines in the area. Most of the open-source projects around containers use Go including: runc, runtime-tools, Docker CE, containerd, Kubernetes, libcontainer, Podman, Buildah, rkt, CoreDNS, LXD, Prometheus, CRI, etc. 

Kernel space technologies

In order to provide isolation, security and resource management, Docker relies on the following features from the Linux Kernel:
  • Union Filesystem (or UnionFS, UFS): UnionFS is a filesystem that allows files and directories of separate file systems to be transparently overlaid, forming a single file system. Docker implements some of them including brtfs and zfs.
  • Namespaces: Namespaces are a feature of the Linux kernel that partitions kernel resources so that one set of processes sees one set of resources while another set of processes sees a different set of resources. Specifically for Docker, PID, net, ipc, mnt and ufs are required.
  • Cgroups: Cgroups allow you to allocate resources — such as CPU time, system memory, network bandwidth, or combinations of these resources — among groups of processes running on a system. 
  • chroot chroot changes the apparent root directory for the current running process and its children. A program that is run in such a modified environment cannot name files outside the designated directory tree. 

Docker Overview

You probably installed Docker on your machine, pulled images and executed them. Three distinct tools participated on that operation: two local Docker tools and a remote container registry. On your local machine the two tools are:
  • Docker client: this is the CLI tool you use to run your commands. The CLI is essentially a wrapper to interact with the daemon (service) via a REST API.
  • Docker daemon (service): the daemon is a backend service that runs on your machine. The Docker daemon is the tool that performs most of the jobs such as downloading, running and creating resources on your machine.
The image below shows how the client and the daemon interact with each other:
Source: Docker Overview

Remote Registry

And what happens when you push your images to a container registry such as Docker Hub? The next image shows the relationship between client, dameon and the remote registry.
Source: Docker Overview

Images and Containers

Moving lower on the stack, it's time to take a quick look at Docker images. Internally, a Docker image can look like this:

Important concepts about images and containers that you should know:
  • Images are built on layers, utilizing the the union file system.
  • Images are readonly. Modifications made by the user are stored on a separate docker volume managed by the Docker daemon. They are removed as soon as you remove the container.
  • Images are managed using  docker image <operation> <imageid>
  • An instance of an image is called a container.
  • Containers are managed with the  docker container <operation> <containerid>
  • You can inspect details about your image with docker image inspect <imageid>
  • Images can be created with docker commit, docker build or Dockerfiles
  • Every image has to have a base image. scratch is the base empty image.
  • Dockerfiles are templates to script images. Developed by Docker, they became the standard for the industry.
  • The docker tool allows you to not only create and run images but also to create volumes, networks and much more.
For more information about how to build your images, check the official documentation.

Container Security

Due to the new practices of containers new security measures had to be applied. By default, containers are very reliable on some of the security measures of the host operating system kernel. Docker applies the principle of least privilege to provide isolation and reduce the attack surface. In essence, the best practices around container practice are:
  • signing containers 
  • only used images from trusted registries
  • harden the host operating system
  • enforce the principle of least privilege and do not elevate access to access devices
  • offer centralized logging and monitoring
  • run automated vulnerability scanning

The Ecosystem

Since this post is primarily about containers I'll defer the discussion of some the ecosystem for the future. However, it's important to list the main areas people working with containers, microservices and distributed applications should learn:
  • Container Registries: remote registries that allow you to push and share your own images.
  • Orchestration: orchestration tools deploy, manage and monitor your microservices.
  • DNS and Service Discovery: with containers and microservices, you'll probably need DNS and service discovery so that your services can see and talk to each onther.
  • Key-Value Stores: provide a reliable way to store data that needs to be accessed by a distributed system or cluster.
  • Routing: routes the communication between microservices.
  • Load Balancing: load balancing in a distributed system is a complex problem. Consider specific tooling for your app.
  • Logging: microservices and distributed applications will require you to rethink your logging strategy so they're available on a central location.
  • Communication Bus: your applications will need to communicate and using a Bus is the preferred way.
  • Redundancy: necessary to guarantee that your system can sustain load and keep operating on crashes.
  • Health Checking: consistent health checking is necessary to guarantee all services are operating.
  • Self-healing: microservices will fail. Self-healing is the process of redeploying services when they crash.
  • Deployments, CI, CD: redeploying microservices is different than the traditional deployment. You'll probably have to rethink your deployments, CI and CD.
  • Monitoring: monitoring should be centralized for distributed applications.
  • Alerting: it's a good practice to have alerting systems on events triggered from your system.
  • Serverless: allows you to build and run applications and services without running the servers..
  • FaaS - Functions as a service: allows you to develop, run, and manage application functionalities without maintaining the infrastructure.

Conclusion

On this post we reviewed the most important concepts about Docker containers, virtualization and the whole ecosystem. As you probably realized by the lenght of this post, the ecosystem around containers and microservices is huge - and keeps growing! We will cover in more detail much of the topic addressed here on future posts.

In the next posts, we will start divining in the details of some of these technologies.

References

See Also

Tuesday, October 5, 2021

5 alternatives to Docker Hub

Working with Docker? Know the best 5 alternatives to Docker Hub and why use them.
Photo by Alex wong on Unsplash

At this point, you probably used Docker and Docker Hub already. Docker Hub is the world's most popular container registry and an amazing source of high-quality software. But do you know that there are alternatives to it offered on the cloud by Google, Amazon, Microsoft and others?

Today, let's learn about them.

After Docker Hub restricted its support for Open Source projects, this article is getting a lot of traction again. Hope it helps!

Container Registries

But first, let's review what are container registries.

Container registries are cloud-based repositories for storing and distributing Docker (and OCI-compatible) images. They provide a central place to store and share images, which can then be deployed to any environment that hosts containers (like Kubernetes or GKE for example).

Besides that, container registries can build, store, secure, scan, replicate, and manage your images from fully managed, geo-replicated instances, significantly reducing costs and maintenance efforts.

Container registries such as Docker Hub usually operate like this:


Managed Container Registries?

Managed container registries are regular container registries hosted on the cloud. However, they provide significant benefits and, contrary to what you think, are not expensive. Using a managed container registry is recommended as the offered features will save your team a lot of time.

Why use a managed container registry?

As with any other cloud services, there are benefits in using a managed (cloud-based) container registry. The main reason to use them are:

  • Fully-managed: by using fully managed registries, you can release your ops team from maintaining your own repo
  • Private registries: keep images in private repositories and only accessible to team members.
  • Secured: you can use cloud firewall to protect your services.
  • Lower latency: you want a minimum latency between your images and your deployment targets.
  • Integrated security: it's common to have custom authentication, role-based access control and virtual network integration
  • Integrated with your cloud: most managed container registries will provide some integration with your cloud meaning that'll be easier to share and deploy those images to your environments.
  • Automated builds: managed registries allow you to build container images automatically after pushing to your remote repo.
  • CI/CD pipelines: some registries also offer  CI/CD pipelines that automatically build and deploy directly to Kubernetes and other tools.
  • Auto-scaling: allows serving users and hosts wherever they are, with multi-master geo-replication
  • Automated vulnerability scans: some registries will automatically scan your images and alert you on your 
  • Geo-replicated: got a team distributed around the world? A geo-replicated container registry may speed up things for team members as it'll be sitting beside them.

    Docker Hub

    Docker Hub is the world's most popular Docker container registry. With it you can create, manage, and deliver your teams' container applications. Currently, the main features of the paid version of Docker Hub offers:

    • Fully-managed and highly available hosting: ACR hosts and manages your repo for you.
    • Public and Private repos: with the paid plan you can have public and private repos.
    • Parallel Builds: multiple teams can build projects in parallel.
    • Security features: Docker Hub offers important security features such as vulnerability scanning, encryption, TLS and role-based access controls.

    One of the main advantages of Docker Hub is that it's where you'll get official images for the most popular images such as CentOS, Python, Go, Ubuntu, MariaDb, nginx, Node, Alpine, MongoDB and more!

    Docker discontinued its support for Open Source projects so I can no longer recommend it.

    Fore more information about Docker Hub, please click here.

    GitHub Container Registry

    GitHub Container Registry is a software package hosting service from GitHub that allows you to store and manage your Docker images. It supports both public and private repositories and is integrated with GitHub, allowing you to quickly and easily deploy your images to cloud-based services.

    GitHub Container Registry also integrates with GitHub Actions, providing an easy way to automate the build, test, and deploy process for your Docker images.


    GitHub remains my favourite as it integrates great with your code (if you're using a GitHub repo), and is very generous for open source repositories

    You can store and manage Docker and OCI images in the Container registry, which uses the package namespace https://ghcr.io.

    Google Container Registry

    Google Container Registry (GCR) is Google's container history. As Docker Hub, GCR offers the a fully managed image registry allowing you to push/pull your images. Currently the main features of GCR are:
    • Fully-managed and highly available hosting: GCR hosts and manages your repo for you.
    • Automated features: GRC offers automated builds, build triggers and automatic deployments.
    • Extensibe CI/CD integrations: so you can fully automate your pipelines
    • Google Cloud integration: GCR offers built-in integration with the Google Cloud
    • Google Kubernets Engine integration: GRC offers Google Kubernetes Engine integration. It uses the service account configured on the VM instances of cluster nodes to push and pull images.
    • Security features: GCR offers important security features such as vulnerability scanning, encryption, TLS and role-based access controls.
    • OCI-Compatible: compatibility with Docker and OCI-compatible images

    Highlighted Feature: Integration with Google Cloud

    For those using Google Cloud, GCR offers interesting integrations with Google Cloud including integrations with Google Kubernetes Engine and Compute Engine.

    Fore more information about Google Container Registry, please click here.

    Amazon Elastic Container Registry (ECR)

    Amazon Elastic Container Registry (ECR) - ECR is a fully-managed container registry that makes it easy for developers to store, manage, and deploy your images. Currently the main features offered by Amazon ECR are:
    • Fully-managed and highly available hosting: ECR hosts and manages your repo for you.
    • AWS Marketplace: ECR can store your containers and those you buy from AWS Marketplace
    • CI/CD integrations: so you can fully automate your pipelines
    • Automated features: ECR offers automated builds, build triggers and automatic deployments.
    • ECS integration: integration with the Amazon ECS so you can directly run your containers in production
    • Security features: ECR offers important security features such as vulnerability scanning, encryption, TLS and role-based access controls.
    • OCI-Compatible: compatibility with Docker and OCI-compatible images

    Highlighted Feature: ECS Integration

    One of the most interesting features of ECR is its built-in integration with Amazon Elastic Container Service (ECS). From it, you can directly run your containers in production simplifying and accelerating your workflow.

      For more information about Amazon Elastic Container Registry, please click here.

      Azure Container Registry (ACR)

      Azure Container Registry (ACR) is another a fully-managed Docker container registry allowing you to build, store, secure, scan, replicate, and manage container images. ACR is the recommended tool for those running Azure services already. Currently the main features of Azure ACR are:
      • Fully-managed and highly available hosting: ACR hosts and manages your repo for you.
      • Geo-replication: to efficiently manage a single registry across multiple regions.
      • Automated features: ACR offers automated builds, patching, task scheduling, build triggers and automatic deployments.
      • Multi-format: Supports Helm charts, Singularity support, and new OCI artifact-supported formats
      • Integrated security: integrated security with Azure Active Directory (Azure AD) authentication, role-based access control, Docker Content Trust, and virtual network integration
      • Multi-environments: ACR connects across environments including Azure Kubernetes Service and Azure Red Hat OpenShift 
      • CI/CD integrations: so you can fully automate your pipelines
      • OCI-Compatible: compatibility with Docker and OCI-compatible images

      Highlighted Feature: Geo-replication

      One of the main features of ACR is its geo-replication. With it you can enable a registry to serve users, hosts, synchronize artifactsand receive notifications via webhooks. According to Microsoft, global scaling looks like this:

      Fore more information about Azure Container Registry, please click here.

      Quay

      Quay is offered by Red Hat allows you to store your containers on private and public repos. Quay also allows you to automate your container builds, and integrates with GitHub and others. Quay also provides automated scan containers for vulnerabilities and other tools. Currently the main features of Quay are:
      • Public and Private repos: with quay you not only can have private but also public repos to share youre images with the world.
      • High availability and geo-replication: Quay also offers geographic replication for the running of multiple instances of Red Hat Quay across several regions and syncing between data centers.
      • Robot accounts: Create credentials designed for deploying software automatically.
      • Security features: such as authentication, SSL, etc.
      • Logging and auditing: Auditing is essential for everything in your CI pipeline. Actions via API and UI are tracked.
      • CI/CD integrations: so you can fully automate your pipelines.
      • Granular management: Complete control over who can access your containers, track changes, and automatically scan for vulnerabilities.
      • Public and private clouds: Quay is offered on its public cloud or on a on premises version (see below)  
      • Security features: Quay offers important security features such as vulnerability scanning, encryption, TLS and role-based access controls.
      • Automated features: ECR offers automated builds, build triggers and automatic deployments.

      Highlighted Feature: On premises

      In case your organization needs, Quay can also be installed on premises using OpenShift. This is a very important feature for big organizations that run their private clouds and need to keep everything under their own infrastructure.
      Source: Openshift.com

      Fore more information about Quay, please click here.

      Digital Ocean Container Registry

      The good folks at Digital Ocean also offer their own container registry (DOCR). Digital Ocean's container registry lets you store containers for rapid deployment to DigitalOcean Kubernetes.  Currently the main features offered by DOCR are:
      • Fully-managed and highly available hosting: ACR hosts and manages your repo for you.
      • Public and Private repos: with the paid plan you can have public and private repos.
      • Parallel Builds: multiple teams can build projects in parallel.
      • Security features: Docker Hub offers important security features such as vulnerability scanning, encryption, TLS and role-based access controls.

      Highlighted Feature: Integration with Digital Ocean Kubernetes

      With DOCR you can build your container images on any machine, and push them to DigitalOcean Container Registry with the Docker CLI. DigitalOcean Kubernetes seamlessly integrates to facilitate continuous deployment.

      Fore more information about Digital Ocean Container Registry, please click here.

      Conclusion

      On this post we reviewed five alternatives to Docker Hub. As the alternatives discussed offer essentially the same features, rule of thumb should be using what's more convenient for your team. As a guideline, you should choose the service from your of cloud provider as it will integrate with other products you probably use. If on a private cloud, Quay can be a good alternative.

      The essential requirements to look for wen looking for a container registry should be: being fully-managed, private repositories, CI/CD integrations (so you can automate your workflow) and robust security features.

      See Also

      Wednesday, September 1, 2021

      Docker - 28 facts you should know

      Docker is a very mature technology at this point but there's a lot of information that's still confused or ignored. Let's review some facts that everyone working with Docker should know.
      Photo by Shunya Koide on Unsplash

      Docker is a pretty established technology at this point and most people should know what it is. There are however important facts that everyone should know about. Let's see them.

      Docker is not just a Container

      In 2013, Docker introduced what would become the industry standard for containers. For millions of developers today, Docker is the standard way to build apps. However, Docker is much more than that command that you use on the terminal. Docker is a set of platform as a service products that uses OS-level virtualization to deliver software in packages called containers.

      Today, apart from Docker (the containerization tool) Docker Inc (the company) offers:
      • Docker Engine: an open source containerization technology for building and containerizing your applications. Available for Linux and Windows.
      • Docker Compose: a tool for running and orchestrating containers on a single host.
      • Docker Swarm: A toolkit for orchestrating distributed systems at any scale. It includes primitives for node discovery, raft-based consensus, task scheduling and more
      • Docker Desktop: tools to run Docker on Windows and Mac.
      • Docker Hub: the public container registry
      • Docker Registry: server side application that stores and lets you distribute Docker images
      • Docker Desktop Enterprise: offers enterprise tools for the desktop
      • Docker Enterprise: a full set of tools for enterprise customers.
      • Docker Universal Control Plane (UCP): a cluster management solution
      • Docker Kubernetes Service: a full Kubernetes orchestration feature set
      • Security Scans: available on Docker Enterprise.

      The second most loved platform

      Developers love Docker (the tool 😉). Docker was elected the second most loved platform according to StackOverflow's 2019 survey. In fact, the company has made huge contributions to the development ecosystem and is a bliss to use. Well deserved!
      Source: StackOverflow's 2019 survey

      Images != Containers

      A lot of people confuses this and interchangeability mix images and containers. The correct way to think about it is by using an Object-Oriented programming paradigm of Class/Instance. A Docker image is your class whereas the container is your instance. Continuing on the analogy with OO you can create multiple instances (containers) of your class (image).

      As per Docker themselves,
      A container is a standard unit of software that packages up code and all its dependencies so the application runs quickly and reliably from one computing environment to another. A Docker container image is a lightweight, standalone, executable package of software that includes everything needed to run an application: code, runtime, system tools, system libraries and settings.

      Docker was once named dotCloud

      What you know today as Docker Inc., once was called dotCloud Inc.. dotCloud Inc. changed its name to Docker Inc. to grow the ecosystem by establishing Docker as a new standard for containerization, an alternative approach to virtualization which rapidly gained adoption. The project became one of the fastest-growing open source projects on GitHub. Surely it worked!

      Docker is neither the first nor the only tool to run containers

      Docker is neither the first nor the only tool to run containers. In fact, one of the key technologies Docker is based of, the chroot syscall was released in 1979 for Unix v7. Next, the first known container technology was FreeBSD jails (2000), Solaris Zones (2004), LXC (2008) and  Google's mcty. However, Docker made significant contributions to the segment since the establishment of Open Container Initiative (OCI) in 2015. Today the open standards allow tools such as Podman to offer an equivalent Docker CLI.

      Containers are the new unit of deployment

      In the past, applications included tens, and on some cases, hundreds of distinct business units and a huge number of lines of code. Developing, maintaining, deploying and even scaling out those big monoliths required a huge effort. Developers were frequently frustrated that their code would fail on production but would work locally. Containers alleviate this pain as they are deployed exactly as intended, are easier to deploy and can be easily scalable.

      Containers run everywhere

      Due to that fact that containers run on top of the container framework, they abstract the platform they're running in. That's a huge enhancement from the past where IT had to replicate the exact same setup on different environments. It also simplifies due to the fact that today you can deploy your images to your own datacenter, cloud service or even better, to a managed Kubernetes service with confidence that they'll run as they ran on your machine.
      Source: Docker - What's a Container?

      Docker Hub

      Docker Hub is Docker's official container repository. Docker Hub is the most popular container registry in the world and one of the catalysts for the enourmous growth of Docker and containers themselves. Users and companies share their images online and everyone can download and run these images as simple as running the dock run command such as:
      docker run -it alpine /bin/bash
      Docker Hub is also the official repo for some of the world's most popular (and awesome!) technologies including:

      Docker Hub Alternatives

      But Docker Hub's not the only container registry out there. Multiple vendors including AWS, Google, Microsoft and Red Hat have their offerings. Currently, the most popular alternatives to Docker Hub are Google Container Registry (GCR), Amazon Elastic Container Registry (ECR), Azure Container Registry (ACR), Quay and Red Hat Container Registry. All of them offer public and public repos.

      Speaking of private repos, Docker also has a similar offering called Docker Trusted Registry. Available on Docker Enterprise, you can install it on your intranet and securely store, serve and manage your company's images.

      Docker Images

      As per Docker, an image is a lightweight, standalone, executable package of software that includes everything needed to run an application: code, runtime, system tools, system libraries and settings.

      There are important concepts about images and containers that are worth repeating:
      • Images are built on layers, utilizing a technology called UnionFS (union filesystem).
      • Images are readonly. Modifications made by the user are stored on a separate docker volume managed by the Docker daemon. They are removed as soon as the container is removed.
      • Images are managed using  docker image <operation> <imageid>
      • An instance of an image is called a container.
      • Containers are managed with the  docker container <operation> <containerid>
      • You can inspect details about your image with docker image inspect <imageid>
      • Images can be created with docker commit, docker build or Dockerfiles
      • Every image has to have a base image. scratch is the base empty image.
      • Dockerfiles are templates to script images. Developed by Docker, they became the standard for the industry.
      • The docker tool allows you to not only create and run images but also to create volumes, networks and much more.
      For more information about how to build your images, check the official documentation.

      A Layered Architecture

      Docker images are a compilation of read-only layers. The below image shows an example of the multiple layers a Docker image can have. The upper layer is the writeable portion: modifications made by the user are stored on a separate docker volume managed by the Docker daemon. They are removed as soon as you remove the container.

      Volumes are your disks

      Because images and containers are readonly, and because the temporary volume created for your image is lost as soon as the image is removed the recommended way to persist the data for your container is volumes. As per Docker:
      Volumes are the preferred mechanism for persisting data generated by and used by Docker containers. While bind mounts are dependent on the directory structure of the host machine, volumes are completely managed by Docker.
      Some advantages of Volumes over bindmounts are:
      • Volumes are easier to back up or migrate than bind mounts.
      • You can manage volumes using Docker CLI commands or the Docker API.
      • Volumes work on both Linux and Windows containers.
      • Volumes can be more safely shared among multiple containers.
      Creating volumes is as simple as:
      docker volume create myvol
      And using them with your container should be as simple as:
      docker run -it -v myvol:/data alpine:latest /bin/sh
      Other commands of interest for volumes are:
      • docker volume inspect <vol>:  inspects the volume
      • docker volume rm <vol>:  removes the volume
      You can also have read-only volumes by appending :ro to your command

      Dockerfiles

      Dockerfile is a text file that contains all the commands a user could call on the command line to assemble an image. Using docker build users can create an automated build that executes several command-line instructions in succession.

      The most common commands in Dockerfiles are:
      • FROM <image_name>[:<tag>]: specifies the base the current image on <image_name>
      • LABEL <key>=<value> [<key>=value>...]: adds metadata to the image
      • EXPOSE <port>: indicates which port should be mapped into the container
      • WORKDIR <path>: sets the current directory for the following commands
      • RUN <command> [ && <command>... ]: executes one or more shell commands
      • ENV <name>=<value>: sets an environment variable to a specific value
      • VOLUME <path>: indicates that the <path> should be externally mounted volume
      • COPY <src> <dest>: copies a local file, a group of files, or a folder into the container
      • ADD <src> <dest>: same as COPY but can handle URIs and local archives
      • USER <user | uid>: sets the runtime context to <user> or <uid> for commands after this one
      • CMD ["<path>", "<arg1>", ...]: defines the command to run when the container is started

      .dockerignore

      You may be familiar with .gitignore. Docker also accepts a .dockerignore file that can be used to ignore files and directories when building your image. Despite what you heard before, Docker recommends using .dockerignore files:
      To increase the build’s performance, exclude files and directories by adding a .dockerignore file to the context directory.

      Client-Server Architecture

      The Docker tool is split into two parts: a daemon with a RESTful API and a client that interacts to the daemon. The docker command you run on the command line is a frontend and essentially interacts with the daemon. The daemon is a server and a service that listens and responds to requests from the client or services authorized using the HTTP protocol. The daemon also manages your images, containers and all operations including image transfer, storage, execution, network and more.

      runc and containerd

      A technical overview of the internals of Docker can be seen on the below image. Since already discussed some of the technologies on the Platform layer, let's focus now on the technologies found on the platform layer: containerd and runc.
      runc is a CLI tool for spawning and running containers according to the OCI specification. runc was created from libcontainer, a library developed by Docker and donated to the OCI. libcontainer was open sourced by Docker in 2013 and donated by Docker to the Open Container Initiative (OCI).

      containerd is an open source project project and the industry-standard container runtime. Developed by Docker and donated to the CNCF, containerd builds on top of runc, is available as a daemon for Linux and Windows and adds features, such as image transfer, storage, execution, network and more. containerd is by far the most popular container runtime and is the default runtime of Kubernetes 1.8 + and Docker.

      Linux kernel features

      In order to provide isolation, security and resource management, Docker relies on the following features from the Linux Kernel:
      • Union Filesystem (or UnionFS, UFS): UnionFS is a filesystem that allows files and directories of separate file systems to be transparently overlaid, forming a single coherent file system.
      • Namespaces: Namespaces are a feature of the Linux kernel that partitions kernel resources so that one set of processes sees one set of resources while another set of processes sees a different set of resources. Specifically for Docker, PID, net, ipc, mnt and ufs are required.
      • Cgroups: Cgroups allow you to allocate resources — such as CPU time, system memory, network bandwidth, or combinations of these resources — among groups of processes running on a system. 
      • chroot chroot changes the apparent root directory for the current running process and its children. A program that is run in such a modified environment cannot name files outside the designated directory tree.

      A huge Ecosystem

      The ecosystem around containers just keep growing. The image below lists some of the tools and services in the area.

      Today the ecosystem around containers encompasses:
      • Container Registries: remote registries that allow you to push and share your own images.
      • Orchestration: orchestration tools deploy, manage and monitor your microservices.
      • DNS and Service Discovery: with containers and microservices, you'll probably need DNS and service discovery so that your services can see and talk to each onther.
      • Key-Value Stores: provide a reliable way to store data that needs to be accessed by a distributed system or cluster.
      • Routing: routes the communication between microservices.
      • Load Balancing: load balancing in a distributed system is a complex problem. Consider specific tooling for your app.
      • Logging: microservices and distributed applications will require you to rethink your logging strategy so they're available on a central location.
      • Communication Bus: your applications will need to communicate and using a Bus is the preferred way.
      • Redundancy: necessary to guarantee that your system can sustain load and keep operating on crashes.
      • Health Checking: consistent health checking is necessary to guarantee all services are operating.
      • Self-healing: microservices will fail. Self-healing is the process of redeploying them when they crash.
      • Deployments, CI, CD: redeploying microservices is different than the traditional deployment. You'll probably have to rethink your deployments, CI and CD.
      • Monitoring: monitoring should be centralized for distributed applications.
      • Alerting: it's a good practice to have alerting systems on events triggered from your system.
      • Serverless: servless technologies are also growing year over year. Today you can even find solid alternatives clouds such as AWS, Google Cloud and Azure.

      Containers are way more effective than VMs

      While each VM has to have their own kernel, applications, libraries and services, containers do not since they share the resources of the host. VMs are also slower to provision, deploy and restore. So since containers also provide a way to run isolated services, can be lightweight (some are only a few MBs), start quickly, are quicker to deploy and scale, containers are usually the preferred unit of scale these days.
      Source: ZDNnet

      Containers are booming

      According to the latest Cloud Native Computing Foundation survey, 84% of companies use containers in production with 78% using Kubernetes. The Docker Index also provides impressive numbers reporting more than 130 billion pulls just from Docker Hub.
      Source: Docker

      Open standards

      Companies such as Amazon, IBM, Google, Microsoft and Red Hat collaborate under the Open Container Initiative (OCI) which was created from standards and technologies developed by Docker such libcontainer. The standardization allows you to run Docker and other LXC-based containers on third-party tools such as Podman in any operating system.

      Go is the container language

      You won't see this mentioned elsewhere but I'll make this bold statement: Go is the container language. Apart from kernel features (written in C) and lower level services (written in C++), most of the open-source projects in the container space use Go, including:  runc, runtime-tools, Docker CE, containerd, Kubernetes, libcontainer, Podman, Buildah, rkt, CoreDNS, LXD, Prometheus, CRI, etc. 


      gRPC is the standard protocol for synchronous communication

      gRPC is an open source remote procedure call system developed by Google. It uses HTTP/2 for transport, Protocol Buffers as the interface description language, and provides features such as authentication, bidirectional streaming and flow control, blocking or nonblocking bindings, and cancellation and timeouts. gRPC is also the preferred protocol when communicating between containers.

      Orchestration technologies emerge

      The most deployed orchestration tool today is Kubernetes with 78% of the market share. Kubernetes was developed at Google then donated to the the Cloud Native Computing Foundation (CNCF). There are however other container orchestration products are Apache Mesos, Rancher, Open Shift, Docker Cluster on Docker Enterprise, and more.

      Kubernetes is the Container Operating System

      It's impossible talk Docker these days without mentioning Kubernetes. Kubernetes is an open source orchestration system for automating the management, placement, scaling and routing of containers that has become popular with developers and IT operations teams in recent years. It was first developed by Google and contributed to Open Source in 2014, and is now maintained by the Cloud Native Computing Foundation. Since version 1.9 Kubernetes uses containerd sas its container runtime so it can use other container runtimes such CRI-O. A container runtime is responsible for managing and running the individual containers of a pod.

      Today Kubernetes is embedded with Docker Desktop so developers can develop Docker and Kubernetes at the comfort of their desktops. Plus, because Docker containers implement the OCI specification, you can build your containers using a tools such as Buildah / LXD and run in on Kubernetes.

      Security Scans

      Docker also offers a automated scans via Docker Enterprise Platform. Because images are readonly, automated scans are simple as it becomes simply checking the sha of your image. The image below details how this happens. More information is available here.

      Windows also has native container

      As a Windows user, you might already be aware that there exists so-called Windows containers that run natively on Windows. And you are right. Recently, Microsoft has ported the Docker engine to Windows and it is now possible to run Windows containers directly on a Windows Server 2016 without the need for a VM. So, now we have two flavors of containers, Linux containers and Windows containers. The former only run on Linux host and the latter only run on a Windows Server. In this book, we are exclusively discussing Linux containers, but most of the things we learn also apply to Windows containers.  

      Today you can run Windows-based or Linux-based containers on Windows 10 for development and testing using Docker Desktop, which makes use of containers functionality built-in to Windows. You can also run containers natively on Windows Server.

      Service meshes

      More recently, the trend goes towards a service mesh. This is the new buzz word. As we containerize more and more applications, and as we refactor those applications into more microservice-oriented applications, we run into problems that simple orchestration software cannot solve anymore in a reliable and scalable way. Topics in this area are service discovery, monitoring, tracing, and log aggregation. Many new projects have emerged in this area, the most popular one at this time being Istio, which is also part of the CNCF.

      Conclusion

      On this post we reviewed 28 about Docker everyone should know. Hope this article was interesting and that you learned something new today. Docker is a fantastic tool and given it's popularity, it's ecosystem will only grow bigger thus, it's important to learn it well and understand its internals.

      See Also

      About the Author

      Bruno Hildenbrand