3-things-you-always-wanted-to-know-about-docker-container-but-were-afraid-to-ask

Docker has gotten a lot of attention recently. In fact, some claim that Docker containers will eventually take over hypervisor virtualization. While that remains to be seen and really isn’t the scope of this discussion, it is important to be aware of Docker containers because the technology is gaining in popularity and is a determining factor in the future of VMware. Here are all the questions you always wanted to ask about Docker but were afraid to.

1. What Are Docker Containers?

Docker containers

You can use Docker with Linux, Mac, or Windows, on virtually any device that you use for application development. This flexibility makes it incredibly popular with developers..

You can use Docker with Linux, Mac, or Windows, on virtually any device that you use for application development. This flexibility makes it incredibly popular with developers.

Containers are often referred to as ‘lightweight virtualization‘. However, that’s not a good description. Docker containers are a technology that gives the user the ability to run an application in a totally isolated environment, called a container. If you are familiar with *NIX, containers are very similar to the concept of chroot-ed applications.

Though Docker is a relative newcomer, first released in March of 2013, the concept of running applications in a container environment is not new. Other examples include Solaris Zones and FreeBSD Jails (*NIX), OpenVZ (Linux), etc. That means a container is an OS resource partition and not a hardware partition like Virtualization.

2. What’s the Difference in Docker and Other Container Technologies?

Docker, unlike some other similar technologies, was developed after the cloud became what it is. That means that it was developed from the ground up as a cloud-era solution, instead of cloud being an afterthought. Another benefit of being new to the game of containers is that the development team is still excited about it, meaning new versions are coming out quickly and improvements between versions are significant.

Other ways in which Docker containers are different from other container technologies are:

  • Docker is able to run on any infrastructure, including Linux, Max, Windows and on any machine, including desktops, laptops, the mainframe, or in the cloud.
  • Docker includes a Container HUB, which is essentially a repository of pre-built containers that are ready for users to download and make use of. These containers can also be shared with any applications you create.
  • Docker comes with much better documentation that most of the alternatives.

3. How Are Docker Containers Different from vSphere?

Docker does not require to bundle the OS layer (container) that is necessary for a Virtual Machine based on virtual hardware (VMware vSphere), which is another thing that makes it popular with developers. The time and trouble saved with these steps makes deployment of Docker containers faster and easier.

Running an application in a virtualized environment like VMware vSphere requires that you first create a VM, then install the operating system, and finally deploy the application. Docker is so much lighter. In Docker, you just deploy the application within the dockerized container. You don’t have to set up an OS layer. The application deploys with all of its associated libraries, kernel, etc., which the Docker engine provides.

This low footprint and ease are some of the reasons that VMware partnered with Docker. It’s one of the evolving technologies that is making the entire platform more powerful, flexible, simple, and useful.

You should also check out other posts about Docker and especially how to monitor container using different tools.

Full-Stack Docker performance monitoring

Looking for a better way to keep up with VMware vSphere, virtual containers and other things related to VM? Sign up for our newsletter today!

CNIL
Metrics and Logs

(formerly, Opvizor Performance Analyzer)

VMware vSphere & Cloud
PERFORMANCE MONITORING, LOG ANALYSIS, LICENSE COMPLIANCE!

Monitor and Analyze Performance and Log files:
Performance monitoring for your systems and applications with log analysis (tamperproof using immudb) and license compliance (RedHat, Oracle, SAP and more) in one virtual appliance!

Subscribe to Our Newsletter

Get the latest product updates, company news, and special offers delivered right to your inbox.

Subscribe to our newsletter

Use Case - Tamper-resistant Clinical Trials

Goal:

Blockchain PoCs were unsuccessful due to complexity and lack of developers.

Still the goal of data immutability as well as client verification is a crucial. Furthermore, the system needs to be easy to use and operate (allowing backup, maintenance windows aso.).

Implementation:

immudb is running in different datacenters across the globe. All clinical trial information is stored in immudb either as transactions or the pdf documents as a whole.

Having that single source of truth with versioned, timestamped, and cryptographically verifiable records, enables a whole new way of transparency and trust.

Use Case - Finance

Goal:

Store the source data, the decision and the rule base for financial support from governments timestamped, verifiable.

A very important functionality is the ability to compare the historic decision (based on the past rulebase) with the rulebase at a different date. Fully cryptographic verifiable Time Travel queries are required to be able to achieve that comparison.

Implementation:

While the source data, rulebase and the documented decision are stored in verifiable Blobs in immudb, the transaction is stored using the relational layer of immudb.

That allows the use of immudb’s time travel capabilities to retrieve verified historic data and recalculate with the most recent rulebase.

Use Case - eCommerce and NFT marketplace

Goal:

No matter if it’s an eCommerce platform or NFT marketplace, the goals are similar:

  • High amount of transactions (potentially millions a second)
  • Ability to read and write multiple records within one transaction
  • prevent overwrite or updates on transactions
  • comply with regulations (PCI, GDPR, …)


Implementation:

immudb is typically scaled out using Hyperscaler (i. e. AWS, Google Cloud, Microsoft Azure) distributed across the Globe. Auditors are also distributed to track the verification proof over time. Additionally, the shop or marketplace applications store immudb cryptographic state information. That high level of integrity and tamper-evidence while maintaining a very high transaction speed is key for companies to chose immudb.

Use Case - IoT Sensor Data

Goal:

IoT sensor data received by devices collecting environment data needs to be stored locally in a cryptographically verifiable manner until the data is transferred to a central datacenter. The data integrity needs to be verifiable at any given point in time and while in transit.

Implementation:

immudb runs embedded on the IoT device itself and is consistently audited by external probes. The data transfer to audit is minimal and works even with minimum bandwidth and unreliable connections.

Whenever the IoT devices are connected to a high bandwidth, the data transfer happens to a data center (large immudb deployment) and the source and destination date integrity is fully verified.

Use Case - DevOps Evidence

Goal:

CI/CD and application build logs need to be stored auditable and tamper-evident.
A very high Performance is required as the system should not slow down any build process.
Scalability is key as billions of artifacts are expected within the next years.
Next to a possibility of integrity validation, data needs to be retrievable by pipeline job id or digital asset checksum.

Implementation:

As part of the CI/CD audit functionality, data is stored within immudb using the Key/Value functionality. Key is either the CI/CD job id (i. e. Jenkins or GitLab) or the checksum of the resulting build or container image.

White Paper — Registration

We will also send you the research paper
via email.

CodeNotary — Webinar

White Paper — Registration

Please let us know where we can send the whitepaper on CodeNotary Trusted Software Supply Chain. 

Become a partner

Start Your Trial

Please enter contact information to receive an email with the virtual appliance download instructions.

Start Free Trial

Please enter contact information to receive an email with the free trial details.