Category Docker

Security in Docker

Security in Docker

Docker's security centers on four areas: kernel security; Docker daemon access control; container configuration and base image trustworthiness; adherence to runtime best practices.
Containers connected in network

Overview of networking in Docker

Docker containers require networking to communicate, which is enabled by default. Various network drivers allow for customized networks behaviour. Docker accommodates different network drivers; default bridge networks isolate containers, host networks optimize performance and remove isolation, and overlay networks support distributed systems. Specialized ipvlan and macvlan provide advanced network control, with ‘none’ offering complete isolation. Docker's pluggable networking system allows for third-party plugins, especially useful in swarm mode.
Data persistence

Data persistence in Docker

Containers inherently lack persistent storage, requiring external solutions for data preservation beyond their lifespan. Docker offers Volumes for data persistence, Bind mounts for real-time file sharing between host and container, and tmpfs mounts for temporary in-memory data storage on Linux.
Docker - whale

Getting Started with Docker

Docker Engine, an open-source containerization technology, is available via Docker Desktop for Windows and Mac, with a GUI for container management. A sample application's containerization involves cloning a repository, creating a Dockerfile, building the image, and running the container. Changes to the application require rebuilding and rerunning the container.