フィードを購読する

Containerization is not really a new technology, but it endures because of its efficiency, ease of use, security, and rapid deployment capability. Containers are perfect for isolating applications from on another on a single system. You can containerize just about any service including web, database, application, storage, communication, and so on. 

Often, the primary purpose of containers is isolation. Each containerized service runs in its own space on a system. For example, rather than installing a single instance of a web server on a system and using it to serve dozens of websites with virtual host configurations, you can containerize each of the websites and run them individually. The advantage of this approach is simple: If a single instance of a web server crashes, it takes all of the websites with it. Alternatively, if each website is installed in its own container and one of the sites crashes, it only affects that site. 

Containers can also be more secure than either traditional virtual machines or standalone physical machines. If a single site is compromised, only that container is compromised and not the entire host system. However, if the host system is compromised, then all of the containers are also compromised. The advantage of containerized applications is that the host system is typically not exposed from a container. In other words, the application doesn't "know" it's running in a container. As far as the application is concerned, it is the only application running on the system. Only the host system is aware of the array of containers it hosts.

We'd like to know, from our list, which is the first application that you containerized.

[ Getting started with containers? Check out this free course. Deploying containerized applications: A technical overview. ]

 


執筆者紹介

Ken has used Red Hat Linux since 1996 and has written ebooks, whitepapers, actual books, thousands of exam review questions, and hundreds of articles on open source and other topics. Ken also has 20+ years of experience as an enterprise sysadmin with Unix, Linux, Windows, and Virtualization.

Follow him on Twitter: @kenhess for a continuous feed of Sysadmin topics, film, and random rants.

In the evening after Ken replaces his red hat with his foil hat, he writes and makes films with varying degrees of success and acceptance. He is an award-winning filmmaker who constantly tries to convince everyone of his Renaissance Man status, also with varying degrees of success and acceptance.

Read full bio
UI_Icon-Red_Hat-Close-A-Black-RGB

チャンネル別に見る

automation icon

自動化

テクノロジー、チームおよび環境に関する IT 自動化の最新情報

AI icon

AI (人工知能)

お客様が AI ワークロードをどこでも自由に実行することを可能にするプラットフォームについてのアップデート

open hybrid cloud icon

オープン・ハイブリッドクラウド

ハイブリッドクラウドで柔軟に未来を築く方法をご確認ください。

security icon

セキュリティ

環境やテクノロジー全体に及ぶリスクを軽減する方法に関する最新情報

edge icon

エッジコンピューティング

エッジでの運用を単純化するプラットフォームのアップデート

Infrastructure icon

インフラストラクチャ

世界有数のエンタープライズ向け Linux プラットフォームの最新情報

application development icon

アプリケーション

アプリケーションの最も困難な課題に対する Red Hat ソリューションの詳細

Original series icon

オリジナル番組

エンタープライズ向けテクノロジーのメーカーやリーダーによるストーリー