Inscreva-se no feed

Containerization is not really a new technology, but it endures because of its efficiency, ease of use, security, and rapid deployment capability. Containers are perfect for isolating applications from on another on a single system. You can containerize just about any service including web, database, application, storage, communication, and so on. 

Often, the primary purpose of containers is isolation. Each containerized service runs in its own space on a system. For example, rather than installing a single instance of a web server on a system and using it to serve dozens of websites with virtual host configurations, you can containerize each of the websites and run them individually. The advantage of this approach is simple: If a single instance of a web server crashes, it takes all of the websites with it. Alternatively, if each website is installed in its own container and one of the sites crashes, it only affects that site. 

Containers can also be more secure than either traditional virtual machines or standalone physical machines. If a single site is compromised, only that container is compromised and not the entire host system. However, if the host system is compromised, then all of the containers are also compromised. The advantage of containerized applications is that the host system is typically not exposed from a container. In other words, the application doesn't "know" it's running in a container. As far as the application is concerned, it is the only application running on the system. Only the host system is aware of the array of containers it hosts.

We'd like to know, from our list, which is the first application that you containerized.

[ Getting started with containers? Check out this free course. Deploying containerized applications: A technical overview. ]

 


Sobre o autor

Ken has used Red Hat Linux since 1996 and has written ebooks, whitepapers, actual books, thousands of exam review questions, and hundreds of articles on open source and other topics. Ken also has 20+ years of experience as an enterprise sysadmin with Unix, Linux, Windows, and Virtualization.

Follow him on Twitter: @kenhess for a continuous feed of Sysadmin topics, film, and random rants.

In the evening after Ken replaces his red hat with his foil hat, he writes and makes films with varying degrees of success and acceptance. He is an award-winning filmmaker who constantly tries to convince everyone of his Renaissance Man status, also with varying degrees of success and acceptance.

Read full bio
UI_Icon-Red_Hat-Close-A-Black-RGB

Navegue por canal

automation icon

Automação

Últimas novidades em automação de TI para empresas de tecnologia, equipes e ambientes

AI icon

Inteligência artificial

Descubra as atualizações nas plataformas que proporcionam aos clientes executar suas cargas de trabalho de IA em qualquer ambiente

open hybrid cloud icon

Nuvem híbrida aberta

Veja como construímos um futuro mais flexível com a nuvem híbrida

security icon

Segurança

Veja as últimas novidades sobre como reduzimos riscos em ambientes e tecnologias

edge icon

Edge computing

Saiba quais são as atualizações nas plataformas que simplificam as operações na borda

Infrastructure icon

Infraestrutura

Saiba o que há de mais recente na plataforma Linux empresarial líder mundial

application development icon

Aplicações

Conheça nossas soluções desenvolvidas para ajudar você a superar os desafios mais complexos de aplicações

Original series icon

Programas originais

Veja as histórias divertidas de criadores e líderes em tecnologia empresarial