wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Docker Framework

profile
Hitanshi Patel
Sep 14, 2022
0 Likes
0 Discussions
142 Reads

What is a Container?

A container is a application used to bundle up all the neccesary files, libraries and services into one runtime environment. As one unit, the container can easily be moved and run on any operating system in any context. They don’t contain a guest OS for each container and rely on the underlying OS kernel, which makes the containers lightweight.Containers share resources with other containers in the same host OS and provide OS-level process isolation.

Important Terminologies in Docker:

As the image shows, the important terminologies in a docker for it to run are;

Client, Host, Daemon, Registry, Containers and Images

A container is a runnable instance of an image. An image is a read-only template with instructions for creating a Docker container. Often, an image is based on another image, with some additional customization. A Docker registry stores Docker images. Docker Hub is a public registry that anyone can use, and Docker is configured to look for images on Docker Hub by default. You can even run your own private registry.

The Docker client  is the primary way that many Docker users interact with Docker. When you use commands such as docker run, the client sends these commands to dockered, which carries them out. The docker command uses the Docker API. The Docker client can communicate with more than one daemon.The Docker daemon listens for Docker API requests and manages Docker objects such as images, containers, networks, and volumes. A daemon can also communicate with other daemons to manage Docker services.

 


Comments ()


Sign in

Read Next

PHISHING

Blog banner

Blog name

Blog banner

Pipedrive

Blog banner

operating system

Blog banner

Data Warehouse Bus Matrix

Blog banner

What is Spyware?

Blog banner

RACI model in IT services

Blog banner

EFT

Blog banner

Deadlock in Operating systems

Blog banner

Kafka - A Framework

Blog banner

Virtual Memory

Blog banner

IT GOVERNANCE

Blog banner

Virtualisation

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner

Risk factors in service transistion

Blog banner

What Makes Patola the Queen of Silk?

Blog banner

Riddhi Miyani 53003220140

Blog banner

Memory Management

Blog banner

Types of Hackers.

Blog banner

How to Avoid being a Victim of Cybercrime

Blog banner

PERSONALITY DEVELOPMENT

Blog banner

What is online marketing and why do you need to know about it ?

Blog banner

Article on IT development trends

Blog banner

Process in OS

Blog banner

Deadlock in Operating System

Blog banner

Fudgy Tahini Date Chocolate Bars

Blog banner

Disk scheduling

Blog banner

differentiate thinking humanly and rationally

Blog banner

Booting Process In Operating System

Blog banner

BrainGate Technology

Blog banner

Assignment 2

Blog banner

Smartsheet

Blog banner

Internet of Things and cyber security

Blog banner

WomenEmpowerment

Blog banner

Zomato (Income Sources)

Blog banner

Top 5 Places To Stay And Visit In Berlin, Germany

Blog banner

Why is ITSM important in IT organization?

Blog banner

IoT Evolution

Blog banner

Threads

Blog banner

Pandas Matrix Applications

Blog banner

Define Instagram.

Blog banner

Virtual memory

Blog banner