Sunday, April 9, 2023

DOCKER ARCHITECTURE




Docker Architecture explains how docker uses a client-server architecture at it's core. Docker engine is used to run the operating system which earlier used to be a virtual machine as docker containers. Today, all the applications now run as Docker containers. The advantages of Docker is that you do not have to purchase extra hardware for your OS. Docker architecture comprises of three main components.

  • Docker client
  • Docker daemon
  • Docker registry.
DOCKER DAEMON : This is responsible for managing docker objects like images, containers, volumes and networks.

DOCKER CLIENT : This helps Docker users to interact with Docker when you apply commands like "docker run", the client sends these commands to dockerd, which carries them out. It also uses REST APIs to communicate with the docker daemon server. 

In a more simpler way, Docker client is like a teacher who tells the Docker daemon what to do. When you use commands like docker run, the client carries these command out. 

DOCKER REGISTRY: This stores docker images.

WHAT INSTANCES CAN I USE DOCKER?

  • Code Pipeline Management
  • Debugging Capabilities
  • Simplifying Configuration
  • Server Configuration
  • Multi-workflow

 DIFFERENCE BETWEEN DOCKER AND VIRTUAL MACHINE

Docker images uses megabytes (smaller)

Docker is faster, and it uses your local machine and O/S as well.

Docker uses the kernel of the Host. 

VM uses larger gigabyte.

VM run any O/S to another Host.


The image shows the new generation architecture virtualization in the world of Docker.



  • The server is the physical server that can used on multiple VM.
  • The Host Operating System (OS) serves as the base of an Ubuntu, Linux, Windows.
  • Docker engine is used to run the operating system as Docker containers.
  • All the Apps run as Docker containers. 
                 
OPERATING SYSTEM 
The operating system has two layers.

Kernel : This communicates with CPU (hardware)
Application: This runs on the kernel. 



I hope this explains how to explore docker images. Have a excellent learning experience😊!

Referencing : Docker Docs: How to build, share, and run applications

Uche Questia : https://www.blogger.com/blog/post/edit/5428112557550405099/1602697879220214062?hl=en



















No comments:

Post a Comment

CONFIGURING A PHISHING CAMPAIGN IN MICROSOFT DEFENDER.

Configuring a phishing campaign in Microsoft Defender (specifically Microsoft Defender for Office 365) involves creating a simulated attack ...