Container: Coloring Book
Container: Coloring Book
Container: Coloring Book
CONTAINER
COLORING BOOK
"Who's afraid of the big bad wolf?"
Running containers on a
do-it-yourself platform is
like choosing a piggy
apartment building made of
straw. Buildings made of
straw require constant
upkeep and you are on your
own in terms of support.
Running containers on a
community distro is like
choosing a piggy apartment
building made of sticks.
It might be slightly more
robust / reliable but still
comes with no commercial
support.
Running containers on a
platform like Red Hat
Enterprise Linux or OpenShift,
Red Hat's container application
platform, is like choosing a
piggy apartment building made
of brick. The platform is
supported and maintained by a
trusted partner.
Life in the brick apartment complex is best understood through the
exploration of the following six characteristics...
1 NAMESPACES
2 RESOURCE
CONTROL
3 SECURITY
4 IMAGES
OPEN
5 STANDARDS
6 MANAGEMENT
NAMESPACES
Our piggy friends who live in apartments share the same building and basic
layout. They personalize their space to make it their own.
Container namespaces provide containers a way to identify and 'personalize'
their own space (as the apartment piggies like to do.)
Each apartment is their own little world. Even though the
spaces are right next to each other in the same building,
they can appear completely different from each other.
RESOURCE CONTROL
In a shared resource situation, such as piggies sharing an apartment building,
resource management is key to a good experience for everyone. For example,
flushing the toilet in one
apartment should not
raise the water
temperature in another.
Blowing a fuse in one
apartment should not kill
the power in another.
This is very important with containers, because the kernel is shared. What
makes the Red Hat "Brick Apartment Building" more secure? SELinux, for
one...
Your subscription also gives you access to security analysis tools (like Red Hat's
Deep Container Inspection) to scan your containers and hosts for bad
configurations and vulnerabilities...
... and access to a team of Red Hat Good security practices lower a
security experts who fix issues as they piggy's risk of an unexpected
arise. roast!
IMAGES
It can be overwhelming to furnish an empty apartment (or container) from
scratch.
h t t p : //re d . h t /c o n t a i n e rs