Solved

Dockerization and host OS

Posted on 2015-02-19
1
69 Views
Last Modified: 2015-02-23
An expert posted an excellent response to my last question stating that a Docker is primarily used to have a disk image of the entire OS  in order to contain all of the dependencies within a single image and then it can be transported to an IaaS (or other) environment for deployment

I assume most apps are sent within some  sort of Linux system, so would that cause a a depenency upon the Linux version and provider.  If the Docker is CentOS, and the host is Debian, is it still possible to run the docker?
0
Comment
Question by:Anthony Lucia
1 Comment
 
LVL 19

Accepted Solution

by:
simon3270 earned 500 total points
ID: 40620659
No, the container does not hold the OS. That's how many  (most?)  virtual machine systems work, but a dock is more lightweight - it contains just the application and its immediate dependencies. The dock runs on top of the docker engine, and that in turn runs in the host OS. So, all of the docks running on a single host all share the same OS.

I'm not a major user of docker, but I have seen its potential. At work we had 50 docks, each with an instances of an application, running on a single host - there's no way we could have done that with traditional virtual machines.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Problem to start Neon 20 89
Sendmail STARTTLS error 37 84
Removing DES and 3DES ciphers in linux RedHat 6.8 38 100
Adding more CPU cores to a Linux VM 5 66
Network Interface Card (NIC) bonding, also known as link aggregation, NIC teaming and trunking, is an important concept to understand and implement in any environment where high availability is of concern. Using this feature, a server administrator …
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now