Before we dive into some of my highlights from DockerCon 2017, let’s do a quick overview of what Docker is. Quite simply, a “docker” is the software that generates a portable container, of sorts, that allows a collection of apps to run on any operating system.
How is it possible, you ask, for a docker container to allow any app to “Build, Ship and Run,” as the docker motto says, on any OS? Essentially, a docker container uses kernel features to produce resource isolation, CPU, memory, block I/O and more, as well as separate namespaces, to isolate the application’s view of the operating system (a visual depiction of this follows).
Here’s a closer look at this process, using the docker motto as our guide:
Each container can be thought of as a way of virtualizing the application. This requires only the libraries needed by the process to execute the program. Each container can be “constructed” from a simple file known as a Dockerfile.
COPY ./public-html/ /usr/local/apache2/htdocs/
Building the docker image
docker build . -t strongjz/example-httpd
docker push strongjz/example-httpd
Anywhere the Docker daemon can run, a docker container can run.
docker run -p 80:80 strongjz/example-httpd
So now, let’s take a closer look at the conference that brought the world of the docker container to life.
Dockercon 2017 was hosted this year in great state of Texas. They say that everything’s bigger in the Lone Star State, and this year’s DockerCon exemplified that — with a host of Texas-sized sessions and announcements on tap. (To quickly immerse yourself in the experience, click here to take a gander at the Day 1 keynote session:)
Dockercon kicked off with some of the numbers of growth for Docker over the past four years. But what truly resonated with me was the focus on the simplicity of docker for developers, and how security is ingrained in all the components in the Docker ecosystem.
Solomon Hykes, the founder and CTO of Docker, commented that one of Docker’s missions is to “create tools of mass innovations,“ and he outlined three necessary principles that tools of mass invitations should follow:
- Tools should get out of the way
- Tools should adapt to you
- Tools should make the powerful simple
The next aspect of Docker that strikes me as unique is its focus on security. Diogo Monica, security lead at Docker, reiterated in his session during the keynote that you “can’t bolt on security after the fact.”
Monica discussed how Docker integrates security into their secure orchestration in the Docker ecosystem with Swarmkit; this includes Raft Store, node identity, Secret Routing Mesh, and Encrypted Networking.
Day 2 began with a demonstration of Docker Trusted Registry and Docker’s Enterprise tool — the Universal Control Plane. It contains role-based access controls, swarm control and Container scanning — all tools and processes needed in the Enterprise to run containers securely at scale. The part of the day that really caught my attention was the announcements of new features and enhancements:
There were four from Day 2 Keynote that should be highlighted.
- Moby project
- Microsoft and Linux containers
- Oracle Databases and Docker
Linuxkit was open-sourced on stage at Dockercon 2017. It is a toolkit for creating a custom Linux OS, building upon Docker’s idea of creating tools for mass innovations and their philosophy of “batteries included, but swappable.”
Linuxkit was developed in partnership with companies such as HPE, Intel, ARM, IBM and Microsoft. It is dubbed as a “secure, lean and portable Linux subsystem for the container.” It includes open source tooling that allows system builders to build custom Linux subsystems which only include exactly what the runtime platform needs and nothing else.
More information can be learned here.
The Moby Project is another sign that Docker plans to “open-source” its platform and make it available for all to use. Hykes stated during the keynote talk that “if you are a system builder, it means you can collaborate and participate in defining systems more efficiently without being tied to Docker.”
The best analogy to describe Moby Project is that it is “to Docker what Fedora is to Red Hat Enterprise Linux.” Simply put, this means that now, anyone that wants to build specialized containers, can do so.
The Moby Project has three core components:
- A library of containerized backend components (e.g., a low-level builder, logging facility, volume management, networking, image management, containerd, SwarmKit, …)
- A framework for assembling the components into a standalone container platform, and tooling to build, test and deploy artifacts for these assemblies.
- A reference assembly, called Moby Origin, which is the open base for the Docker container platform, as well as examples of container systems using various components from the Moby library or from other projects.
More information on the Moby Project can be found here:
Microsoft and Linux containers
Next, John Grossman, a Microsoft Azure architect, presented information on a development that is as surprising as it is unique: Linux containers running on a Windows host. Microsoft also was a platinum partner for Dockercon 2017. This is no surprise for anyone paying attention — Microsoft has been working with Docker for three years now.
Another announcement from Grossman also captured the imagination: You now can run multiple different version of the Microsoft kernel on the same host. Said Grossman: “Each container gets its own copy of the kernel for the isolation it needs, and yet you get more performance advantage out of that shared kernel container.”
This increasing even more what a developer can do with Windows and Docker — no need to be tied to a specific Windows kernel version.
Oracle and Docker
Developers can now run Oracle 12c in a docker container. It’s as simple as that — anyone who has had to manage, install or configure an Oracle database understands how huge this announcement is for the community. The first set of certified images include: Oracle Database, Oracle MySQL, Oracle WebLogic Server, Oracle Coherence, Oracle Instant Client, and Oracle Java 8 SE (Server JRE).
Dockercon had several levels of sessions, from use cases and deep dives, to what are called “Black Belts.” Here are two black belts talks that are worth watching and running their demos on your own time, to better understand the inner workings of some of the Docker ecosystem.
Container Performance analysis
For those who don’t know who Brendan Gregg is, they may know his work — for instance this infographic:
In his Dockercon season, Gregg helped attendees understand whether it’s the host or the container? Brendan Gregg gives a great presentation on figuring out this question. This post describing the talk will not do it justice — anyone running containers at scale should watch the talk.
Deep Dive in Docker Overlay Networks
Laurent Bernaille, Architect from D2SI, discusses how networking overlays work in Docker Swarm, and then dives into doing just that with only linux commands. Two Docker hosts running in AWS were used. The slides and code used are available on github and slideshare. This session underscored the complexity involved with container overlay networking, and how Swarm simplifies it. Developers don’t need to know all the linux commands to create a network. Docker network create, attach a couple hosts, and done.
From Laurent presentation available at slideshare.
All videos will be posted to Dockercon 2017 playlist https://www.youtube.com/playlist?list=PLkA60AVN3hh_nihZ1mh6cO3n-uMdF7UlV