Docker

Docker

Creator
Created
Created
2019 Nov 5 3:14
Editor
Edited
Edited
2025 Jun 21 19:41

High-level tool utilizing
LXD
containers good for
DX

Docker Notion
 
 
Docker Usages
 
 

Docker and Others

www.samsungsds.com

Difference among swarm, compose, network

쇼핑몰 사례로 알아보는 Docker Swarm 과 Compose 의 차이점
안녕하세요 코마 입니다. 오늘은 Docker 에서 Compose 와 Swarm 의 차이점에 대해 알아보겠습니다. 😺 도커는 가장 인기있는 컨테이너링 기술입니다. 그러나 오픈소스 기술이다보니 여러가지 개념들이 혼재되어 있는 경우가 있습니다. 그러나 지향하는 바는 분명하죠 그러한 차원에서 각 기술들을 조명할 필요가 있다고 생각했습니다. 이에, Swarm 과 Compose 의 차이를 쇼핑몰의 사례를 통해 소개해 드리도록 하겠습니다.

Extension

Docker Extensions - Docker
Docker Extensions open a realm of possibilities by adding a variety of tools to your development workflows. Leverage your favorite tools directly from within Docker Desktop with one-click installation of extensions. Discover new ways to implement and optimize workflows in the Marketplace with extensions from both official Extension partners and community members.
Docker Extensions - Docker

Logging

docs.docker.com
Why Docker is eating your disk space - Juhana Jauhiainen
I learned recently, in less than ideal circumstances, that Docker doesn't do any log rotation by default 😱 So if you're running your application in production with Docker and using Docker's default logging driver you might be awakened some night at 3 AM to fix a service outage when you can barely think straight.
Why Docker is eating your disk space - Juhana Jauhiainen

Docker tip

changhoi.github.io
Choose the best package - Snyk Open Source Advisor
Find the best open-source package for your project with Snyk Open Source Advisor. Explore over 1 million open source packages.
Choose the best package - Snyk Open Source Advisor

Security

infosec.adtcaps.co.kr
Top 20 Dockerfile best practices for security - Sysdig
Learn how to prevent security issues and optimize containerized applications by applying a quick set of Dockerfile best practices in your image builds. If you are familiar with containerized applications and microservices, you might have realized that your services might be micro; but detecting vulnerabilities, investigating security issues, and reporting and fixing them after the deployment is making your management overhead macro.
Top 20 Dockerfile best practices for security - Sysdig
 

Recommendations