Smaller than Virtual Machines: Because container images include only the content needed to run an application, saving and sharing is much more efficient with containers than it is with virtual machines (which include entire operating systems).
If you are still interested in using the docker command and docker service, refer to Using the docker command and service for information on how to use those features in RHEL 7. While this guide introduces you to container tools and images, see Managing Containers for more details on those tools. Please see Using the CRI-O Container Engine for details. Instead of relying on the single-node, daemonless tools described in this document, OpenShift requires a daemon-based container engine. However, they are especially suited to run directly on Red Hat Enterprise Linux, in single-node use cases.įor a multi-node container platform, see OpenShift. runc - For providing container run and build features to podman and buildahīecause these tools are compatible with the Open Container Initiative (OCI), they can be used to manage the same Linux containers that are produced and managed by Docker and other OCI-compatible container engines.skopeo - For copying, inspecting, deleting, and signing images.buildah - For building, pushing and signing container images.podman - For directly managing pods and container images (run, stop, start, ps, attach, exec, and so on).Instead, we provide a set of command-line tools that can operate without a container engine. Unlike other container tools implementations, tools described here do not center around the monolithic Docker container engine and docker command. Some tools provided to perform those tasks that run directly on RHEL systems are described in this guide. However, sometimes you might want to build and manage individual containers and images outside of OpenShift. Red Hat OpenShift provides powerful command-line and Web UI tools for building, managing and running containers in units referred to as pods.
All this is meant to provide you with an environment for producing and running enterprise-quality containers. Red Hat Enterprise Linux implements Linux Containers using core technologies such as Control Groups (Cgroups) for Resource Management, Namespaces for Process Isolation, SELinux for Security, enabling secure multi-tenancy and reducing the risk of security exploits. Linux Containers have emerged as a key open source application packaging and delivery technology, combining lightweight application isolation with the flexibility of image-based deployment methods. Getting images from remote Docker registries Creating a private Docker registry (optional) Exposing the docker daemon through a TCP port Modifying the docker daemon options (/etc/sysconfig/docker) Creating and running the MariaDB Database Server Container
Creating and running the Apache Web Server Container
Install and Deploy an Apache Web Server Container
Using Red Hat Software Collections runtime images Adding software to a UBI container (unsubscribed host) Adding software inside the minimal UBI container
Adding software inside the standard UBI container Adding software to a UBI container (subscribed host) Using Red Hat Universal Base Images (standard, minimal, and runtimes) Investigating running and stopped containers Supported Architectures for Containers on RHEL