Podcast
Questions and Answers
A company is developing a warehouse management product with a core software component and customizable modules. To minimize costs, which deployment model would be most suitable?
A company is developing a warehouse management product with a core software component and customizable modules. To minimize costs, which deployment model would be most suitable?
- In a virtual private cloud instance dedicated to the specific customer, running on a public cloud
- As containers running in a set of servers available on premise in the customer's datacenter
- As VMs running in a set of servers available on premise in the customer's datacenter
- In a way that is not known by the customer; the software will be delivered online, through the Software-as-a-Service (SaaS) model (correct)
What is a characteristic feature of Common-Off-The-Shelf (COTS) hardware?
What is a characteristic feature of Common-Off-The-Shelf (COTS) hardware?
- Hardware that is used only by normal customers (e.g., individuals), but is not appropriate for cloud workloads
- Hardware that is used in many on-premise data centers, but definitely not appropriate for big hyperscalers (Amazon, Google, Azure, etc.)
- Hardware that is bought in large quantity, standardized, reducing the variety of different hardware present in a datacenter. (correct)
- Hardware that cannot be specialized, e.g., by adding dedicated components such as GPU engines or Infiniband adapters
Which of the following scenarios would most likely benefit from a COTS hardware solution?
Which of the following scenarios would most likely benefit from a COTS hardware solution?
- A government agency needing specialized hardware to meet stringent security and regulatory requirements.
- A small startup with limited capital designing specialized network appliances for niche markets.
- A large cloud provider managing massive datacenters that require cost efficiency and easy scalability. (correct)
- A research lab that develops bleeding-edge artificial intelligence models with custom-designed hardware accelerators.
A company wants to minimize the ongoing maintenance and management overhead of their warehouse management software. Which deployment model is most appropriate?
A company wants to minimize the ongoing maintenance and management overhead of their warehouse management software. Which deployment model is most appropriate?
What is a key trade-off a company should consider when choosing COTS hardware versus custom-built solutions?
What is a key trade-off a company should consider when choosing COTS hardware versus custom-built solutions?
If a Docker container runs an application designed to maximize performance by creating threads equal to the number of available CPU cores, how many threads will it create?
If a Docker container runs an application designed to maximize performance by creating threads equal to the number of available CPU cores, how many threads will it create?
What is generally required for a VM running in OpenStack to be reachable from the public Internet?
What is generally required for a VM running in OpenStack to be reachable from the public Internet?
A pod (and its associated service) in a Kubernetes datacenter is exposed to the internet via an Ingress controller. What destination IP address will network packets have when they first enter the datacenter?
A pod (and its associated service) in a Kubernetes datacenter is exposed to the internet via an Ingress controller. What destination IP address will network packets have when they first enter the datacenter?
In a service mesh architecture, how is each microservice typically integrated with the mesh?
In a service mesh architecture, how is each microservice typically integrated with the mesh?
In computing virtualization, what is the primary function of the Trap-And-Emulate approach?
In computing virtualization, what is the primary function of the Trap-And-Emulate approach?
In CPU para-virtualization, what is the fundamental approach to improve performance?
In CPU para-virtualization, what is the fundamental approach to improve performance?
Regarding CPU rings in modern CPUs, what is their primary purpose in the context of virtualization?
Regarding CPU rings in modern CPUs, what is their primary purpose in the context of virtualization?
What does dynamic binary translation primarily refer to in the context of virtualization?
What does dynamic binary translation primarily refer to in the context of virtualization?
In a virtualized system, what do VMEntry and VMExit instructions facilitate?
In a virtualized system, what do VMEntry and VMExit instructions facilitate?
Regarding computing virtualization, what is a common characteristic of a hypervisor in terms of device emulation?
Regarding computing virtualization, what is a common characteristic of a hypervisor in terms of device emulation?
When considering the image (ISO) of a modern operating system intended for use within a VM, what is typically included in terms of device drivers?
When considering the image (ISO) of a modern operating system intended for use within a VM, what is typically included in terms of device drivers?
What is the primary function of Libvirt in the context of virtualization?
What is the primary function of Libvirt in the context of virtualization?
In Linux-based virtualization, where do QEMU and KVM operate, respectively?
In Linux-based virtualization, where do QEMU and KVM operate, respectively?
Implementing a hot migration of a VM to another server requires moving the state of which components?
Implementing a hot migration of a VM to another server requires moving the state of which components?
In computing virtualization, what defines a 'sensitive' instruction?
In computing virtualization, what defines a 'sensitive' instruction?
In which scenario would a 'ClusterIP' service be most appropriate?
In which scenario would a 'ClusterIP' service be most appropriate?
What is the primary function of an Ingress controller in Kubernetes?
What is the primary function of an Ingress controller in Kubernetes?
Which Kubernetes service type should you use if you need it to be reachable only from inside the cluster?
Which Kubernetes service type should you use if you need it to be reachable only from inside the cluster?
Why is using a Kubernetes Service (e.g., ClusterIP) preferable to directly accessing a pod's IP address?
Why is using a Kubernetes Service (e.g., ClusterIP) preferable to directly accessing a pod's IP address?
Theoretically, how do the memory requirements compare for an application running on bare hardware, in a VM, and in a Docker container?
Theoretically, how do the memory requirements compare for an application running on bare hardware, in a VM, and in a Docker container?
From a theoretical standpoint, assuming no layered filesystem advantages, how do disk requirements compare for an application running on bare hardware, in a VM, and in a Docker container?
From a theoretical standpoint, assuming no layered filesystem advantages, how do disk requirements compare for an application running on bare hardware, in a VM, and in a Docker container?
To create a webserver that can scale as demand increases, which platform would provide the most scalability by default?
To create a webserver that can scale as demand increases, which platform would provide the most scalability by default?
Which of the following capabilities typically requires a service mesh instead of solely relying on a Kubernetes service?
Which of the following capabilities typically requires a service mesh instead of solely relying on a Kubernetes service?
A university with campuses in Torino and Tashkent needs a real-time videoconferencing service. Which is the MOST suitable option?
A university with campuses in Torino and Tashkent needs a real-time videoconferencing service. Which is the MOST suitable option?
If a Docker container attempts to modify its filesystem by writing a file, where will the file be stored?
If a Docker container attempts to modify its filesystem by writing a file, where will the file be stored?
In a Docker layered filesystem, when does a new layer get created?
In a Docker layered filesystem, when does a new layer get created?
Consider a server with two CPUs (52 cores each) and 512 GB RAM. Which of the following statements is MOST accurate regarding the application's resource usage?
Consider a server with two CPUs (52 cores each) and 512 GB RAM. Which of the following statements is MOST accurate regarding the application's resource usage?
Compared to traditional VMs, what is a key advantage of containerization regarding resource utilization within a cluster environment?
Compared to traditional VMs, what is a key advantage of containerization regarding resource utilization within a cluster environment?
An application's Dockerfile includes multiple layers, some large and some small. How does this impact the deployment speed and storage efficiency of the application?
An application's Dockerfile includes multiple layers, some large and some small. How does this impact the deployment speed and storage efficiency of the application?
A development team is migrating a monolithic application to a microservices architecture using Kubernetes. Which of these options would be MOST suitable?
A development team is migrating a monolithic application to a microservices architecture using Kubernetes. Which of these options would be MOST suitable?
What resources would htop
report when run inside a Docker container?
What resources would htop
report when run inside a Docker container?
What is the primary purpose of a Dockerfile?
What is the primary purpose of a Dockerfile?
What is the typical use case for a 'daemonset' in Kubernetes?
What is the typical use case for a 'daemonset' in Kubernetes?
An e-commerce site in Kubernetes is configured as a 'ClusterIP' service. Under what condition(s) might the e-commerce site be reachable from the Internet?
An e-commerce site in Kubernetes is configured as a 'ClusterIP' service. Under what condition(s) might the e-commerce site be reachable from the Internet?
What best describes the function of the 'control loop' concept in Kubernetes?
What best describes the function of the 'control loop' concept in Kubernetes?
What functionality does a Custom Resource provide in Kubernetes?
What functionality does a Custom Resource provide in Kubernetes?
What network connectivity guarantees can you expect when connecting VMs/Dockers to a software bridge?
What network connectivity guarantees can you expect when connecting VMs/Dockers to a software bridge?
What is the most common approach to server selection in a new datacenter?
What is the most common approach to server selection in a new datacenter?
For an e-commerce site using a database-as-a-service in the cloud, what configuration would you choose to achieve 'high-availability'?
For an e-commerce site using a database-as-a-service in the cloud, what configuration would you choose to achieve 'high-availability'?
When deploying an application on a public cloud cluster, what should you keep in mind regarding reliability?
When deploying an application on a public cloud cluster, what should you keep in mind regarding reliability?
In which of the following scenarios is the deployment of cloud computing technologies at the network edge most beneficial?
In which of the following scenarios is the deployment of cloud computing technologies at the network edge most beneficial?
In what context are technologies for computing virtualization utilized?
In what context are technologies for computing virtualization utilized?
What is a key aspect of the filesystem within a Docker container?
What is a key aspect of the filesystem within a Docker container?
A Docker is running on a server that has 2 CPUs (52 cores each). The Docker is limited to use 20% of the available CPU. After the execution of the pieces of code inside this Docker, which of the following is most likely to happen?
A Docker is running on a server that has 2 CPUs (52 cores each). The Docker is limited to use 20% of the available CPU. After the execution of the pieces of code inside this Docker, which of the following is most likely to happen?
After creating a new Docker image starting from the public image ‘Ubuntu:latest’, I perform the following operations:
- I create a folder
/test
- I create a text file
/test/test.txt
- I remove the folder
/test
After this sequence of operations, what is the size of the final Docker image, compared to the original Ubuntu:latest image?
After creating a new Docker image starting from the public image ‘Ubuntu:latest’, I perform the following operations:
- I create a folder
/test
- I create a text file
/test/test.txt
- I remove the folder
/test
After this sequence of operations, what is the size of the final Docker image, compared to the original Ubuntu:latest image?
In computing virtualization, what does the direct assignment for I/O devices signify?
In computing virtualization, what does the direct assignment for I/O devices signify?
When a GuestOS boots in a virtualized environment, what type of devices does it typically detect?
When a GuestOS boots in a virtualized environment, what type of devices does it typically detect?
What is a key characteristic of a VIRTIO driver regarding system calls and VM exits?
What is a key characteristic of a VIRTIO driver regarding system calls and VM exits?
When Linux utilizes the KVM hypervisor, at what CPU ring levels do QEMU and the GuestOS operate?
When Linux utilizes the KVM hypervisor, at what CPU ring levels do QEMU and the GuestOS operate?
In Linux, what primary function do tools like virsh
and virt-manager
serve?
In Linux, what primary function do tools like virsh
and virt-manager
serve?
What constitutes the essential state of a VM that is needed to implement a hot migration?
What constitutes the essential state of a VM that is needed to implement a hot migration?
In computing virtualization, what is the specific purpose of the Trap-And-Emulate approach?
In computing virtualization, what is the specific purpose of the Trap-And-Emulate approach?
Under what conditions will an instruction executed at CPU ring 0 (VMX non-root mode) generate a trap?
Under what conditions will an instruction executed at CPU ring 0 (VMX non-root mode) generate a trap?
How does a VIRTIO driver typically send and receive data in a GuestOS?
How does a VIRTIO driver typically send and receive data in a GuestOS?
What type of binary instructions does dynamic binary translation specifically act on?
What type of binary instructions does dynamic binary translation specifically act on?
How would you describe the Docker network's capabilities?
How would you describe the Docker network's capabilities?
If Docker1 and Docker2 are running on different servers, how does Docker1 establish a network connection to Docker2?
If Docker1 and Docker2 are running on different servers, how does Docker1 establish a network connection to Docker2?
What components are included in the standard network created by Docker on a server?
What components are included in the standard network created by Docker on a server?
How does a Docker container acquire its IP address within a server environment?
How does a Docker container acquire its IP address within a server environment?
If Docker1 and Docker2 are running on the same server, how does Docker1 establish a network connection to Docker2?
If Docker1 and Docker2 are running on the same server, how does Docker1 establish a network connection to Docker2?
Flashcards
Software-as-a-Service (SaaS)
Software-as-a-Service (SaaS)
Delivering software online, customers access it over the internet, without needing to install or manage it on their own systems.
Common-Off-The-Shelf (COTS) Hardware
Common-Off-The-Shelf (COTS) Hardware
Standardized hardware purchased in large quantities to reduce variety in a datacenter.
Virtual Machines (VMs) on-premise
Virtual Machines (VMs) on-premise
Installing copies (VMs) of applications/services on a set of servers available at customer premises.
Containers on-premise
Containers on-premise
Signup and view all the flashcards
Virtual Private Cloud (VPC)
Virtual Private Cloud (VPC)
Signup and view all the flashcards
Kubernetes ClusterIP Service
Kubernetes ClusterIP Service
Signup and view all the flashcards
Kubernetes Ingress Controller
Kubernetes Ingress Controller
Signup and view all the flashcards
Kubernetes 'ClusterIP'
Kubernetes 'ClusterIP'
Signup and view all the flashcards
Why use Kubernetes Service?
Why use Kubernetes Service?
Signup and view all the flashcards
Memory Usage: VM vs Docker
Memory Usage: VM vs Docker
Signup and view all the flashcards
Disk Usage: VM vs Docker
Disk Usage: VM vs Docker
Signup and view all the flashcards
Best Scalable Web Server?
Best Scalable Web Server?
Signup and view all the flashcards
Service Mesh Function
Service Mesh Function
Signup and view all the flashcards
Managed Videoconferencing Service
Managed Videoconferencing Service
Signup and view all the flashcards
Docker Filesystem changes
Docker Filesystem changes
Signup and view all the flashcards
Docker Layer Creation
Docker Layer Creation
Signup and view all the flashcards
ClusterIP Reachability
ClusterIP Reachability
Signup and view all the flashcards
Service Mesh HTTP/HTTPS load balancing
Service Mesh HTTP/HTTPS load balancing
Signup and view all the flashcards
Service Advantage
Service Advantage
Signup and view all the flashcards
Advantages of Docker Layered File System
Advantages of Docker Layered File System
Signup and view all the flashcards
Docker Resource Reporting
Docker Resource Reporting
Signup and view all the flashcards
Dockerfile Purpose
Dockerfile Purpose
Signup and view all the flashcards
Kubernetes 'Daemonset'
Kubernetes 'Daemonset'
Signup and view all the flashcards
ClusterIP Service Reachability
ClusterIP Service Reachability
Signup and view all the flashcards
Kubernetes 'Control Loop'
Kubernetes 'Control Loop'
Signup and view all the flashcards
Kubernetes 'Custom Resource'
Kubernetes 'Custom Resource'
Signup and view all the flashcards
Software Bridge Connectivity
Software Bridge Connectivity
Signup and view all the flashcards
Datacenter Server Homogeneity
Datacenter Server Homogeneity
Signup and view all the flashcards
Database-as-a-Service High Availability
Database-as-a-Service High Availability
Signup and view all the flashcards
Cloud Application Reliability
Cloud Application Reliability
Signup and view all the flashcards
Edge Computing Usefulness
Edge Computing Usefulness
Signup and view all the flashcards
Computing Virtualization Technologies
Computing Virtualization Technologies
Signup and view all the flashcards
Filesystem Isolation in Docker
Filesystem Isolation in Docker
Signup and view all the flashcards
Docker CPU Threads
Docker CPU Threads
Signup and view all the flashcards
OpenStack VM Reachability
OpenStack VM Reachability
Signup and view all the flashcards
Kubernetes Ingress Traffic
Kubernetes Ingress Traffic
Signup and view all the flashcards
Service Mesh Micro-service
Service Mesh Micro-service
Signup and view all the flashcards
Trap-And-Emulate
Trap-And-Emulate
Signup and view all the flashcards
CPU Para-Virtualization
CPU Para-Virtualization
Signup and view all the flashcards
Modern CPU Rings
Modern CPU Rings
Signup and view all the flashcards
Dynamic Binary Translation
Dynamic Binary Translation
Signup and view all the flashcards
VMEntry/VMExit Instructions
VMEntry/VMExit Instructions
Signup and view all the flashcards
Hypervisor Device Emulation
Hypervisor Device Emulation
Signup and view all the flashcards
Modern OS Image (ISO)
Modern OS Image (ISO)
Signup and view all the flashcards
Libvirt
Libvirt
Signup and view all the flashcards
QEMU and KVM in Linux
QEMU and KVM in Linux
Signup and view all the flashcards
Hot Migration of a VM
Hot Migration of a VM
Signup and view all the flashcards
Sensitive Instruction
Sensitive Instruction
Signup and view all the flashcards
Direct assignment for I/O devices
Direct assignment for I/O devices
Signup and view all the flashcards
GuestOS device detection
GuestOS device detection
Signup and view all the flashcards
VIRTIO driver characteristic
VIRTIO driver characteristic
Signup and view all the flashcards
KVM hypervisor rings
KVM hypervisor rings
Signup and view all the flashcards
virsh and virt-manager function
virsh and virt-manager function
Signup and view all the flashcards
VM state for hot migration
VM state for hot migration
Signup and view all the flashcards
Trap-And-Emulate approach
Trap-And-Emulate approach
Signup and view all the flashcards
Instruction at CPU ring 0 (VMX non-root)
Instruction at CPU ring 0 (VMX non-root)
Signup and view all the flashcards
VIRTIO driver data transfer
VIRTIO driver data transfer
Signup and view all the flashcards
Dynamic binary translation in virtualization
Dynamic binary translation in virtualization
Signup and view all the flashcards
Docker network flexibility
Docker network flexibility
Signup and view all the flashcards
Docker network connection across servers
Docker network connection across servers
Signup and view all the flashcards
Docker standard network
Docker standard network
Signup and view all the flashcards
Docker IP address assignment
Docker IP address assignment
Signup and view all the flashcards
Docker network connection within same server
Docker network connection within same server
Signup and view all the flashcards
Study Notes
Product Deployment Options
- Software can be delivered online through the Software-as-a-Service (SaaS) model, which is not known by the customer.
Common-Off-The-Shelf (COTS) Hardware
- COTS hardware is standardized and bought in large quantities, reducing hardware variety in a data center.
Kubernetes "ClusterIP" Service
- A "ClusterIP" service is used for services reachable only inside the cluster, such as a backend database consumed by a web server frontend.
Kubernetes Ingress Controller
- An Ingress controller in Kubernetes enables multiple HTTP/HTTPS services to be delivered on a single TCP port through service multiplexing.
Kubernetes Service for Internal Reachability
- A Kubernetes "ClusterIP" service is used to create a service only reachable from inside a Kubernetes cluster.
Purpose of Kubernetes Service
- A Kubernetes Service (e.g., Cluster IP) handles cases with multiple replicas and pod respawning, unlike direct pod IP addressing.
Memory Requirements
- Memory requirements theoretically compare as: Memory(VM) > Memory(Docker) = Memory(bare hardware).
Disk Requirements
- Disk requirements theoretically compare as: Disk(VM) = Disk(Docker) > Disk(bare hardware), assuming no layered file system advantages.
Scalable Web Server
- Kubernetes on a public cloud is the best choice for creating a web server that scales endlessly.
Service Mesh Functionality
- Load balancing incoming HTTP/HTTPS connections to different service instances based on application-level information (e.g., requested URL) requires a "service mesh" software instead of a Kubernetes "service".
Real-Time Video Conferencing
- Buying a managed service (e.g., Zoom) running in multiple cloud locations across the world is the best option for setting up a real-time video conferencing service.
Docker Filesystem Modification
- A file is written in the file system of the running Docker when a Docker running in a server tries to modify its filesystem.
Docker Layered Filesystem
- The layered file system in Docker builds a new layer each time the Dockerfile executes a command that modifies the current filesystem.
Docker Resource Availability
- A Docker reports 104 CPU cores and 512 GB RAM if the server has 2 CPUs (52 cores each) and 512 GB RAM.
Purpose of Dockerfile
- The Dockerfile defines a "recipe" listing the steps to re-create the container from scratch.
Kubernetes "daemonset"
- A “daemonset” in Kubernetes is used for a pod that must always be running on each Kubernetes node to provide network services.
Kubernetes Cluster with "ClusterIP" Service
- An e-commerce site in a Kubernetes cluster with the web frontend configured as a "ClusterIP" service may be reachable from the Internet depending upon the configuration of the Ingress controller.
Kubernetes "Control Loop"
- The “control loop” concept in Kubernetes is implemented by controllers, which watch the state of the resources in the cluster, then make or request changes where needed.
Kubernetes Custom Resource
- A Custom Resource in Kubernetes enables the definition of generic objects, even not related to any Kubernetes workflow.
VM/Docker Network Connectivity
- By connecting a set of VMs/Dockers to a software bridge, you are NOT able to guarantee full network connectivity to the services running within the VMs/Dockers.
Data Center Servers
- Servers in a new data center are usually all equal in terms of CPU, memory, disks, etc.
High-Availability Database-as-a-Service
- For high-availability, an e-commerce site that leverages a database-as-a-service from the cloud provider should be set up in multiple replicas across different Regions.
Application Deployment
- An application deployment on a cluster in public cloud requires care about reliability, which is not completely guaranteed by the cloud provider.
Edge Computing
- The deployment of cloud computing technologies at the edge of the network is useful with applications that cannot afford network problems, require very low latency, and need to keep some data local, or that need to reduce the data volume before sending it to the cloud.
Computing Virtualization Technologies
- Technologies for computing virtualization are used whenever strong computing isolation is required.
Docker Filesystem
- The filesystem in a Docker at startup is completely independent from the one present on the hosting machine; however, temporary files created during Docker execution are stored in the filesystem of the hosting machine (e.g., /var/tmp/).
Docker CPU Cores
- A Docker running on a server that has 2 CPUs (52 cores each) will create 104 threads.
VM Reachability in OpenStack
- The reachability of a VM running in OpenStack from a customer connected to the Internet must be explicitly enabled in the OpenStack configuration of the VM.
TCP Connection
- When a client (on the Internet) establishes a TCP connection toward a pod/service: Two cascading TCP connections must be established to allow the client to connect to the pod.
Micro-service in a service mesh
- In a service mesh, each micro-service is automatically started with a sidecar that implements the service mesh.
Trap-And-Emulate Approach
- In computing virtualization, the Trap-And-Emulate approach can be used to emulate all the instructions that generate a trap.
CPU Para-virtualization
- Replaces some source code of the GuestOS kernel with the proper equivalent function in the HostOS kernel.
Modern CPUs
- Have many CPU rings, and 2 of them are intended for executing OS kernels.
Dynamic Binary Translation
- Can refer to an instruction executed by GuestOS kernel.
VMEntry and VMExit Instructions
- Enable fast transitions between GuestOS and HostOS kernels.
Computing Virtualization Hypervisor
- Is usually able to emulate a very small number of physical devices.
Operating System Image in a VM
- Usually includes drivers for many physical devices (e.g., Intel NIC), and a few para-virtualized devices (eg., VIRTIO).
Libvirt
- Simplifies the interaction with VMs running on different hypervisors (KVM, Vmware, etc).
Linux
- QEMU runs in user space, KVM runs in kernel space.
Hot Migration
- Implementing a hot migration of a VM to another server requires moving the state of The entire VM (i.e., applications and GuestOS kernel), plus some additional data kept in the hypervisor.
Sensitive Instruction in Computing Virtualization
- Is an instruction that may leak information about the current running kernel context
CPU ring 0
- Can generate a trap if it is a privileged instruction.
VMX root/non-root modes
- Is more efficient when handling system calls.
Userland Program Trap-And-Emulate
- We experience two transitions: User space --> HostOS kernel --> GuestOS kernel.
Direct Assignment for I/O Devices
- A real device that is completely controlled by the GuestOS.
GuestOS in a Virtualized Environment
- It usually detects a set of virtual devices presented to it by the hypervisor.
A VIRTIO Driver
- Does not use VMENTRY/VMEXIT operations.
KVM Hypervisor
- QEMU runs at ring 3 (VMX root), the GuestOS runs at ring 0 (VMX non-root).
Linux Tools virsh and virt-manager
- Enable users to interact with KVM-based VMs in a user-friendly way.
The state of a VM
- The content of the entire memory allocated to the VM plus some additional information stored in the hypervisor.
Computing Virtualization, Trap-And-Emulate approach
- Is used to emulate privileged CPU instructions executed at the wrong privilege level.
Instructions Executed on the CPU
- Will generate a trap if it is either a sensitive or privileged instruction.
VIRTIO
- Uses mainly bi-directional queues shared with the companion backend driver to send/receive data.
Dynamic binary translation
- Often translates a binary instruction executed by the GuestOS kernel.
Docker Network
- Provides a default (simplified) network behavior, but it can also offer high flexibility and customizations such as in a traditional virtualized environment (e.g., KVM).
Docker Network Connection
- Must use the IP address of the server, and the public TCP/UDP port published by Docker2.
Standard Docker Network
- It includes a software bridge, plus routing and NAT functions operating on all the traffic generated by the containers and directed outside of the server.
Docker IP address
- It is "manually" assigned by the Docker framework to the running container.
Network Connection
- It must use the IP address of Docker2, and the actual TCP/UDP port used by the application running in Docker2.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.