Tech Accelerator
Definition

What is container management and why is it important?

Contributor(s): Emily Mell; Matthew Haughn; Beth Pariseau

Container management refers to a set of practices that govern and maintain containerization software. Container management tools automate the creation, deployment, destruction and scaling of application or systems containers.

Containerization is an approach to software development that isolates processes that share an OS kernel and binds application libraries and dependencies into one deployable unit. IT organizations use containers for cloud-native, distributed -- often microservices-based -- applications, and to package legacy applications for increased portability and efficient deployment.

Container images share one base OS image -- unlike virtual machines (VMs), which require their own. This makes containers lightweight, with only the application configuration information and code needed from the host OS to run. This design also increases interoperability compared to VM hosting. Each container instance can scale independently with demand.

Containers have surged in popularity as IT organizations embrace DevOps, which emphasizes rapid application deployment. Organizations can containerize application code from development through test and deployment.

Benefits of container management

The chief benefit of container management is simplified administration of hosting setups. Container management includes orchestration and schedulers, security tools, storage and virtual network management systems and monitoring.

Organizations can set policies that ensure containers share a host -- or cannot share a host -- based on application design and resource requirements. For example, IT admins should co-locate containers that communicate heavily to avoid latency. Or containers with large resource requirements might require an anti-affinity rule to avoid physical storage overload. Container instances can spin up to meet demand, then shut down, frequently. Containers also must communicate for distributed applications to work, without opening an attack surface to hackers.

A container management ecosystem automates orchestration, log management, monitoring, networking, load balancing, testing and secrets management, along with other processes. Automation enables IT organizations to manage large containerized environments that are too vast for a human operator to keep up with.

Challenges of container management

One drawback to container management is complexity, particularly with open source container orchestration platforms such as Kubernetes and Apache Mesos. Container orchestration tools' installation and setup can be arduous and error prone.

IT operations staff need container management training and skills. It is crucial, for example, to understand the relationships between clusters of host servers as well as how the container network corresponds to applications and dependencies.

Issues of persistence and storage present significant container management challenges. Containers are ephemeral -- designed to exist only when needed. Stateful application activities are difficult because any data produced within a container ceases to exist when the container spins down.

Container security is another concern. Container orchestrators have several components, including an API server and monitoring and management tools. These pieces make it a major attack vector for hackers. Container management system vulnerabilities mirror standard types of OS vulnerabilities, such as those related to access and authorization, images and inter-container network traffic. Organizations should minimize risk with security best practices -- for example, identify trusted image sources and close network connections unless they're needed.

Another challenge is container management tool selection. There is a sprawling proliferation of container management tools and software available to IT organizations. Some organizations hire consultants to ensure that all of the necessary pieces come together in the right order and configuration to suit the business case.

Container management strategy

Forward-thinking enterprise IT organizations and startups alike use containers and container management tools to quickly deploy and update applications.

IT organizations must first implement the correct infrastructure setup for containers, with a solid grasp of the scope and scale of the containerization project in terms of business projections for growth and developers' requirements. IT admins must also know how the existing infrastructure's pieces connect and communicate to preserve those relationships in a containerized environment. Containers can run on bare-metal servers, VMs or in the cloud -- or in a hybrid setup -- based on IT requirements.

Basic structure of a container, and container orchestration via a Kubernetes cluster.
Left: The basic structure of container software, showing application components, the container engine for executing images, and host resources. Right: A Kubernetes cluster includes pods, which can encapsulate one or more containers; nodes, which host one or multiple pods; and the master, which creates and schedules pods.

In addition, the container management tool or platform should meet the project's needs for multi-tenancy; user and application isolation; authentication; resource requirements and constraints; logging, monitoring and alerts; backup management; license management; and other management tasks.

IT organizations should understand their hosting commitment and future container plans, such as if the company will adopt multiple cloud platforms or a microservices architecture.

Major container management software vendors and tools

Kubernetes has become the de facto container management technology for most vendor offerings. At its most basic level, open source Kubernetes automates the process of running, scheduling, scaling and managing a group of Docker containers.

Docker container technology debuted in 2013 and quickly grew in popularity, supported by the container management software of Docker Inc. Google debuted Kubernetes in 2015 and, with more stable releases throughout 2017 and 2018, the technology rapidly attracted industry adoption and forms the basis of various distributions from IT tool vendors. Some commercial vendors offer support for open source container management components, including Kubernetes, or embed those components into products.

This video explains what Kubernetes is and how it works.

Many factors play into how an organization makes the right container management software choice for its particular needs. The container software market's rapid changes means organizations must plan well, and be flexible in those plans.

Some options to explore include the following:

  • Amazon Elastic Container Service and Elastic Container Service for Kubernetes
  • Azure Kubernetes Service
  • Cloud Foundry
  • Google Kubernetes Engine
  • Rancher Labs' Rancher
  • IBM Red Hat OpenShift
  • VMware Enterprise Pivotal Container Service
  • Open source Kubernetes

Container schedulers, orchestration and deployment tools
Vendors and open source communities have created diverse distributions of Kubernetes, which is by far the most popular open source container orchestration software.

Many projects, from service mesh to cluster managers to configuration file editors, are designed to improve one aspect of the main container management technologies. Kubernetes support and partnerships crop up and evolve frequently. For example, service mesh technologies, such as Istio, work alongside Kubernetes to simplify networking. And container management software, such IBM Red Hat OpenShift, can offer an integrated service mesh layer, based on Istio or other technology.

Mesos is an open source project that manages compute clusters, including container clusters and federation. Mesos is designed for large-scale container deployments. D2iQ, formerly known as Mesosphere, offers Mesosphere DC/OS, a commercial product based on Mesos that orchestrates containers with hybrid cloud portability. The company offers its Marathon scheduler and also supports Kubernetes.

The Mesos technology differs from Kubernetes in how it handles federation: Mesos treats federation as a peer group of cooperating deployments, whereas Kubernetes federation has a more specific master-agent relationship where the master unites the operators to support the common goal. Kubernetes' federation functionality remains in flux -- the original 1.0 version is already obsolete, and Kubernetes recommends that users upgrade to version 2.0.

Docker's swarm mode is another open source cluster management utility for containers. Mirantis acquired Docker Inc.'s Enterprise business in 2019, including a commercial version of Docker Swarm.

The lines between container management software categories -- orchestration, security, networking and so on -- blur as container orchestration platforms add native support for additional management capabilities. Container management technology is also being folded into or connected with larger management suites for server hosts and VMs.

Integrated Kubernetes platforms
Integrated container management packages appeal to many organizations because they simplify deployment and management challenges. Examples include IBM Red Hat OpenShift and VMware Enterprise PKS. Commercial container management products are available in various configurations and versions with distinct feature sets.

Another option is Cloud Foundry, an open source platform that uses containers as part of a larger collection of integrated tools. One difference between Cloud Foundry and OpenShift is that Cloud Foundry is more positioned for development, while OpenShift highlights capabilities for the rest of the application lifecycle.

Cloud providers' managed Kubernetes services
Major public cloud providers offer hosted Kubernetes services that handle cluster management. These services include Amazon Elastic Container Service for Kubernetes, Google Kubernetes Engine and Microsoft's Azure Kubernetes Service.

While these as-a-service choices reduce the administrative overhead of deploying and maintaining Kubernetes, they can hamper workload portability in multi-cloud environments. Enterprises should carefully consider these factors before they commit to a cloud-based managed Kubernetes service. Organizations must also assess whether the cloud services are compatible with on-premises deployments and management tools.

Container security tools
Secrets management tools keep track of passwords and tokens in secure environments. Docker secrets management tech exists in Kubernetes as well as Mesosphere, CISOfy's Lynis and HashiCorp's Vault.

For fraud protection, Docker Notary and similar tools certify container images as they move between test, development and production environments.

Static image and runtime container security scanning tools inspect container images before they deploy and track behavior on the network after deployment. This software is available from several vendors, including Aqua Security, Deepfence, NeuVector and Twistlock.

Some general network security platforms, such as Trend Micro Deep Security, also support containers.

Container networking tools
Container-specific virtual networking tools are available from Contiv, Weaveworks and open source projects, such as Project Calico, which focuses on Kubernetes container network management.

Virtual network management platforms that address infrastructure -- such as Ansible Container, VMware NSX and Cisco Application Centric Infrastructure -- also support container technology.

In addition, service mesh technology aids communication between application services within container clusters. It is a unified abstraction layer for container networking. However, without proper management and skills, a service mesh can increase complexity within a containerized environment.

Service mesh technologies include open source projects, such as Linkerd, Envoy, Istio and Kong Inc., as well as offerings from cloud and container management tool vendors.

Container monitoring tools
Specialized monitoring tools track performance, bugs and security in containerized workloads. Container-specific monitoring tools are offered by Sysdig, Google's cAdvisor and the Prometheus tool for Kubernetes.

Some DevOps monitoring platforms monitor containers in addition to other hosting architectures. These products come from companies such as New Relic, Datadog, AppDynamics, IBM, Dynatrace and SignalFx.

The more containers in an environment, the more difficult it becomes to monitor them efficiently. Organizations should make automation capabilities a primary requirement as they evaluate container monitoring tools.

Vital container monitoring capabilities include the following:

  • health monitoring;
  • remediation;
  • root cause analysis;
  • broad system integration; and
  • inactive container detection.

Container storage tools
Many container management tools address the challenge of storage and persistence -- albeit not to perfection -- with approaches from attached volumes to plugins and APIs. Container persistent storage tools that offer true container portability for stateful applications come from Portworx, Blockbridge Networks and IBM Red Hat container-native storage based on Gluster.

Kubernetes implementation considerations

As described above, containers are arranged into pods in Kubernetes, which run on clusters of nodes; pods, nodes and clusters are controlled by a master. A pod is the smallest unit of deployment in Kubernetes, and one pod can include one or multiple containers. IT admins should carefully consider the relationships between these components -- pods, nodes and clusters -- when they set up Kubernetes for their environment.

IT admins and developers can start, stop and restart containers, as well as release updates or check health status, among other actions.

Organizations should plan their container deployment based on how many pieces of the application can scale under load; this is dependent on the application, not the deployment method. Additionally, capacity planning is vital for balanced pod-to-node mapping, and IT admins should ensure high availability with redundancy with master node components.

IT organizations also can address container security concerns by applying some general IT security best practices to containerization. Create multiple security layers throughout the environment, scan all container images for vulnerabilities, enforce signed certificates and run the most up-to-date version of any container or application image. IT admins can work toward greater resource isolation in Kubernetes via multi-tenancy features.

Security attack vectors in a Kubernetes architecture.
Multilayer Kubernetes security is a must because attackers can gain control of everything in the Kubernetes stack, from a container to a cluster. Source: Google

Networking is another significant factor. Kubernetes networking occurs within pods, between pods and in user-to-containerized resource connections. Kubernetes enables pods and nodes to communicate without address translation, allocating subnets as necessary.

Lastly, IT admins working with Kubernetes should prepare to troubleshoot common container performance problems, including those caused by unavailable nodes and noisy neighbors, in an implementation.

This was last updated in March 2020

Continue Reading About What is container management and why is it important?

Dig Deeper on Managing Virtual Containers

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

Is your container deployment run exclusively with native tools, such as Docker, or with third-party container management software, such as Kubernetes?
Cancel

-ADS BY GOOGLE

SearchSoftwareQuality

SearchAppArchitecture

SearchCloudComputing

SearchAWS

TheServerSide.com

SearchDataCenter

SearchServerVirtualization

Close