Container Technology Wiki
Docker Containers
- Docker 101
- Basic Docker Operations
- Docker Administration
- Docker Security Resources
- Docker OS Interaction
- Docker With Other Tools
- Docker API
- Docker Compose
Kubernetes Guide
- Kubernetes 101
-
Kubernetes Architecture
- Kubernetes Ecosystem
- Kubernetes Nodes
- Kubernetes Pods
- Kubernetes Controllers and Control Plane
- Kubernetes DaemonSets
- Container Runtime Interface
- Working with Containers in Kubernetes
- Working with Images in Kubernetes
- Workloads in Kubernetes
- Kubernetes Services
- Kubernetes Jobs
- Kubernetes and Microservices
- Kubernetes Operators
- Kubernetes Persistent Volumes
- Kubernetes Advantages and Use Cases
-
Kubernetes Operations
- Installing Kubernetes
- Kubernetes Configuration
- Kubernetes Monitoring
- Kubernetes Debugging and Troubleshooting
- Kubernetes Load Balancing
- Kubernetes Security
- Kubernetes Networking
- Kubernetes Storage Management
- Kubernetes in Production
- Working with Kubernetes Ingress
- Kubernetes Security Best Practices
- Managing Kubernetes with Kops and Kubeadm
- Kubernetes Secrets
- Kubernetes Autoscaling
- Kubernetes ConfigMap
- Kubernetes Namespace
- Kubernetes Authentication
- Kubernetes Vault
- CIS Kubernetes Benchmark
- Kubernetes Cluster
- Kubernetes as a Service
- Managed Kubernetes
- Kubernetes Distributions
- Enterprise Kubernetes
Container Basics
- Container Architecture
- Advantages of Containers
- Container Challenges
- Containers and IT Infrastructure
- Enterprise DevOps
- eBPF
- eBPF Linux
Containers Ops
- Container Security Management
- Container Deployment
- Container Monitoring
- Container Automation
- Container Multitenancy
- Container Backup and Disaster Recovery
- Prometheus Monitoring
Container Security
- Container Security Best Practices
- Containers for DevSecOps
- Container Vulnerabilities and Threats
- Container Vulnerability Scanning
- Container Secrets Management
- Container Access Control
- Container Audits and Compliance
- Application Whitelisting
- Zero Trust Networks
- Network Segmentation for Containers
- Container Isolation
- Open Source Security Tools for Containers
- Open Source Vulnerability Scanner
- Open Source Security Tools
- Container Security Tools
Cloud Native Computing Foundation
- AWS EC2 Security
- Cloud-Native Applications
- Cloud-Native Architecture
- Cloud Native AWS
- Cloud Native Development
- Cloud Native Infrastructure
- Cloud Native Security
- Envoy Proxy
- Harbor Kubernetes
- Open Policy Agent
- Oracle Cloud Security
- SaaS Cloud Security
- Security Issues in Cloud Computing
- SPIFFE
- VMware Tanzu
Serverless Computing
- Serverless Architecture
- AWS Lambda
- Azure Functions
- Google Cloud Functions
- Serverless Security
- On-Premises Serverless Platforms
- Function as a Service - FaaS
- Knative
- Serverless vs Containers
Container Platforms
- Containers and Cloud Computing
- Container Operating Systems
- Red Hat Openshift
- Pivotal Container Service
- Multi-Cloud Strategy
- Kubernetes vs Cloud Foundry
- CWPP
Other Container Engines
Kubernetes Alternatives
Container Community and Events
- Container Technology Wiki
- Container Basics
- Container Challenges
Container Challenges
Containers are quickly becoming popular as a way to speed and simplify application deployment. However, while developers often find it fast and easy to deploy containerized applications, experts say that enterprises sometimes run into unexpected challenges when deploying containers in production. This page gathers resources about some of the major challenges in container adoption and how to overcome them.
Below we have compiled publicly available sources from around the world that present views on Container Challenges.
The Container Security book by Liz Rice
Fundamental Technology Concepts that Protect Containerized Applications
Perspectives on Advantages of Containers
Containers: Security Challenges and How to Address Them
There is a general lack of awareness of existing container security concerns and best practices. Organizations need to understand the security issues that arise due to the differences in how VMs and containers function.
The Challenges of Container Orchestration
Businesses are recognizing the competitive need to quickly deliver features to customers—often under the banner of agile software development and containerized architectures are becoming an important part of this story.

Four ways the Container Ecosystem Will Evolve in 2018
techtarget.com

Overcoming 7 Challenges to Enterprise Container Adoption
containerjournal.com

6 Problems with Container Technology
storageos.com

Addressing Container Security Challenges
devops.com
Docker challenges

Docker Challenges and Misconceptions
blog.codeship.com

Docker Monitoring: Challenges Arising from the Containers Nature
blog.pandorafms.org

Top 5 Operational Challenges for Docker Applications
community.oracle.com
Example

How RightScale are Overcoming 5 Common Docker Challenges
slideshare.net
Specific Technologies
Further Reading
Container Storage Best Practices — While a container keeps its bundle of software and dependencies wherever it goes, it doesn’t store data so it can maintain a light footprint. If a process stops or the container is rebooted, all the data associated with any applications within is lost. This page gathers resources about how to overcome this challenge and achieve persistent storage for containers.
Container Networking Best Practices — Container systems need networking functionality in order to function properly and to connect distributed applications across the cloud. This page gathers resources about container networking best practices including, challenges and concepts of container networking.
Containers and OS Compatibility— CMost major operating systems have some sort of container compatibility and since the launch of Docker, there has been an explosion of new container-centric operating systems, including CoreOS, Ubuntu Snappy, RancherOS. This page gathers resources about the challenges in hosting containers on different operating systems.
Get updates on container technology

