Container Technology Wiki
Docker Containers
- Docker 101
- Basic Docker Operations
- Docker Administration
- Docker Security Resources
- Docker OS Interaction
- Docker With Other Tools
- Docker API
- Docker Compose
Kubernetes Guide
- Kubernetes 101
-
Kubernetes Architecture
- Kubernetes Ecosystem
- Kubernetes Nodes
- Kubernetes Pods
- Kubernetes Controllers and Control Plane
- Kubernetes DaemonSets
- Container Runtime Interface
- Working with Containers in Kubernetes
- Working with Images in Kubernetes
- Workloads in Kubernetes
- Kubernetes Services
- Kubernetes Jobs
- Kubernetes and Microservices
- Kubernetes Operators
- Kubernetes Persistent Volumes
- Kubernetes Advantages and Use Cases
-
Kubernetes Operations
- Installing Kubernetes
- Kubernetes Configuration
- Kubernetes Monitoring
- Kubernetes Debugging and Troubleshooting
- Kubernetes Load Balancing
- Kubernetes Security
- Kubernetes Networking
- Kubernetes Storage Management
- Kubernetes in Production
- Working with Kubernetes Ingress
- Kubernetes Security Best Practices
- Managing Kubernetes with Kops and Kubeadm
- Kubernetes Secrets
- Kubernetes Autoscaling
- Kubernetes ConfigMap
- Kubernetes Namespace
- Kubernetes Authentication
- Kubernetes Vault
- CIS Kubernetes Benchmark
- Kubernetes Cluster
- Kubernetes as a Service
- Managed Kubernetes
- Kubernetes Distributions
- Enterprise Kubernetes
Container Basics
- Container Architecture
- Advantages of Containers
- Container Challenges
- Containers and IT Infrastructure
- Enterprise DevOps
- eBPF
- eBPF Linux
Containers Ops
- Container Security Management
- Container Deployment
- Container Monitoring
- Container Automation
- Container Multitenancy
- Container Backup and Disaster Recovery
- Prometheus Monitoring
Container Security
- Container Security Best Practices
- Containers for DevSecOps
- Container Vulnerabilities and Threats
- Container Vulnerability Scanning
- Container Secrets Management
- Container Access Control
- Container Audits and Compliance
- Application Whitelisting
- Zero Trust Networks
- Network Segmentation for Containers
- Container Isolation
- Open Source Security Tools for Containers
- Open Source Vulnerability Scanner
- Open Source Security Tools
- Container Security Tools
Cloud Native Computing Foundation
- AWS EC2 Security
- Cloud-Native Applications
- Cloud-Native Architecture
- Cloud Native AWS
- Cloud Native Development
- Cloud Native Infrastructure
- Cloud Native Security
- Envoy Proxy
- Harbor Kubernetes
- Open Policy Agent
- Oracle Cloud Security
- SaaS Cloud Security
- Security Issues in Cloud Computing
- SPIFFE
- VMware Tanzu
Serverless Computing
- Serverless Architecture
- AWS Lambda
- Azure Functions
- Google Cloud Functions
- Serverless Security
- On-Premises Serverless Platforms
- Function as a Service - FaaS
- Knative
- Serverless vs Containers
Container Platforms
- Containers and Cloud Computing
- Container Operating Systems
- Red Hat Openshift
- Pivotal Container Service
- Multi-Cloud Strategy
- Kubernetes vs Cloud Foundry
- CWPP
Other Container Engines
Kubernetes Alternatives
Container Community and Events
- Container Technology Wiki
- Container Platforms
- Pivotal Container Service
- Cloud Foundry vs Docker
Cloud Foundry vs Docker
There are different ways to package different applications to deploy and run them in the cloud. Developers can choose in-between Cloud Foundry and Docker. The two models have certain similarities but, there are also significant differences. This page gather resources about the differences between Cloud Foundry and Docker.
Below we have compiled publicly available sources from around the world that present views on Cloud Foundry vs Docker.
The Container Security book by Liz Rice
Fundamental Technology Concepts that Protect Containerized Applications
Perspectives on Cloud Foundry vs Docker

Is a Cloud Foundry Deployment Right For You?
searchcloudcomputing.techtarget.com

How to Run Docker Images on Pivotal Cloud Foundry
eroter.wordpress.com
How To

Convert your App From Cloud Foundry with Docker and Kubernetes
developer.ibm.com

Deploying Docker on Cloud Foundry
danielsinnott.com
Specific Technologies
Vendor Information

docs.cloudfoundry.org

docs.cloudfoundry.org
Further Reading
- Containers and Cloud Computing— Containers changed the adoption of public and private clouds. With a container image, a common package format can be run on premises as well as on every major cloud provider. This page gathers resources about how containers changed the world of cloud computing and how to run them in the cloud.
- Container Operating Systems— Since containers package so many of the libraries and subsystems that once were part of the operating system into the container, there’s increasingly less need for traditional server operating systems. In their place have sprung up a bevy of lightweight operating systems that significantly reduce the footprint of the operating system. This page gathers resources about lightweight container operating systems such as CoreOS, Rancher OS, Atomic and more.
- Red Hat Openshift— Red Hat OpenShift is an open source container application platform by Red Hat based on top of Docker containers and the Kubernetes container cluster manager for enterprise app development and deployment. This page gathers resources about the benefits of OpenShift, different types of deployments in AWS and Azure and more.
- Pivotal Container Service— Pivotal Container Service (PKS) is an enterprise Kubernetes platform, architected for rapid results, scaling, and reliability on any infrastructure. It enables operators to provision, operate, and manage enterprise-grade Kubernetes clusters using BOSH and Pivotal Ops Manager. This page gather resources about Pivotal Container Service and how to use it.
Multi-Cloud Strategy— Multi-cloud is the use of multiple cloud computing and storage services in a single heterogeneous architecture. This page gathers resources about the benefits, challenges and best practices of multi-cloud adoption.
Kubernetes vs Cloud Foundry— Pivotal’s Cloud Foundry (PCF) and Kubernetes (K8s) are both platform services for deploying cloud-native apps. There’s a lot of functional overlap between PCF and K8s, but it’s important to understand how they differ from each other and when it’s best to use one rather than the other, and when it’s best to use them together.
CWPP— A cloud workload is a discrete capability or amount of work you’d like to run on a c https://www.aquasec.com/wiki/display/containers/Cloud+Native+Securityloud instance. Cloud Workload Protection Platforms (CWPP) is defined by host-centric solutions that target the unique requirements of server workload protection in modern hybrid data center architectures. This page gathers resources about Cloud Workload Protection Platforms.
Get updates on container technology




