Overview
The word "Docker" refers to several things, including an open source community project; tools from the open source project; Docker Inc., the company that primarily supports that project; and the tools that company formally supports. The fact that the technologies and the company share the same name can be confusing.
Here's a brief explainer:
- The IT software "Docker” is containerization technology that enables the creation and use of Linux® containers.
- Theopen source Docker community works to improve these technologies to benefit all users.
- The company,Docker Inc., builds on the work of the Docker community, makes it more secure, and shares those advancements back to the greater community. It then supports the improved and hardened technologies for enterprise customers.
With Docker, you can treat containers like extremely lightweight, modular virtual machines. And you get flexibility with those containers—you can create, deploy, copy, and move them from environment to environment, which helpsoptimize your apps for the cloud.
How does Docker work?
The Docker technology uses theLinux kernel and features of the kernel, likeCgroups andnamespaces, to segregate processes so they can run independently. This independence is the intention of containers—the ability to run multiple processes and apps separately from one another to make better use of your infrastructure whileretaining the security you would have with separate systems.
Container tools, including Docker, provide an image-based deployment model. This makes it easy to share an application, or set of services, with all of their dependencies across multiple environments. Docker also automates deploying the application (or combined sets of processes that make up an app) inside this container environment.
These tools built on top of Linux containers—what makes Docker user-friendly and unique—gives users unprecedented access to apps, the ability to rapidly deploy, and control over versions and version distribution.
Red Hat resources
Docker vs. Linux containers: Is there a difference?
Although sometimes confused, Docker is not the same as a traditional Linux container. Docker technology was initially built on top of theLXC technology—which most people associate with "traditional" Linux containers—though it’s since moved away from that dependency. LXC was useful as lightweightvirtualization, but it didn’t have a great developer or user experience. The Docker technology brings more than the ability to run containers—it also eases the process of creating and building containers, shipping images, and versioning of images, among other things.
Traditional Linux containers use an init system that can manage multiple processes. This means entire applications can run as one. The Docker technology encourages applications to be broken down into their separate processes and provides the tools to do that. This granular approach has its advantages.
Advantages of Docker containers
Modularity
The Docker approach to containerization focuses on the ability to take down a part of an application to update or repair, without having to take down the whole app. In addition to this microservices-based approach, you can share processes among multiple apps in much the same wayservice-oriented architecture (SOA) does.
Layers and image version control
Each Docker image file is made up of a series of layers that are combined into a single image. A layer is created when the image changes. Every time a user specifies a command, such asrun orcopy, a new layer gets created.
Docker reuses these layers to build new containers, which accelerates the building process. Intermediate changes are shared among images, further improving speed,size, and efficiency. Also inherent to layering is version control: Every time there’s a new change, you essentially have a built-in changelog, providing you with full control over your container images.
Rollback
Perhaps the best part about layering is the ability to roll back. Every image has layers. Don’t like the current iteration of an image? Roll it back to the previous version. This supports an agile development approach and helps makecontinuous integration and deployment (CI/CD) a reality from a tools perspective.
Rapid deployment
Getting new hardware up, running, provisioned, and available used to take days, and the level of effort and overhead was burdensome. Docker-based containers can reduce deployment to seconds. By creating a container for each process, you can quickly share those processes with new apps. And, since an operating system doesn’t need to boot to add or move a container, deployment times are substantially shorter. Paired with shorter deployment times, you can easily and cost-effectively create and destroy data created by your containers without concern.
So, Docker technology is a more granular, controllable, microservices-based approach that places greater value on efficiency.
Are there limitations to using Docker?
Docker, by itself, can manage single containers. When you start using more and more containers and containerized apps, broken down into hundreds of pieces, management and orchestration can get difficult. Eventually, you need to take a step back and group containers to deliver services—networking, security, telemetry, and more—across all of your containers. That's where Kubernetes comes in.
With Docker, you don’t get the same UNIX-like functionality that you get with traditional Linux containers. This includes being able to use processes like cron or syslog within the container, alongside your app. There are also limitations on things like cleaning up grandchild processes after you terminate child processes—something traditional Linux containers inherently handle. These concerns can be mitigated by modifying the configuration file and setting up these abilities from the start–but that may not be obvious at a first glance.
On top of this, there are otherLinux subsystems and devices that aren’t namespaced. These includeSELinux, Cgroups, and /dev/sd* devices. This means that if an attacker gains control over these subsystems, the host is compromised. In order to stay lightweight, the sharing of the host kernel withcontainers opens this possibility of a security vulnerability. This differs from virtual machines, which are much more tightly segregated from the host system.
TheDocker daemon can also be a security concern. To use and run Docker containers, you’ll most likely be using the Docker daemon, a persistent runtime for containers. Docker daemon requires root privileges, so special care must be taken regarding who gets access to this process and where the process resides. For example, a local daemon has a smaller attack surface than one that lives in a more public location, such as a web server.
Red Hat named a Leader in 2025 Gartner® Magic Quadrant™ for Container Management
Read the 2025 Gartner® Magic Quadrant™ for Container Management to learn why Red Hat OpenShift has been named a “Leader” for the 3rd year in a row.
All Red Hat product trials
Keep reading
Ansible vs. Puppet: What you need to know
Ansible vs. Salt: What you need to know
Ansible vs. Chef: What you need to know
Open source resources
Related content
Blog post
Blog post
Case study
Blog post
How sovereign is your strategy? Introducing the Red Hat Sovereignty Readiness Assessment tool
Related articles
- What is an image builder?
- Red Hat OpenShift for developers
- What is a Linux container?
- Why choose Red Hat for Kubernetes?
- What is Linux?
- What is CaaS?
- Ansible vs. Chef: What you need to know
- Ansible vs. Puppet: What you need to know
- Ansible vs. Salt: What you need to know
- Ansible vs. Terraform
- What is Podman?
- What is Podman Desktop?
- Containers vs. VMs: Similarities, differences, and combined approaches
- Edge computing with Red Hat OpenShift
- What is InstructLab?
- What is container orchestration?
- What is Istio?
- What is CentOS Stream?
- Stateful vs stateless applications
- What is Kubernetes?
- Red Hat OpenShift on VMware
- What is KVM?
- What is KubeVirt?
- Why use Red Hat Ansible Automation Platform with Red Hat OpenShift?
- What are CentOS replacements?
- What is CentOS?
- What are hosted control planes?
- What is the Kubernetes Java client?
- What is kubernetes security?
- What is Helm?
- What is Argo CD?
- What is MicroShift?
- How Kubernetes can help AI/ML
- OpenJDK versus Oracle JDK
- What is Cloud Foundry?
- What is Kubeflow?
- What are microservices?
- What is container security?
- OpenShift vs. OpenStack: What are the differences?
- What are sandboxed containers
- What is Buildah?
- Kubernetes vs OpenStack
- What are validated patterns?
- Understanding Ansible, Terraform, Puppet, Chef, and Salt
- Kubernetes on AWS: Self-Managed vs. Managed Applications Platforms
- What's the best Linux distro for you?
- Red Hat OpenShift vs. OKD
- Red Hat OpenShift vs. Kubernetes: What's the difference?
- Why run Apache Kafka on Kubernetes?
- What is Apache Kafka?
- What is high availability and disaster recovery for containers?
- Spring on Kubernetes with Red Hat OpenShift
- What is a golden image?
- Ansible vs. Red Hat Ansible Automation Platform
- What are Red Hat OpenShift cloud services?
- VNF and CNF, what’s the difference?
- What is a container registry?
- What is Skopeo?
- What are Red Hat OpenShift Operators?
- Using Helm with Red Hat OpenShift
- Kubernetes security best practices
- What is Grafana?
- Orchestrating Windows containers on Red Hat OpenShift
- What is open source software?
- What is a Kubernetes operator?
- Open source vs. proprietary software in vehicles
- High performance computing with Red Hat OpenShift
- Advantages of Kubernetes-native security
- What is KubeLinter?
- Intro to Kubernetes security
- Container and Kubernetes compliance considerations
- How microservices support IT integration in healthcare
- Kubernetes cluster management
- Red Hat OpenShift on IBM IT infrastructure
- Red Hat OpenShift for business leaders
- How to deploy Red Hat OpenShift
- Cost management for Kubernetes on Red Hat OpenShift
- What is enterprise Kubernetes?
- What is RKT?
- What makes Red Hat OpenShift the right choice for IT operations?
- What makes Red Hat OpenShift the right choice for SAP?
- Kubernetes-native Java development with Quarkus
- What is Kubernetes role-based access control (RBAC)
- What is Kogito?
- What is containerization?
- What was CoreOS and CoreOS container Linux
- Learning Kubernetes basics
- What is service-oriented architecture?
- What is the Kubernetes API?
- What is Kubernetes cluster management?
- What is a Kubernetes deployment?
- Why choose the Red Hat build of Quarkus?
- Introduction to Kubernetes architecture
- Introduction to Kubernetes patterns
- What is a Kubernetes cluster?
- What is Quarkus?
- What is Jaeger?
- What is open source?
- What is container-native virtualization?
- What is Clair?
- What is Knative?
- What is etcd?
- Why choose Red Hat for microservices?
- Why choose Red Hat for containers?
- What is a Kubernetes pod?
