List of Figures

 

Chapter 1. Welcome to Docker

Figure 1.1. A basic computer stack running two programs that were started from the command line

Figure 1.2. Docker running three containers on a basic Linux computer system

Figure 1.3. Dependency relationships of example program

Figure 1.4. Example programs running inside containers with copies of their dependencies

Figure 1.5. Left: a malicious program with direct access to sensitive resources. Right: a malicious program inside a container.

Figure 1.6. What happens after running docker run

Figure 1.7. Running docker run a second time. Because the image is already installed, Docker can start the new container right away.

Chapter 2. Running software in containers

Figure 2.1. The three containers that you’ll build in this example

Figure 2.2. A fleet of web server containers and related monitoring agents

Figure 2.3. The state transition diagram for Docker containers as reported by the status column

Figure 2.4. Each WordPress and agent container uses the same database and mailer.

Chapter 3. Software installation simplified

Figure 3.1. Flow of topics covered in this chapter

Figure 3.2. Step 1—Software identification

Figure 3.3. Step 2—Locating repositories

Figure 3.4. The steps required to complete the Docker Hub scavenger hunt. Find the mystery repository on Docker Hub. Install the latest image from that repository and run it interactively to get the password.

Figure 3.5. Parts of the pull and save subcommands