Oliver Seitz
Docker exec without Docker
#1about 1 minute
Understanding how the docker exec command really works
The talk explores what happens under the hood when you run `docker exec` and demonstrates how to achieve the same result without using Docker.
#2about 1 minute
Deconstructing the Docker stack to its Linux primitives
Docker is built on top of lower-level components like containerD and runC, which ultimately rely on core Linux kernel features like Cgroups and namespaces.
#3about 3 minutes
Limiting container resources using Linux Cgroups
Cgroups are a Linux kernel feature used to limit and account for resource usage, such as CPU, memory, process IDs, and I/O for a collection of processes.
#4about 4 minutes
A live demo of limiting process CPU with Cgroups
A practical demonstration shows how to create a new Cgroup, define a CPU usage limit in the `cpu.max` file, and assign a running process to it.
#5about 6 minutes
Isolating processes from each other using Linux namespaces
Namespaces provide process isolation by virtualizing system resources like network interfaces, mount points, process IDs, and user IDs for each container.
#6about 9 minutes
Replicating `docker exec` with the `nsenter` command
By finding a container's process ID on the host, you can use the `nsenter` command to enter all of its namespaces and gain a shell inside the container without using Docker.
#7about 3 minutes
Key takeaways and advice for deeper technical understanding
A summary of how Cgroups and namespaces power containers is followed by advice for developers to dig deeper into technologies, focus on one topic at a time, and share their knowledge.
Related jobs
Jobs that call for the skills explored in this talk.
Matching moments
06:06 MIN
Why Dockerfile security is a critical foundation
A practical guide to writing secure Dockerfiles
13:51 MIN
Using containers to improve security and deployment
DevSecOps: Security in DevOps
06:26 MIN
Running containers with access to vehicle electronics
A Hitchhikers Guide to Container Security - Automotive Edition 2024
02:30 MIN
The evolution of running databases in containers
Databases on Kubernetes: Why you should care
25:28 MIN
Executing a container breakout using the Dirty Pipe vulnerability
Hacking Kubernetes: Live Demo Marathon
00:04 MIN
Why running databases in containers is now a reality
Databases on Kubernetes
12:23 MIN
Advanced security practices for hardening Dockerfiles
A practical guide to writing secure Dockerfiles
42:10 MIN
Summary and key takeaways for containerized tooling
Reusing apps between teams and environments through Containers
Featured Partners
Related Videos
Docker network without Docker
Oliver Seitz
Turning Container security up to 11 with Capabilities
Mathias Tausig
Compose the Future: Building Agentic Applications, Made Simple with Docker
Mark Cavage, Tushar Jain, Jim Clark & Yunong Xiao
Kubernetes Security - Challenge and Opportunity
Marc Nimmerrichter
This Is Not Your Father's .NET
Don Schenck
All things Docker Compose!
Michael Irwin
Bootable AI Containers with Podman Desktop
Kevin Dubois & Cedric Clyburn
Containers and Kubernetes made easy: Deep dive into Podman Desktop and new AI capabilities
Stevan Le Meur
From learning to earning
Jobs that call for the skills explored in this talk.


DevOps Engineer – Kubernetes & Cloud (m/w/d)
epostbox epb GmbH
Berlin, Germany
Intermediate
Senior
DevOps
Kubernetes
Cloud (AWS/Google/Azure)


Entwickler .NET / C# mit Docker-Erfahrung
vitaDOOR GmbH & Co. KG
.NET
Vue.js
Docker
ASP.NET
Microsoft SQL Server

Cloud & Infrastructure Specialist - Linux & Docker
Rocken Schweiz/suisse/switzerland
Remote
Bash
Linux
Docker
Ansible
+3

IT Systems Engineer for Linux Server & Container Platforms
INNITI Services GmbH
Remote
€46K
Bash
Python
VMware
+4

DevOps Engineer für Containerplattformen und CI/CD
Rocken AG
Linux
DevOps
vSphere
Kubernetes
Continuous Integration
+1

