This article is part of the series that compares Kubernetes and Docker Swarm features.
- Kubernetes Pods, ReplicaSets, And Services Compared To Docker Swarm Stacks
- Kubernetes Deployments Compared To Docker Swarm Stacks
- Kubernetes Ingress Compared To Docker Swarm Equivalent
- Kubernetes ConfigMaps Compared To Docker Swarm Configs
- Kubernetes Secrets Compared To Docker Swarm Secrets
- Kubernetes Namespaces Compared To Docker Swarm Equivalent (If There Is Any)
- Kubernetes RBAC Compared To Docker Swarm RBAC
- Kubernetes Resource Management Compared To Docker Swarm Equivalent
Starting from this article, we’ll compare each Kubernetes feature with Docker Swarm equivalents. That way, Swarm users can have a smoother transition into Kubernetes or, depending on their goals, choose to stick with Swarm.
Please bear in mind that the comparisons will be made only for a specific set of features. You will not (yet) be able to conclude whether Kubernetes is better or worse than Docker Swarm. You’ll need to grasp both products in their entirety to make an educated decision. The comparisons like those that follow are useful only as a base for more detailed examinations of the two products.
For now, we’ll limit the comparison scope to Pods, ReplicaSets, and Services on the one hand, and Docker Service stacks, on the other.
Let’s start with Kubernetes file go-demo-2.yml.
The definition is as follows.
apiVersion: apps/v1beta2 kind: ReplicaSet metadata: name: go-demo-2-db spec: selector: matchLabels: type: db service: go-demo-2 template: metadata: labels: type: db service: go-demo-2 spec: containers: - name: db image: mongo:3.3 ports: - containerPort: 28017 --- apiVersion: v1 kind: Service metadata: name: go-demo-2-db spec: ports: - port: 27017 selector: type: db service: go-demo-2 --- apiVersion: apps/v1beta2 kind: ReplicaSet metadata: name: go-demo-2-api spec: replicas: 3 selector: matchLabels: type: api service: go-demo-2 template: metadata: labels: type: api service: go-demo-2 spec: containers: - name: api image: vfarcic/go-demo-2 env: - name: DB value: go-demo-2-db readinessProbe: httpGet: path: /demo/hello port: 8080 periodSeconds: 1 livenessProbe: httpGet: path: /demo/hello port: 8080 --- apiVersion: v1 kind: Service metadata: name: go-demo-2-api spec: type: NodePort ports: - port: 8080 selector: type: api service: go-demo-2
Now, let’s take a look at the Docker stack defined in go-demo-2-swarm.yml.
The specification is as follows.
version: "3" services: api: image: vfarcic/go-demo-2 environment: - DB=db ports: - 8080 deploy: replicas: 3 db: image: mongo
Both definitions accomplish the same result. There is no important difference from the functional point of view, except in Pods. Docker does not have the option to create something similar. When Swarm services are created, they are spread across the cluster, and there is no easy way to specify that multiple containers should run on the same node. Whether multi-container Pods are useful or not is something we’ll explore later. For now, we’ll ignore that feature.
If we’d execute something like docker stack deploy -c svc/go-demo-2-swarm.yml go-demo-2
, the result would be equivalent to what we got when we run kubectl create -f svc/go-demo-2.yml
. In both cases, we get three replicas of vfarcic/go-demo-2
, and one replica of mongo
. Respective schedulers are making sure that the desired state (almost) always matches the actual state. Networking communication through internal DNSes is also established with both solutions. Each node in a cluster would expose a randomly defined port that forwards requests to the api
. All in all, there are no functional differences between the two solutions.
When it comes to the way services are defined, there is indeed, a considerable difference. Docker’s stack definition is much more compact and straight-forward. We defined, in twelve lines, what took around eighty lines in the Kubernetes format.
One might argue that Kubernetes YAML file could have been smaller. Maybe it could. Still, it’ll be bigger and more complex no matter how much we simplify it. One might also say that Docker’s stack is missing readinessProbe
and readinessProbe
. It is, but not because I forgot to put it there, but because the vfarcic/go-demo-2
image already has HEALTHCHECK
definition that Docker uses for similar purposes. In most cases, Dockerfile is a better place to define health checks than a stack definition. That does not mean that it cannot be set, or overwritten, in a YAML file. It can, when needed. But, this was not the case.
All in all, if we limit ourselves only to Kubernetes Pods, ReplicaSets, and Services, and their equivalents in Docker Swarm, the latter wins due to a much simpler and more straightforward way to define specs. From the functional perspective, both are very similar.
Should you conclude that Swarm is a better option than Kubernetes? Not at all. At least, not until we compare other features. Swarm won the battle, but the war just started. As we progress, you’ll see that there’s much more to Kubernetes. We only scratched the surface.
The DevOps 2.3 Toolkit: Kubernetes
The article you just read is an extract from The DevOps 2.3 Toolkit: Kubernetes.
The goal of the book is not to convince you to adopt Kubernetes but to provide a detailed overview of its features. I want you to become confident in your Kubernetes knowledge and only then choose whether to embrace it. That is, unless you already made up your mind and stumbled upon this book in search of Kubernetes guidance.
The book is about running containers at scale and not panicking when problems arise. It is about the present and the future of software deployment and monitoring. It’s about embracing the challenges and staying ahead of the curve.
Give it a try and let me know what you think.
Reblogged this on Julian Frank's Blog and commented:
I do Agree that the Docker Definition and K8s is too verbose. I like the https://github.com/kubernetes/kompose solution that takes the Docker Compose definition and converts to K8s… Sadly it still isnt the perfect solution for all use cases but does help to get started….
Pingback: Kubernetes Pods, ReplicaSets, and Services Compared to Docker Swarm Stacks – Full-Stack Feed
Pingback: Kubernetes Deployments Compared To Docker Swarm Stacks | Technology Conversations
Pingback: Kubernetes Ingress Compared To Docker Swarm Equivalent | Technology Conversations
Pingback: Kubernetes ConfigMaps Compared To Docker Swarm Configs | Technology Conversations
Pingback: Kubernetes Secrets Compared To Docker Swarm Secrets | Technology Conversations
“One might also say that Docker’s stack is missing readinessProbe and readinessProbe.”
Yup, I was about to mention this. I’m guessing it was supposed to be: One might also say that Docker’s stack is missing readinessProbe and livenessProbe.”
Docker does have
HEALTHCHECK
which acts asreadinessProbe
and, in a waylivenessProbe
as well. It will not send requests to containers that do not pass theHEALTHCHECK
and will, after a number of attempts, kill it.Pingback: Kubernetes Namespaces Compared To Docker Swarm Equivalent (If There Is Any) | Technology Conversations
Pingback: Kubernetes RBAC Compared To Docker Swarm RBAC | Technology Conversations
Pingback: Kubernetes Resource Management Compared To Docker Swarm Equivalent | Technology Conversations