201 lines
10 KiB
Markdown
201 lines
10 KiB
Markdown
---
|
|
description: Overview of persisting data in containers
|
|
title: Manage data in Docker
|
|
keywords: storage, persistence, data persistence, volumes, mounts, bind mounts
|
|
redirect_from:
|
|
- engine/admin/volumes/
|
|
---
|
|
|
|
By default all files created inside a container are stored on a writable
|
|
container layer. This means that:
|
|
|
|
- The data doesn't persist when that container no longer exists, and it can be
|
|
difficult to get the data out of the container if another process needs it.
|
|
- A container's writable layer is tightly coupled to the host machine
|
|
where the container is running. You can't easily move the data somewhere else.
|
|
- Writing into a container's writable layer requires a
|
|
[storage driver](/storage/storagedriver/) to manage the
|
|
filesystem. The storage driver provides a union filesystem, using the Linux
|
|
kernel. This extra abstraction reduces performance as compared to using
|
|
_data volumes_, which write directly to the host filesystem.
|
|
|
|
Docker has two options for containers to store files in the host machine, so
|
|
that the files are persisted even after the container stops: _volumes_, and
|
|
_bind mounts_. If you're running Docker on Linux you can also use a _tmpfs mount_.
|
|
If you're running Docker on Windows you can also use a _named pipe_.
|
|
|
|
Keep reading for more information about these two ways of persisting data.
|
|
|
|
## Choose the right type of mount
|
|
|
|
No matter which type of mount you choose to use, the data looks the same from
|
|
within the container. It is exposed as either a directory or an individual file
|
|
in the container's filesystem.
|
|
|
|
An easy way to visualize the difference among volumes, bind mounts, and `tmpfs`
|
|
mounts is to think about where the data lives on the Docker host.
|
|
|
|
![types of mounts and where they live on the Docker host](images/types-of-mounts.png)
|
|
|
|
- **Volumes** are stored in a part of the host filesystem which is _managed by
|
|
Docker_ (`/var/lib/docker/volumes/` on Linux). Non-Docker processes should not
|
|
modify this part of the filesystem. Volumes are the best way to persist data
|
|
in Docker.
|
|
|
|
- **Bind mounts** may be stored *anywhere* on the host system. They may even be
|
|
important system files or directories. Non-Docker processes on the Docker host
|
|
or a Docker container can modify them at any time.
|
|
|
|
- **`tmpfs` mounts** are stored in the host system's memory only, and are never
|
|
written to the host system's filesystem.
|
|
|
|
### More details about mount types
|
|
|
|
- **[Volumes](volumes.md)**: Created and managed by Docker. You can create a
|
|
volume explicitly using the `docker volume create` command, or Docker can
|
|
create a volume during container or service creation.
|
|
|
|
When you create a volume, it is stored within a directory on the Docker
|
|
host. When you mount the volume into a container, this directory is what is
|
|
mounted into the container. This is similar to the way that bind mounts work,
|
|
except that volumes are managed by Docker and are isolated from the core
|
|
functionality of the host machine.
|
|
|
|
A given volume can be mounted into multiple containers simultaneously. When no
|
|
running container is using a volume, the volume is still available to Docker
|
|
and is not removed automatically. You can remove unused volumes using `docker
|
|
volume prune`.
|
|
|
|
When you mount a volume, it may be **named** or **anonymous**. Anonymous
|
|
volumes are not given an explicit name when they are first mounted into a
|
|
container, so Docker gives them a random name that is guaranteed to be unique
|
|
within a given Docker host. Besides the name, named and anonymous volumes
|
|
behave in the same ways.
|
|
|
|
Volumes also support the use of _volume drivers_, which allow you to store
|
|
your data on remote hosts or cloud providers, among other possibilities.
|
|
|
|
- **[Bind mounts](bind-mounts.md)**: Available since the early days of Docker.
|
|
Bind mounts have limited functionality compared to volumes. When you use a
|
|
bind mount, a file or directory on the _host machine_ is mounted into a
|
|
container. The file or directory is referenced by its full path on the host
|
|
machine. The file or directory does not need to exist on the Docker host
|
|
already. It is created on demand if it does not yet exist. Bind mounts are
|
|
very performant, but they rely on the host machine's filesystem having a
|
|
specific directory structure available. If you are developing new Docker
|
|
applications, consider using named volumes instead. You can't use
|
|
Docker CLI commands to directly manage bind mounts.
|
|
|
|
> Bind mounts allow access to sensitive files
|
|
>
|
|
> One side effect of using bind mounts, for better or for worse,
|
|
> is that you can change the **host** filesystem via processes running in a
|
|
> **container**, including creating, modifying, or deleting important system
|
|
> files or directories. This is a powerful ability which can have security
|
|
> implications, including impacting non-Docker processes on the host system.
|
|
{: .important }
|
|
|
|
- **[tmpfs mounts](tmpfs.md)**: A `tmpfs` mount is not persisted on disk, either
|
|
on the Docker host or within a container. It can be used by a container during
|
|
the lifetime of the container, to store non-persistent state or sensitive
|
|
information. For instance, internally, swarm services use `tmpfs` mounts to
|
|
mount [secrets](../engine/swarm/secrets.md) into a service's containers.
|
|
|
|
- **[named pipes](https://docs.microsoft.com/en-us/windows/desktop/ipc/named-pipes)**: An `npipe`
|
|
mount can be used for communication between the Docker host and a container. Common use case is
|
|
to run a third-party tool inside of a container and connect to the Docker Engine API using a named pipe.
|
|
|
|
Bind mounts and volumes can both be mounted into containers using the `-v` or
|
|
`--volume` flag, but the syntax for each is slightly different. For `tmpfs`
|
|
mounts, you can use the `--tmpfs` flag. We recommend using the `--mount` flag
|
|
for both containers and services, for bind mounts, volumes, or `tmpfs` mounts,
|
|
as the syntax is more clear.
|
|
|
|
## Good use cases for volumes
|
|
|
|
Volumes are the preferred way to persist data in Docker containers and services.
|
|
Some use cases for volumes include:
|
|
|
|
- Sharing data among multiple running containers. If you don't explicitly create
|
|
it, a volume is created the first time it is mounted into a container. When
|
|
that container stops or is removed, the volume still exists. Multiple
|
|
containers can mount the same volume simultaneously, either read-write or
|
|
read-only. Volumes are only removed when you explicitly remove them.
|
|
|
|
- When the Docker host is not guaranteed to have a given directory or file
|
|
structure. Volumes help you decouple the configuration of the Docker host
|
|
from the container runtime.
|
|
|
|
- When you want to store your container's data on a remote host or a cloud
|
|
provider, rather than locally.
|
|
|
|
- When you need to back up, restore, or migrate data from one Docker
|
|
host to another, volumes are a better choice. You can stop containers using
|
|
the volume, then back up the volume's directory
|
|
(such as `/var/lib/docker/volumes/<volume-name>`).
|
|
|
|
- When your application requires high-performance I/O on Docker Desktop. Volumes
|
|
are stored in the Linux VM rather than the host, which means that the reads and writes
|
|
have much lower latency and higher throughput.
|
|
|
|
- When your application requires fully native file system behavior on Docker
|
|
Desktop. For example, a database engine requires precise control over disk
|
|
flushing to guarantee transaction durability. Volumes are stored in the Linux
|
|
VM and can make these guarantees, whereas bind mounts are remoted to macOS or
|
|
Windows, where the file systems behave slightly differently.
|
|
|
|
## Good use cases for bind mounts
|
|
|
|
In general, you should use volumes where possible. Bind mounts are appropriate
|
|
for the following types of use case:
|
|
|
|
- Sharing configuration files from the host machine to containers. This is how
|
|
Docker provides DNS resolution to containers by default, by mounting
|
|
`/etc/resolv.conf` from the host machine into each container.
|
|
|
|
- Sharing source code or build artifacts between a development environment on
|
|
the Docker host and a container. For instance, you may mount a Maven `target/`
|
|
directory into a container, and each time you build the Maven project on the
|
|
Docker host, the container gets access to the rebuilt artifacts.
|
|
|
|
If you use Docker for development this way, your production Dockerfile would
|
|
copy the production-ready artifacts directly into the image, rather than
|
|
relying on a bind mount.
|
|
|
|
- When the file or directory structure of the Docker host is guaranteed to be
|
|
consistent with the bind mounts the containers require.
|
|
|
|
## Good use cases for tmpfs mounts
|
|
|
|
`tmpfs` mounts are best used for cases when you do not want the data to persist
|
|
either on the host machine or within the container. This may be for security
|
|
reasons or to protect the performance of the container when your application
|
|
needs to write a large volume of non-persistent state data.
|
|
|
|
## Tips for using bind mounts or volumes
|
|
|
|
If you use either bind mounts or volumes, keep the following in mind:
|
|
|
|
- If you mount an **empty volume** into a directory in the container in which files
|
|
or directories exist, these files or directories are propagated (copied)
|
|
into the volume. Similarly, if you start a container and specify a volume which
|
|
does not already exist, an empty volume is created for you.
|
|
This is a good way to pre-populate data that another container needs.
|
|
|
|
- If you mount a **bind mount or non-empty volume** into a directory in the container
|
|
in which some files or directories exist, these files or directories are
|
|
obscured by the mount, just as if you saved files into `/mnt` on a Linux host
|
|
and then mounted a USB drive into `/mnt`. The contents of `/mnt` would be
|
|
obscured by the contents of the USB drive until the USB drive were unmounted.
|
|
The obscured files are not removed or altered, but are not accessible while the
|
|
bind mount or volume is mounted.
|
|
|
|
## Next steps
|
|
|
|
- Learn more about [volumes](volumes.md).
|
|
- Learn more about [bind mounts](bind-mounts.md).
|
|
- Learn more about [tmpfs mounts](tmpfs.md).
|
|
- Learn more about [storage drivers](/storage/storagedriver/), which
|
|
are not related to bind mounts or volumes, but allow you to store data in a
|
|
container's writable layer.
|