Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Selfhosted
  3. Why all docker compose files use the managed docker volumes instead of directly mounting a custom directory?

Why all docker compose files use the managed docker volumes instead of directly mounting a custom directory?

Scheduled Pinned Locked Moved Selfhosted
selfhosted
8 Posts 8 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • P This user is from outside of this forum
    P This user is from outside of this forum
    [email protected]
    wrote on last edited by
    #1

    All docker files look something like this

    services:
      service_name:
        image: author/project:latest
        container_name: service_name
        volumes:
          - service_data:/app/data/
    
    volumes:
      service_data:
    

    Yes, this makes the data to persist, but it creates a directory with a random name inside /var/lib/docker/volumes/
    This makes it really hard to actually have ownership of the data of the service (for example to create backups, or to migrate to another host)

    Why is it standard practice to use this instead of having a directory mounted inside at the same level you have your docker-compose.yml?
    Like this - ./service_data:/app/data

    M A J G eager_eagle@lemmy.worldE 6 Replies Last reply
    16
    • P [email protected]

      All docker files look something like this

      services:
        service_name:
          image: author/project:latest
          container_name: service_name
          volumes:
            - service_data:/app/data/
      
      volumes:
        service_data:
      

      Yes, this makes the data to persist, but it creates a directory with a random name inside /var/lib/docker/volumes/
      This makes it really hard to actually have ownership of the data of the service (for example to create backups, or to migrate to another host)

      Why is it standard practice to use this instead of having a directory mounted inside at the same level you have your docker-compose.yml?
      Like this - ./service_data:/app/data

      M This user is from outside of this forum
      M This user is from outside of this forum
      [email protected]
      wrote on last edited by
      #2

      Easier cleanup

      1 Reply Last reply
      0
      • P [email protected]

        All docker files look something like this

        services:
          service_name:
            image: author/project:latest
            container_name: service_name
            volumes:
              - service_data:/app/data/
        
        volumes:
          service_data:
        

        Yes, this makes the data to persist, but it creates a directory with a random name inside /var/lib/docker/volumes/
        This makes it really hard to actually have ownership of the data of the service (for example to create backups, or to migrate to another host)

        Why is it standard practice to use this instead of having a directory mounted inside at the same level you have your docker-compose.yml?
        Like this - ./service_data:/app/data

        A This user is from outside of this forum
        A This user is from outside of this forum
        [email protected]
        wrote on last edited by
        #3

        I assume it’s because it reduces the possibility of other processes outside of the linked containers accessing the files (so security and stability).

        E 1 Reply Last reply
        2
        • A [email protected]

          I assume it’s because it reduces the possibility of other processes outside of the linked containers accessing the files (so security and stability).

          E This user is from outside of this forum
          E This user is from outside of this forum
          [email protected]
          wrote on last edited by
          #4

          Why would it reduce it?

          If you want to secure it, use selinux and add :Z which truly eliminates the possibility

          1 Reply Last reply
          1
          • P [email protected]

            All docker files look something like this

            services:
              service_name:
                image: author/project:latest
                container_name: service_name
                volumes:
                  - service_data:/app/data/
            
            volumes:
              service_data:
            

            Yes, this makes the data to persist, but it creates a directory with a random name inside /var/lib/docker/volumes/
            This makes it really hard to actually have ownership of the data of the service (for example to create backups, or to migrate to another host)

            Why is it standard practice to use this instead of having a directory mounted inside at the same level you have your docker-compose.yml?
            Like this - ./service_data:/app/data

            J This user is from outside of this forum
            J This user is from outside of this forum
            [email protected]
            wrote on last edited by
            #5

            It's not "standard practice", it's the least problematic way to distribute example templates for mass consumption without needing extra steps for the user to configure. It is assumed that anyone looking to run something in production would follow best practices and harden where needed.

            1 Reply Last reply
            17
            • P [email protected]

              All docker files look something like this

              services:
                service_name:
                  image: author/project:latest
                  container_name: service_name
                  volumes:
                    - service_data:/app/data/
              
              volumes:
                service_data:
              

              Yes, this makes the data to persist, but it creates a directory with a random name inside /var/lib/docker/volumes/
              This makes it really hard to actually have ownership of the data of the service (for example to create backups, or to migrate to another host)

              Why is it standard practice to use this instead of having a directory mounted inside at the same level you have your docker-compose.yml?
              Like this - ./service_data:/app/data

              G This user is from outside of this forum
              G This user is from outside of this forum
              [email protected]
              wrote on last edited by
              #6

              Named volumes are often the default because there is no chance of them conflicting with other services or containers running on the system.

              Say you deployed two different docker compose apps each with their own MariaDB. With named volumes there is zero chance of those conflicting (at least from the filesystem perspective).

              This also better facilitates easier cleanup. The apps documentation can say "docker compose down -v", and they are done. Instead of listing a bunch of directories that need to be cleaned up.

              Those lingering directories can also cause problems for users that might have wanted a clean start when their app is broken, but with a bind mount that broken database schema won't have been deleted for them when they start up the services again.

              All that said, I very much agree that when you go to deploy a docker service you should consider changing the named volumes to standard bind mounts for a couple of reasons.

              • When running production applications I don't want the volumes to be able to be cleaned up so easily. A little extra protection from accidental deletion is handy.

              • The default location for named volumes doesn't work well with any advanced partitioning strategies. i.e. if you want your database volume on a different partition than your static web content.

              • Old reason and maybe more user preference at this point but back before the docker overlay2 storage driver had matured we used the btrfs driver instead and occasionally Docker would break and we would need to wipe out the entire /var/lib/docker btrfs filesystem, so I just personally want to keep anything persistent out of that directory.

              So basically application writers should use named volumes to simplify the documentation/installation/maintenance/cleanup of their applications.

              Systems administrators running those applications should know and understand the docker compose well enough to change those settings to make them production ready for their environment. Reading through it and making those changes ends up being part of learning how the containers are structured in the first place.

              1 Reply Last reply
              13
              • P [email protected]

                All docker files look something like this

                services:
                  service_name:
                    image: author/project:latest
                    container_name: service_name
                    volumes:
                      - service_data:/app/data/
                
                volumes:
                  service_data:
                

                Yes, this makes the data to persist, but it creates a directory with a random name inside /var/lib/docker/volumes/
                This makes it really hard to actually have ownership of the data of the service (for example to create backups, or to migrate to another host)

                Why is it standard practice to use this instead of having a directory mounted inside at the same level you have your docker-compose.yml?
                Like this - ./service_data:/app/data

                eager_eagle@lemmy.worldE This user is from outside of this forum
                eager_eagle@lemmy.worldE This user is from outside of this forum
                [email protected]
                wrote on last edited by
                #7

                I change them all to bind mounts. Managed volumes is where data goes to die, if it's not in my file tree I'll forget it.

                1 Reply Last reply
                8
                • P [email protected]

                  All docker files look something like this

                  services:
                    service_name:
                      image: author/project:latest
                      container_name: service_name
                      volumes:
                        - service_data:/app/data/
                  
                  volumes:
                    service_data:
                  

                  Yes, this makes the data to persist, but it creates a directory with a random name inside /var/lib/docker/volumes/
                  This makes it really hard to actually have ownership of the data of the service (for example to create backups, or to migrate to another host)

                  Why is it standard practice to use this instead of having a directory mounted inside at the same level you have your docker-compose.yml?
                  Like this - ./service_data:/app/data

                  B This user is from outside of this forum
                  B This user is from outside of this forum
                  [email protected]
                  wrote on last edited by
                  #8

                  For me it really depends on the use-case. A lot of times I want persistence but don't really care to access the data outside of the container. So rather than using the extra brainpower to make up folders myself and ensure paths don't change I just let Docker handle those details for me. Also I use Podman a fair amount and it seems to be more troublesome when it comes to bind mounts.

                  1 Reply Last reply
                  1
                  Reply
                  • Reply as topic
                  Log in to reply
                  • Oldest to Newest
                  • Newest to Oldest
                  • Most Votes


                  • Login

                  • Login or register to search.
                  • First post
                    Last post
                  0
                  • Categories
                  • Recent
                  • Tags
                  • Popular
                  • World
                  • Users
                  • Groups