Book Image

Mastering Docker Enterprise

By : Mark Panthofer
Book Image

Mastering Docker Enterprise

By: Mark Panthofer

Overview of this book

While known mostly as the open source engine behind tens of millions of server nodes, Docker also offers commercially supported enterprise tooling known as the Docker Enterprise. This platform leverages the deep roots from Docker Engine - Community (formerly Docker CE) and Kubernetes, but adds support and tooling to efficiently operate a secure container platform at scale. With hundreds of enterprises on board, best practices and adoption patterns are emerging rapidly. These learning points can be used to inform adopters and help manage the enterprise transformation associated with enterprise container adoption. This book starts by explaining the case for Docker Enterprise, as well as its structure and reference architecture. From there, we progress through the PoC,pilot and production stages as a working model for adoption, evolving the platform’s design and configuration for each stage and using detailed application examples along the way to clarify and demonstrate important concepts.The book concludes with Docker’s impact on other emerging software technologies, such as Blockchain and Serverless computing. By the end of this book, you’ll have a better understanding of what it takes to get your enterprise up and running with Docker Enterprise and beyond.
Table of Contents (17 chapters)
Free Chapter
1
Section 1: Getting Started with Docker Enterprise
5
Section 2: Piloting Docker Enterprise
10
Section 3: In Production with Docker Enterprise

Deploying a PoC application to a Docker Enterprise cluster

In order to secure access to a Docker Enterprise cluster, we use Docker's role-based access control system. We will get into more details on the role-based access control system in the pilot phase, but for our PoC, we need a user with sufficient access to deploy our PoC application containers to the cluster. 

The Docker Enterprise CLI bundle 

Docker Enterprise makes it easy to manage access to your cluster. It gives you fine-grained access controls to resources in the cluster by generating a bundle (.zip file) consisting of your user certificates signed by the UCP certificate authority that was created when you installed UCP and scripts for connecting...