Book Image

Modern DevOps Practices

By : Gaurav Agarwal
Book Image

Modern DevOps Practices

By: Gaurav Agarwal

Overview of this book

Containers have entirely changed how developers and end-users see applications as a whole. With this book, you'll learn all about containers, their architecture and benefits, and how to implement them within your development lifecycle. You'll discover how you can transition from the traditional world of virtual machines and adopt modern ways of using DevOps to ship a package of software continuously. Starting with a quick refresher on the core concepts of containers, you'll move on to study the architectural concepts to implement modern ways of application development. You'll cover topics around Docker, Kubernetes, Ansible, Terraform, Packer, and other similar tools that will help you to build a base. As you advance, the book covers the core elements of cloud integration (AWS ECS, GKE, and other CaaS services), continuous integration, and continuous delivery (GitHub actions, Jenkins, and Spinnaker) to help you understand the essence of container management and delivery. The later sections of the book will take you through container pipeline security and GitOps (Flux CD and Terraform). By the end of this DevOps book, you'll have learned best practices for automating your development lifecycle and making the most of containers, infrastructure automation, and CaaS, and be ready to develop applications using modern tools and techniques.
Table of Contents (19 chapters)
1
Section 1: Container Fundamentals and Best Practices
7
Section 2: Delivering Containers
15
Section 3: Modern DevOps with GitOps

Questions

  1. Which of these is the recommended place for storing secrets?

    a. Private Git repository

    b. Public Git repository

    c. Docker image

    d. Secret management system

  2. Which one of the following is an open source secret management system?

    a. Cloud KMS

    b. HashiCorp Vault

    c. Anchore Grype

  3. Is it a good practice to download a secret within your CD pipeline's filesystem?
  4. Which base image is generally considered more secure and consists of the fewest vulnerabilities?

    a. Alpine

    b. Slim

    c. Buster

    d. Default

  5. Which of the following answers are true about binary authorization? (Multiple answers are possible.)

    a. It scans your images for vulnerabilities.

    b. It allows only attested images to be deployed.

    c. It prevents people from bypassing your CI/CD pipeline.