Book Image

DevSecOps in Practice with VMware Tanzu

By : Parth Pandit, Robert Hardt
Book Image

DevSecOps in Practice with VMware Tanzu

By: Parth Pandit, Robert Hardt

Overview of this book

As Kubernetes (or K8s) becomes more prolific, managing large clusters at scale in a multi-cloud environment becomes more challenging – especially from a developer productivity and operational efficiency point of view. DevSecOps in Practice with VMware Tanzu addresses these challenges by automating the delivery of containerized workloads and controlling multi-cloud Kubernetes operations using Tanzu tools. This comprehensive guide begins with an overview of the VMWare Tanzu platform and discusses its tools for building useful and secure applications using the App Accelerator, Build Service, Catalog service, and API portal. Next, you’ll delve into running those applications efficiently at scale with Tanzu Kubernetes Grid and Tanzu Application Platform. As you advance, you’ll find out how to manage these applications, and control, observe, and connect them using Tanzu Mission Control, Tanzu Observability, and Tanzu Service Mesh. Finally, you’ll explore the architecture, capabilities, features, installation, configuration, implementation, and benefits of these services with the help of examples. By the end of this VMware book, you’ll have gained a thorough understanding of the VMWare Tanzu platform and be able to efficiently articulate and solve real-world business problems.
Table of Contents (19 chapters)
Part 1 – Building Cloud-Native Applications on the Tanzu Platform
Part 2 – Running Cloud-Native Applications on Tanzu
Part 3 – Managing Modern Applications on the Tanzu Platform


In this chapter, we learned about different problems around building secured container images for our applications and how TBS targets them with different capabilities. Later, we took a deep dive into the full anatomy of TBS to understand all its building blocks. After that, we walked through the installation process of TBS to get started with it. And finally, we saw how to perform various key operations on TBS. Using a solution such as TBS that is based on CNB is one of the most recommended approaches suggested by CNCF, and now, we can appreciate why that is the case.

In any Kubernetes environment, we deploy two different types of container images – either they belong to our application or a third-party software. Now that we’ve learned how to build secured container images for our applications using an out-of-box automation tool, in the next chapter, we will learn how to consume secured container images of popular open source software to provide backing services...