Book Image

DevSecOps in Practice with VMware Tanzu

By : Parth Pandit, Robert Hardt
Book Image

DevSecOps in Practice with VMware Tanzu

By: Parth Pandit, Robert Hardt

Overview of this book

As Kubernetes (or K8s) becomes more prolific, managing large clusters at scale in a multi-cloud environment becomes more challenging – especially from a developer productivity and operational efficiency point of view. DevSecOps in Practice with VMware Tanzu addresses these challenges by automating the delivery of containerized workloads and controlling multi-cloud Kubernetes operations using Tanzu tools. This comprehensive guide begins with an overview of the VMWare Tanzu platform and discusses its tools for building useful and secure applications using the App Accelerator, Build Service, Catalog service, and API portal. Next, you’ll delve into running those applications efficiently at scale with Tanzu Kubernetes Grid and Tanzu Application Platform. As you advance, you’ll find out how to manage these applications, and control, observe, and connect them using Tanzu Mission Control, Tanzu Observability, and Tanzu Service Mesh. Finally, you’ll explore the architecture, capabilities, features, installation, configuration, implementation, and benefits of these services with the help of examples. By the end of this VMware book, you’ll have gained a thorough understanding of the VMWare Tanzu platform and be able to efficiently articulate and solve real-world business problems.
Table of Contents (19 chapters)
Part 1 – Building Cloud-Native Applications on the Tanzu Platform
Part 2 – Running Cloud-Native Applications on Tanzu
Part 3 – Managing Modern Applications on the Tanzu Platform

Why Harbor?

In this section, we will review the various features, capabilities, and reasons to consider using Harbor as a container registry. These reasons will be explained using the security, control, and extensibility features of Harbor as described henceforth.

Using Harbor for security

There are some strong security reasons and features that make Harbor a good choice for a container registry, which shifts security to a proactive measure rather than reactive in the applications’ journey toward production. Let’s review these security benefits:

  • Harbor comes with the capability to scan each image for the presence of critical vulnerability exposures (CVEs) as a result of certain software libraries and operating system versions used in the image. Such scanning provides a detailed report of the CVEs found in the corresponding image, along with their severity level, details of the exposure, and the version of the software in which that CVE is remediated. We...