Book Image

DevSecOps in Practice with VMware Tanzu

By : Parth Pandit, Robert Hardt
Book Image

DevSecOps in Practice with VMware Tanzu

By: Parth Pandit, Robert Hardt

Overview of this book

As Kubernetes (or K8s) becomes more prolific, managing large clusters at scale in a multi-cloud environment becomes more challenging – especially from a developer productivity and operational efficiency point of view. DevSecOps in Practice with VMware Tanzu addresses these challenges by automating the delivery of containerized workloads and controlling multi-cloud Kubernetes operations using Tanzu tools. This comprehensive guide begins with an overview of the VMWare Tanzu platform and discusses its tools for building useful and secure applications using the App Accelerator, Build Service, Catalog service, and API portal. Next, you’ll delve into running those applications efficiently at scale with Tanzu Kubernetes Grid and Tanzu Application Platform. As you advance, you’ll find out how to manage these applications, and control, observe, and connect them using Tanzu Mission Control, Tanzu Observability, and Tanzu Service Mesh. Finally, you’ll explore the architecture, capabilities, features, installation, configuration, implementation, and benefits of these services with the help of examples. By the end of this VMware book, you’ll have gained a thorough understanding of the VMWare Tanzu platform and be able to efficiently articulate and solve real-world business problems.
Table of Contents (19 chapters)
1
Part 1 – Building Cloud-Native Applications on the Tanzu Platform
7
Part 2 – Running Cloud-Native Applications on Tanzu
11
Part 3 – Managing Modern Applications on the Tanzu Platform

Summary

Let’s review what we have covered in this chapter. First, we discussed several benefits and the use cases of Harbor while explaining the Why behind using it. We looked at the different security-related benefits of Harbor, including image scanning, robust RBAC capabilities, and the ability to restrict public repository access requirements using image replications. For the operational control aspect, we discussed the benefits, such as on-premises and air-gapped deployment, a popular open source project under CNCF, comprehensive multi-tenancy, and administrative configurations. For the extensibility aspect, we saw how Harbor can be used with its replication feature of extending image library contents. Harbor’s pluggable model for vulnerability scanners and authentication providers was also discussed in this category.

After that, we covered details of Harbor’s architecture and learned about the different components that make up Harbor in detail. Following...