Book Image

The Docker Workshop

By : Vincent Sesto, Onur Yılmaz, Sathsara Sarathchandra, Aric Renzo, Engy Fouda
5 (3)
Book Image

The Docker Workshop

5 (3)
By: Vincent Sesto, Onur Yılmaz, Sathsara Sarathchandra, Aric Renzo, Engy Fouda

Overview of this book

No doubt Docker Containers are the future of highly-scalable software systems and have cost and runtime efficient supporting infrastructure. But learning it might look complex as it comes with many technicalities. This is where The Docker Workshop will help you. Through this workshop, you’ll quickly learn how to work with containers and Docker with the help of practical activities.? The workshop starts with Docker containers, enabling you to understand how it works. You’ll run third party Docker images and also create your own images using Dockerfiles and multi-stage Dockerfiles. Next, you’ll create environments for Docker images, and expedite your deployment and testing process with Continuous Integration. Moving ahead, you’ll tap into interesting topics and learn how to implement production-ready environments using Docker Swarm. You’ll also apply best practices to secure Docker images and to ensure that production environments are running at maximum capacity. Towards the end, you’ll gather skills to successfully move Docker from development to testing, and then into production. While doing so, you’ll learn how to troubleshoot issues, clear up resource bottlenecks and optimize the performance of services. By the end of this workshop, you’ll be able to utilize Docker containers in real-world use cases.
Table of Contents (17 chapters)
Preface

Introduction

This chapter tries to tackle a subject that could have an entire book dedicated to it. We attempt to go part of the way in educating you on how to approach security with Docker. Previous chapters have given you a solid foundation in using Docker to build your applications, and this chapter hopes to use that information to also provide secure and stable containers for them to run on.

Docker and the microservices architecture allow us to start with a more secure and robust environment to manage our services, but that doesn't mean we need to completely forget about security. This chapter provides details on some of the aspects we need to consider when we are creating and maintaining services across our environments, as well as the ways in which you can start to implement these procedures in your working systems.

Docker security should not be separated from your regular IT security process, as the concepts will be the same. Docker has a different approach to handle...