Book Image

The Docker Workshop

By : Vincent Sesto, Onur Yılmaz, Sathsara Sarathchandra, Aric Renzo, Engy Fouda
5 (3)
Book Image

The Docker Workshop

5 (3)
By: Vincent Sesto, Onur Yılmaz, Sathsara Sarathchandra, Aric Renzo, Engy Fouda

Overview of this book

No doubt Docker Containers are the future of highly-scalable software systems and have cost and runtime efficient supporting infrastructure. But learning it might look complex as it comes with many technicalities. This is where The Docker Workshop will help you. Through this workshop, you’ll quickly learn how to work with containers and Docker with the help of practical activities.? The workshop starts with Docker containers, enabling you to understand how it works. You’ll run third party Docker images and also create your own images using Dockerfiles and multi-stage Dockerfiles. Next, you’ll create environments for Docker images, and expedite your deployment and testing process with Continuous Integration. Moving ahead, you’ll tap into interesting topics and learn how to implement production-ready environments using Docker Swarm. You’ll also apply best practices to secure Docker images and to ensure that production environments are running at maximum capacity. Towards the end, you’ll gather skills to successfully move Docker from development to testing, and then into production. While doing so, you’ll learn how to troubleshoot issues, clear up resource bottlenecks and optimize the performance of services. By the end of this workshop, you’ll be able to utilize Docker containers in real-world use cases.
Table of Contents (17 chapters)
Preface

Managing Secrets and Configurations with Docker Swarm

So far in this chapter, we have observed Docker Swarm's proficiency at orchestrating our services and applications. It also provides functionality to allow us to define configurations within our environment and then use these values. Why do we need this functionality, though?

Firstly, the way we have been storing details such as our secrets has not been very secure, especially when we are typing them in plain text in our docker-compose.yml file or including them as part of our built Docker image. For our secrets, Swarm allows us to store encrypted values that are then used by our services.

Secondly, by using these features, we can start to move away from setting up configurations in our Dockerfile. This means we can create and build our application as a container image. Then, we can run our application on any environment, be it a development system on a laptop or a test environment. We can also run the application on...