Book Image

The Docker Workshop

By : Vincent Sesto, Onur Yılmaz, Sathsara Sarathchandra, Aric Renzo, Engy Fouda
5 (1)
Book Image

The Docker Workshop

5 (1)
By: Vincent Sesto, Onur Yılmaz, Sathsara Sarathchandra, Aric Renzo, Engy Fouda

Overview of this book

No doubt Docker Containers are the future of highly-scalable software systems and have cost and runtime efficient supporting infrastructure. But learning it might look complex as it comes with many technicalities. This is where The Docker Workshop will help you. Through this workshop, you’ll quickly learn how to work with containers and Docker with the help of practical activities.? The workshop starts with Docker containers, enabling you to understand how it works. You’ll run third party Docker images and also create your own images using Dockerfiles and multi-stage Dockerfiles. Next, you’ll create environments for Docker images, and expedite your deployment and testing process with Continuous Integration. Moving ahead, you’ll tap into interesting topics and learn how to implement production-ready environments using Docker Swarm. You’ll also apply best practices to secure Docker images and to ensure that production environments are running at maximum capacity. Towards the end, you’ll gather skills to successfully move Docker from development to testing, and then into production. While doing so, you’ll learn how to troubleshoot issues, clear up resource bottlenecks and optimize the performance of services. By the end of this workshop, you’ll be able to utilize Docker containers in real-world use cases.
Table of Contents (17 chapters)
Preface

Docker Image Security Scans

Security scans play an important part in not only ensuring the uptime of your applications but also making sure you are not running outdated, unpatched, or vulnerable container images. Security scans should be performed on all images used by your team and in your environment. It doesn't matter if you have created them from scratch and you trust them; it's still an important step in reducing the potential risk within your environment. This section of the chapter will go through two options for scanning images that can easily be adopted by your development teams.

By implementing a security scan of our Docker images, we hope to achieve the following:

  • We need to keep a database of known and up-to-date vulnerabilities or use an application that will keep this database on our behalf.
  • We scan our Docker images against this database of vulnerabilities, not only verifying that the underlying operating system is safe and patched but also...