Book Image

Learning Windows Server Containers

Book Image

Learning Windows Server Containers

Overview of this book

Windows Server Containers are independent, isolated, manageable and portable application environments which are light weight and shippable. Decomposing your application into smaller manageable components or MicroServices helps in building scalable and distributed application environments. Windows Server Containers have a significant impact on application developers, development operations (DevOps) and infrastructure management teams. Applications can be built, shipped and deployed in a fast-paced manner on an easily manageable and updatable environment. Learning Windows Server Containers teaches you to build simple to advanced production grade container based application using Asp.Net Core, Visual Studio, Azure, Docker and PowerShell technologies. The book teaches you to build and deploy simple web applications as Windows and Hyper-V containers on Windows 10 and Windows Server 2016 on Azure. You will learn to build on top of Windows Container Base OS Images, integrate with existing images from Docker Hub, create custom images and publish to Hub. You will also learn to work with storage containers built using Volumes and SQL Server as container, create and configure custom networks, integrate with Redis Cache containers, configure continuous integration and deployment pipelines using VSTS and Git Repository. Further you can also learn to manage resources for a container, setting up monitoring and diagnostics, deploy composite container environments using Docker Compose on Windows and manage container clusters using Docker Swarm. The last chapter of the book focuses on building applications using Microsoft’s new and thinnest server platform – Nano Servers.
Table of Contents (19 chapters)
Credits
Foreword
About the Author
About the Reviewer
www.PacktPub.com
Customer Feedback
Preface

Introduction to Windows networking


The networking requirements of an application are as critical and complicated as the business problem you are trying to solve. It is important and essential to follow the industry's best practice and guidelines on network configuration so that your application performs well during peak loads without breaking, and so that it is secured from any security breach which might intend to kill the application or, even worse, steal customer-sensitive data. Security can be controlled by adhering to strong networking policies and firewalls restrictions so that communication can be controlled, throttled and monitored across a group of machines (called subnets) and at each instance level. Network configuration also brings in logical isolation for a single tenant in a multi-tenant environments.

Deploying containerized applications using a virtualized network is quite like deploying virtual machines in a network. Any typical enterprise web application consists of a web...