Book Image

Hands-On Kubernetes and Docker for Distributed Applications [Video]

By : Gabriel Schenker
Book Image

Hands-On Kubernetes and Docker for Distributed Applications [Video]

By: Gabriel Schenker

Overview of this book

If you have a mission critical application that needs to be up and running 24/7 and each outage would cost you a lot of money and reputation then it is important that you have the right tools and processes in place to handle this requirement. Docker allow you to package the many application services that are part of your distributed application into self contained standard packages called containers. With the tool docker-compose developers can then run, scale, test and debug the application, simulating a production like environment on their development workstations. This course shows you how Docker can be used to isolate your application services and their dependencies into a single self-contained unit that can reliably run anywhere. You will learn to build, ship and run distributed applications on any platform using Kubernetes as the orchestrator. With Docker containers, your applications can run smoothly without you worrying about the environment where they run. This aids in improved security, better scalability, resilience and fault-tolerance, making life easier for developers and operators alike who need a standardized deployment and operations model. By the end of this course you will be able to use Docker and Kubernetes to build distributed applications that are scalable, resilient, fault tolerant and secure. Furthermore you will be able to deploy these applications to any Kubernetes cluster running on any platform on premise or in the cloud. The code bundle for this video course is available at - https://github.com/PacktPublishing/Hands-On-Kubernetes-and-Docker-for-Distributed-Applications-V-
Table of Contents (5 chapters)
Chapter 3
Securing Your Distributed Applications
Content Locked
Section 4
How to Use External Secrets Such as HashiCorp’s Vault
This video introduces yet another way how developers often have to deal with secrets, namely when they originate in external sources such as AWS IAM, Foxpass or Hashicorp's vault. - Retrieve secrets from a Vault instance - Use external secrets in application - Create entrypoint script for container that retrieves external secrets