(as of Jan 14,2022 22:46:43 UTC – Particulars)
From the Writer
From the Preface
On this ebook you’ll find out about most of the constructing block applied sciences and mechanisms which might be generally utilized in container-based techniques, and the way they’re constructed within the Linux working system. Collectively we’ll dive deep into the underpinnings of how containers work and the way they convey so that you’re effectively versed not simply within the “what” of container safety but additionally, and extra importantly, within the “why.” My aim in penning this ebook is that will help you higher perceive what’s taking place while you deploy containers. I need to encourage you to construct psychological fashions that help you make your personal evaluation of potential safety dangers that would have an effect on your deployments.
This ebook primarily considers the sort of “utility containers” that many companies are utilizing lately to run their enterprise functions in techniques akin to Kubernetes and Docker. That is in distinction to “system containers” akin to LXC and LXD from the Linux Containers Venture. In an utility container, you’re inspired to run immutable containers with as little code as is critical to run the applying, whereas in a system container surroundings the concept is to run a whole Linux distribution and deal with it extra like a digital machine. It’s thought-about completely regular to SSH right into a system container, however utility container safety specialists will have a look at you askance if you wish to SSH into an utility container (for causes coated later on this ebook). Nonetheless, the fundamental mechanisms used to create utility and system containers alike are management teams, namespaces, and altering the foundation listing, so this ebook offers you a strong basis from which you’ll want to discover the variations in strategy taken by the totally different container tasks.
Who This E book Is For
Whether or not you contemplate your self a developer, a safety skilled, an operator, or a supervisor, this ebook will swimsuit you greatest when you wish to get into the nitty-gritty of how issues work, and when you take pleasure in time spent in a Linux terminal.
In case you are on the lookout for an instruction guide that provides a step-by-step information to securing containers, this is probably not the ebook for you. I don’t imagine there’s a one-size-fits-all strategy that will work for each utility in each surroundings and each group. As an alternative, I need to enable you to perceive what is going on while you run functions in containers, and the way totally different safety mechanisms work, as a way to choose the dangers for your self.
As you’ll discover out later on this ebook, containers are made with a mix of options from the Linux kernel. Securing containers entails utilizing plenty of the identical mechanisms as you’d use on a Linux host. (I take advantage of the time period “host” to cowl each digital machines and bare-metal servers.) I lay out how these mechanisms work after which present how they apply in containers. In case you are an skilled system administrator, you’ll have the ability to skip over some sections to get to the container-specific info.
I assume that you’ve some primary familiarity with containers, and you’ve got in all probability no less than toyed with Docker or Kubernetes. You’ll perceive phrases like “pulling a container picture from a registry” or “operating a container” even when you don’t know precisely what is going on below the covers while you take these actions. I don’t anticipate you to know the main points of how containers work—no less than, not till you will have learn the ebook.
O’Reilly’s mission is to alter the world by sharing the data of innovators. For over 40 years, we have impressed corporations and people to do new issues (and do them higher) by offering the abilities and understanding which might be vital for achievement.
On the coronary heart of our enterprise is a novel community of skilled pioneers and practitioners who share their data by the O’Reilly studying platform and our books—which have been heralded for many years because the definitive technique to study the applied sciences which might be shaping the longer term. So people, groups, and organizations study the instruments, greatest practices, and rising tendencies that can rework their industries.
Our clients are hungry to construct the improvements that propel the world ahead. And we assist them just do that.
Writer : O’Reilly Media; 1st version (April 28, 2020)
Language : English
Paperback : 200 pages
ISBN-10 : 1492056707
ISBN-13 : 978-1492056706
Merchandise Weight : 11.5 ounces
Dimensions : 7 x 0.42 x 9.19 inches