Category DevOps

AWS EC2 feature image

AWS compute options – virtual machines (VMs)

One way of deploying workloads in AWS is through virtual machines, using Amazon Elastic Compute Cloud (Amazon EC2). EC2 offers scalable compute capacity with flexible instance types and pricing models, enabling efficient and cost-effective deployment of applications on the AWS cloud.
IAM feature image

AWS Identity and Access Management

AWS Identity and Access Management (IAM) is a service that helps you control who can access your AWS resources and what they can do with them. It allows you to manage users, groups, and permissions securely and efficiently.
Cloud key

Lesson 1: Introduction to AWS (Amazon Web Services)

This article explores the basics of AWS Cloud Computing, focusing on Identity and Access Management (IAM), which secures access and protects data. It outlines various cloud models and AWS's framework of Regions and Availability Zones. It also covers best practices for achieving high availability and introduces the AWS Shared Responsibility Model.
Security in Docker

Security in Docker

Docker's security centers on four areas: kernel security; Docker daemon access control; container configuration and base image trustworthiness; adherence to runtime best practices.
Containers connected in network

Overview of networking in Docker

Docker containers require networking to communicate, which is enabled by default. Various network drivers allow for customized networks behaviour. Docker accommodates different network drivers; default bridge networks isolate containers, host networks optimize performance and remove isolation, and overlay networks support distributed systems. Specialized ipvlan and macvlan provide advanced network control, with ‘none’ offering complete isolation. Docker's pluggable networking system allows for third-party plugins, especially useful in swarm mode.
Data persistence

Data persistence in Docker

Containers inherently lack persistent storage, requiring external solutions for data preservation beyond their lifespan. Docker offers Volumes for data persistence, Bind mounts for real-time file sharing between host and container, and tmpfs mounts for temporary in-memory data storage on Linux.
Docker - whale

Getting Started with Docker

Docker Engine, an open-source containerization technology, is available via Docker Desktop for Windows and Mac, with a GUI for container management. A sample application's containerization involves cloning a repository, creating a Dockerfile, building the image, and running the container. Changes to the application require rebuilding and rerunning the container.