Or try Docker in a volume of work does not comply with the direction or not first. Patching In a virtualization environment or traditional AWS, security patches are installed independently of the application code. The patch process can be automated with the configuration management tool, so if you are running a virtual machine in the AWS or elsewhere, you can update the tangle it clear or Chef and "forced" which profiles for all your case from a Center. A picture Docker has two components: the basic image and photo application. To patch a system container, you must update the basic images and then rebuild the application image. So, in case of a flaw as Heartbleed, if you want to make sure that the new version of SSL is on each container, you will update the basic image and replicate the container fits the typical deployment procedure. A process automation deployment complexity (which is likely to have been in place if your container) will do this is pretty simple. One of the most promising features of Docker is the extent to which dependent applications associated with the application itself, the product has the potential to patch the system when an application is updated, i.e., regular and potentially less painful. But somewhat counterintuitively, Docker also provides a bright line between the system and the development team: team system support infrastructure, the computational clusters, and patch the virtual case; the development team supports the container. If you are trying to get to a place where development and system teams work closely together and clear responsibility, this is an attractive feature. If you are using is a management service providers (such as Logicworks), there is a clear delineation of responsibility between the internal and external groups. the main takeaway: to make a patch, updated the base image and then rebuild the application image. This requires systems and development teams to work closely together, and clear responsibility. Almost ready for the first time If you are wanting to make Docker and ready to have a certain amount of risk, then the method described here can help you monitor and patch the system container. At Logicworks, here is how we manage the container system for enterprise customers every day. As Azure and AWS continues to support development of their container and the independent software vendors in the space, expect the confidential methods Docker "classics" to change quickly. Nine months from now, or even three months from now, a development tool can automate much of what is in their complex or Docker security. When this business is excited about a new technology, so there may be a whole new industries will follow.
đang được dịch, vui lòng đợi..
