SlideShare a Scribd company logo
THE
ENTERPRISE IT
CHECKLIST
FOR DOCKER
OPERATIONS
Nicola Kabar
Solutions Architect
Docker
@nicolakabar
1. The Enterprise IT Goal:
Deliver Value to Customers,
Fast!
2. Docker is at the center of it all
3. Biggest
challenge is
moving to
production in
time to prove
value
Docker
Production
Readiness
Checklist for
Enterprise IT
The Checklist
 Infrastructure
 Orchestration
Management
 Image Distribution
 Security
 Network
 Storage
 Logging and
Monitoring
 Integration
 Disaster Recovery
 Testing
You can also follow along !
Infrastructure
 Cluster Sizing and Zoning
 Supported and Compatible ( OS, Docker Engine, UCP, DTR)
 Host Sizing ( Manager vs Worker Nodes)
• Manager(minimum): 16G mem, 4 vCPU, 1+ Gbps, 32+ GB disk
• Worker(minimum): 4G mem, 2 vCPU, 100+ Mbps, 8 GB disk
Orchestration Management
 Redundant/Highly Available UCP managers
 Deployed in odd numbers (3,5,7) to maintain quorum
 Distributed across DCs or Availability Zones (1-1-1, 2-2-1..etc)
 Fine-tuned orchestration settings (e.g Task History Limit, Raft Settings,
Node Certificate Rotation)
Orchestration Management
 Upstream TCP load balancing
 No application workloads on managers
 Automated join and leave process
 Labeled resources (networks, volumes, containers, services,
secrets, nodes)
Image Distribution
 Redundant (3,5,7) DTR Replicas
 Replicated and secured image backend storage (NFS, S3, Azure
Storage…etc)
 Garbage collection enabled
 Security scanning enabled
Security
 Utilize Docker EE RBAC Model ( Subjects, Grants, Roles, Collection,
Resource)
 AD/LDAP groups mapped to teams and organizations
 Docker Content Trust Signing and Enforcement
 Regular Run of Docker Security Bench
Security
 Restricted direct access (SSH/RDP)
 Utilize built-in Secrets functionality (encrypted, controlled)
 Rotate orchestration join keys
 Use built-in or your own CA
 Valid SSL/TLS certificates for UCP and DTR
Network
 Pick right networking driver for your application (overlay ,
bridge+host port mapping)
 Select proper publishing mode for external traffic ( Ingress vs.
Host Mode)
 Pick suitable load-balancing mode ( client side = dnsrr, server-
side = vip)
 Network latency < 100ms
Network
 Segment app at L3 with overlays (1 App  1 Overlay Network)
 Utilize built-in encrypted overlay feature ( app <--> app encrypted)
 Pick the application subnet size carefully
 Designated non-overlapping subnets to be used by Docker for overlay
networks
OVERLAY A: 10.10.10.0/24 10.10.10.0/24
CONTAINER A: 10.10.10.10/24 SERVER A:10.10.10.100
Docker
Underlay Network
Customer Story
OVERLAY A: 10.10.200.0/24
10.10.10.0/24
CONTAINER A:
10.10.200.10/24
SERVER A:10.10.10.100
Docker
Underlay Network
Recommendation
Customer Story
X Improper network subnet design
X Overlapping subnet with underlay range
X Black holing traffic intended for services outside
the cluster
X Recommendation: dedicate subnets from the
underlay to be used by Docker
Storage
 Production-ready configured engine storage backend ( esp.
devicemapper for centos/RHEL)
 Replicated and secure DTR storage backend
 Certified and tested application data storage plugin for replicating
application data
Logging and Monitoring
 External centralized logging for engine and application containers logs
 Local logging for active trouble-shooting (JSON or JournalD)
 Host-level and container-level resource monitoring
 DTR image backend storage monitoring
 Docker engine storage monitoring
 Use built-in application health checking functionality
Customer Story
DTRCI
push store
NFS
Customer Story
X DTR storage backend was not monitored
X GC was not enabled
X CI led to excessive image pushes
X Storage filled up -> can’t push to DTR
 Recommendation: Monitor storage backend,
enable GC
Integration
 UCP and DTR are well integrated ( SSO, DCT..etc)
 CI/CD tooling ( Jenkins, Bamboo, CircleCI, TravisCI..etc)
 Development tooling (dev machines, IDEs)
 Configuration automation tools (Puppet, Chef, Ansible, Salt)
 Resource provisioning systems ( Terraform..etc)
Integration
 Change management systems
 Internal/external DNS or other service discovery and
registration systems
 Load balancing for both the management plane and each of
the applications ( L4/L7)
 Incident/ticketing management systems (ServiceNow, etc)
Disaster Recovery
 Regular (rec. weekly) backups (UCP, DTR, and Swarm)
 Well-tested, automated, and documented
• platform restoration
• upgrade + downgrade
• application recovery procedure
Customer Story
Backup
UCP
Backup
DTR
Backup
Swarm
Backup
DTR
Storage
Customer Story
X No backups since installation
X Lost quorum led to cluster failure
X No way to recover UCP and DTR configurations
X Manual re-install + re-config of settings, teams, groups
 Recommendation: Frequent backup, tested restore procedures
Testing
 Multi-platform image pull and push to DTR
 Confirm users have the right set of access to their respective resources
 Confirm application resource limitation works as expected
 End-to-end stack deployment from CLI and UI
 Updating applications with new configuration, images, networks using
rolling upgrade
Docker Success Center
success.docker.com
Things you can find in Success Center
● Complete Docker EE Cluster Upgrade Guide
● End-to-End Security Best Practices
● Logging Design and Best Practices
● Support & Compatibility Matrix
● Troubleshooting Guides
● + 100s of Technical Assets
Key Takeaways
 Define a readiness checklist for an
accelerated, smooth and successful path to
production
 Design the Docker Enterprise platform
based on recommended architectures
 Deliver to Differentiate
Sign Up for Docker
EE Hosted Demo
and Kubernetes
Beta !
docker.com/trial
docker.com/kubernetes
Thanks!
Questions?
@nicolakabar

More Related Content

What's hot

OpenStack on Kubernetes (BOS Summit / May 2017 update)
OpenStack on Kubernetes (BOS Summit / May 2017 update)OpenStack on Kubernetes (BOS Summit / May 2017 update)
OpenStack on Kubernetes (BOS Summit / May 2017 update)
rhirschfeld
 
Intro into Rook and Ceph on Kubernetes
Intro into Rook and Ceph on KubernetesIntro into Rook and Ceph on Kubernetes
Intro into Rook and Ceph on Kubernetes
Kublr
 
Web後端技術的演變
Web後端技術的演變Web後端技術的演變
Web後端技術的演變
inwin stack
 
Kata Container - The Security of VM and The Speed of Container | Yuntong Jin
Kata Container - The Security of VM and The Speed of Container | Yuntong Jin	Kata Container - The Security of VM and The Speed of Container | Yuntong Jin
Kata Container - The Security of VM and The Speed of Container | Yuntong Jin
Vietnam Open Infrastructure User Group
 
Kubernetes Introduction
Kubernetes IntroductionKubernetes Introduction
Kubernetes Introduction
Martin Danielsson
 
Building stateful applications on Kubernetes with Rook
Building stateful applications on Kubernetes with RookBuilding stateful applications on Kubernetes with Rook
Building stateful applications on Kubernetes with Rook
Roberto Hashioka
 
Kubernetes Monitoring & Best Practices
Kubernetes Monitoring & Best PracticesKubernetes Monitoring & Best Practices
Kubernetes Monitoring & Best Practices
Ajeet Singh Raina
 
OSDC 2018 | Lifecycle of a resource. Codifying infrastructure with Terraform ...
OSDC 2018 | Lifecycle of a resource. Codifying infrastructure with Terraform ...OSDC 2018 | Lifecycle of a resource. Codifying infrastructure with Terraform ...
OSDC 2018 | Lifecycle of a resource. Codifying infrastructure with Terraform ...
NETWAYS
 
Orchestration Tool Roundup - Arthur Berezin & Trammell Scruggs
Orchestration Tool Roundup - Arthur Berezin & Trammell ScruggsOrchestration Tool Roundup - Arthur Berezin & Trammell Scruggs
Orchestration Tool Roundup - Arthur Berezin & Trammell Scruggs
Cloud Native Day Tel Aviv
 
Outside The Wire
Outside The WireOutside The Wire
Outside The Wire
Salo Shp
 
Netflix Container Runtime - Titus - for Container Camp 2016
Netflix Container Runtime - Titus - for Container Camp 2016Netflix Container Runtime - Titus - for Container Camp 2016
Netflix Container Runtime - Titus - for Container Camp 2016
aspyker
 
Scale Kubernetes to support 50000 services
Scale Kubernetes to support 50000 servicesScale Kubernetes to support 50000 services
Scale Kubernetes to support 50000 services
LinuxCon ContainerCon CloudOpen China
 
OpenStack Nova - Developer Introduction
OpenStack Nova - Developer IntroductionOpenStack Nova - Developer Introduction
OpenStack Nova - Developer Introduction
John Garbutt
 
OpenStack Icehouse Overview
OpenStack Icehouse OverviewOpenStack Icehouse Overview
OpenStack Icehouse Overview
OpenStack Foundation
 
Introduction to Container Storage Interface (CSI)
Introduction to Container Storage Interface (CSI)Introduction to Container Storage Interface (CSI)
Introduction to Container Storage Interface (CSI)
Idan Atias
 
Topologies of OpenStack
Topologies of OpenStackTopologies of OpenStack
Topologies of OpenStack
haribabu kasturi
 
Introduction to kubernetes
Introduction to kubernetesIntroduction to kubernetes
Introduction to kubernetes
Gabriel Carro
 
Architecture Overview: Kubernetes with Red Hat Enterprise Linux 7.1
Architecture Overview: Kubernetes with Red Hat Enterprise Linux 7.1Architecture Overview: Kubernetes with Red Hat Enterprise Linux 7.1
Architecture Overview: Kubernetes with Red Hat Enterprise Linux 7.1
Etsuji Nakai
 
實際架構實踐演化與解決方案
實際架構實踐演化與解決方案實際架構實踐演化與解決方案
實際架構實踐演化與解決方案
Camel Camel
 
Kubernetes Meetup - Seattle 2017-06-01
Kubernetes Meetup - Seattle 2017-06-01Kubernetes Meetup - Seattle 2017-06-01
Kubernetes Meetup - Seattle 2017-06-01
Bassam Tabbara
 

What's hot (20)

OpenStack on Kubernetes (BOS Summit / May 2017 update)
OpenStack on Kubernetes (BOS Summit / May 2017 update)OpenStack on Kubernetes (BOS Summit / May 2017 update)
OpenStack on Kubernetes (BOS Summit / May 2017 update)
 
Intro into Rook and Ceph on Kubernetes
Intro into Rook and Ceph on KubernetesIntro into Rook and Ceph on Kubernetes
Intro into Rook and Ceph on Kubernetes
 
Web後端技術的演變
Web後端技術的演變Web後端技術的演變
Web後端技術的演變
 
Kata Container - The Security of VM and The Speed of Container | Yuntong Jin
Kata Container - The Security of VM and The Speed of Container | Yuntong Jin	Kata Container - The Security of VM and The Speed of Container | Yuntong Jin
Kata Container - The Security of VM and The Speed of Container | Yuntong Jin
 
Kubernetes Introduction
Kubernetes IntroductionKubernetes Introduction
Kubernetes Introduction
 
Building stateful applications on Kubernetes with Rook
Building stateful applications on Kubernetes with RookBuilding stateful applications on Kubernetes with Rook
Building stateful applications on Kubernetes with Rook
 
Kubernetes Monitoring & Best Practices
Kubernetes Monitoring & Best PracticesKubernetes Monitoring & Best Practices
Kubernetes Monitoring & Best Practices
 
OSDC 2018 | Lifecycle of a resource. Codifying infrastructure with Terraform ...
OSDC 2018 | Lifecycle of a resource. Codifying infrastructure with Terraform ...OSDC 2018 | Lifecycle of a resource. Codifying infrastructure with Terraform ...
OSDC 2018 | Lifecycle of a resource. Codifying infrastructure with Terraform ...
 
Orchestration Tool Roundup - Arthur Berezin & Trammell Scruggs
Orchestration Tool Roundup - Arthur Berezin & Trammell ScruggsOrchestration Tool Roundup - Arthur Berezin & Trammell Scruggs
Orchestration Tool Roundup - Arthur Berezin & Trammell Scruggs
 
Outside The Wire
Outside The WireOutside The Wire
Outside The Wire
 
Netflix Container Runtime - Titus - for Container Camp 2016
Netflix Container Runtime - Titus - for Container Camp 2016Netflix Container Runtime - Titus - for Container Camp 2016
Netflix Container Runtime - Titus - for Container Camp 2016
 
Scale Kubernetes to support 50000 services
Scale Kubernetes to support 50000 servicesScale Kubernetes to support 50000 services
Scale Kubernetes to support 50000 services
 
OpenStack Nova - Developer Introduction
OpenStack Nova - Developer IntroductionOpenStack Nova - Developer Introduction
OpenStack Nova - Developer Introduction
 
OpenStack Icehouse Overview
OpenStack Icehouse OverviewOpenStack Icehouse Overview
OpenStack Icehouse Overview
 
Introduction to Container Storage Interface (CSI)
Introduction to Container Storage Interface (CSI)Introduction to Container Storage Interface (CSI)
Introduction to Container Storage Interface (CSI)
 
Topologies of OpenStack
Topologies of OpenStackTopologies of OpenStack
Topologies of OpenStack
 
Introduction to kubernetes
Introduction to kubernetesIntroduction to kubernetes
Introduction to kubernetes
 
Architecture Overview: Kubernetes with Red Hat Enterprise Linux 7.1
Architecture Overview: Kubernetes with Red Hat Enterprise Linux 7.1Architecture Overview: Kubernetes with Red Hat Enterprise Linux 7.1
Architecture Overview: Kubernetes with Red Hat Enterprise Linux 7.1
 
實際架構實踐演化與解決方案
實際架構實踐演化與解決方案實際架構實踐演化與解決方案
實際架構實踐演化與解決方案
 
Kubernetes Meetup - Seattle 2017-06-01
Kubernetes Meetup - Seattle 2017-06-01Kubernetes Meetup - Seattle 2017-06-01
Kubernetes Meetup - Seattle 2017-06-01
 

Similar to The Enterprise IT Checklist for Docker Operations

Monitoring in Motion: Monitoring Containers and Amazon ECS
Monitoring in Motion: Monitoring Containers and Amazon ECSMonitoring in Motion: Monitoring Containers and Amazon ECS
Monitoring in Motion: Monitoring Containers and Amazon ECS
Amazon Web Services
 
How to accelerate docker adoption with a simple and powerful user experience
How to accelerate docker adoption with a simple and powerful user experienceHow to accelerate docker adoption with a simple and powerful user experience
How to accelerate docker adoption with a simple and powerful user experience
Docker, Inc.
 
Tungsten Fabric Overview
Tungsten Fabric OverviewTungsten Fabric Overview
Tungsten Fabric Overview
Michelle Holley
 
Scaling Security on 100s of Millions of Mobile Devices Using Apache Kafka® an...
Scaling Security on 100s of Millions of Mobile Devices Using Apache Kafka® an...Scaling Security on 100s of Millions of Mobile Devices Using Apache Kafka® an...
Scaling Security on 100s of Millions of Mobile Devices Using Apache Kafka® an...
confluent
 
Scalability strategies for cloud based system architecture
Scalability strategies for cloud based system architectureScalability strategies for cloud based system architecture
Scalability strategies for cloud based system architecture
SangJin Kang
 
Characterizing and contrasting kuhn tey-ner awr-kuh-streyt-ors
Characterizing and contrasting kuhn tey-ner awr-kuh-streyt-orsCharacterizing and contrasting kuhn tey-ner awr-kuh-streyt-ors
Characterizing and contrasting kuhn tey-ner awr-kuh-streyt-ors
Lee Calcote
 
Build cloud native solution using open source
Build cloud native solution using open source Build cloud native solution using open source
Build cloud native solution using open source
Nitesh Jadhav
 
Introduction to containers, k8s, Microservices & Cloud Native
Introduction to containers, k8s, Microservices & Cloud NativeIntroduction to containers, k8s, Microservices & Cloud Native
Introduction to containers, k8s, Microservices & Cloud Native
Terry Wang
 
WSO2 Customer Webinar: WEST Interactive’s Deployment Approach and DevOps Prac...
WSO2 Customer Webinar: WEST Interactive’s Deployment Approach and DevOps Prac...WSO2 Customer Webinar: WEST Interactive’s Deployment Approach and DevOps Prac...
WSO2 Customer Webinar: WEST Interactive’s Deployment Approach and DevOps Prac...
WSO2
 
Deploy Microservices in the Real World
Deploy Microservices in the Real WorldDeploy Microservices in the Real World
Deploy Microservices in the Real World
Elana Krasner
 
What's New in Docker - February 2017
What's New in Docker - February 2017What's New in Docker - February 2017
What's New in Docker - February 2017
Patrick Chanezon
 
Sector Sphere 2009
Sector Sphere 2009Sector Sphere 2009
Sector Sphere 2009
lilyco
 
sector-sphere
sector-spheresector-sphere
sector-spherexlight
 
Infrastructure Considerations : Design : "webops"
Infrastructure Considerations : Design : "webops"Infrastructure Considerations : Design : "webops"
Infrastructure Considerations : Design : "webops"Piyush Kumar
 
Tokyo azure meetup #12 service fabric internals
Tokyo azure meetup #12   service fabric internalsTokyo azure meetup #12   service fabric internals
Tokyo azure meetup #12 service fabric internals
Tokyo Azure Meetup
 
AWS re:Invent 2016: Introduction to Container Management on AWS (CON303)
AWS re:Invent 2016: Introduction to Container Management on AWS (CON303)AWS re:Invent 2016: Introduction to Container Management on AWS (CON303)
AWS re:Invent 2016: Introduction to Container Management on AWS (CON303)
Amazon Web Services
 
AWS re:Invent 2016: Service Integration Delivery and Automation Using Amazon ...
AWS re:Invent 2016: Service Integration Delivery and Automation Using Amazon ...AWS re:Invent 2016: Service Integration Delivery and Automation Using Amazon ...
AWS re:Invent 2016: Service Integration Delivery and Automation Using Amazon ...
Amazon Web Services
 
DCEU 18: From Legacy Mainframe to the Cloud: The Finnish Railways Evolution w...
DCEU 18: From Legacy Mainframe to the Cloud: The Finnish Railways Evolution w...DCEU 18: From Legacy Mainframe to the Cloud: The Finnish Railways Evolution w...
DCEU 18: From Legacy Mainframe to the Cloud: The Finnish Railways Evolution w...
Docker, Inc.
 
SPCA2013 - Windows Azure for SharePoint People
SPCA2013 - Windows Azure for SharePoint PeopleSPCA2013 - Windows Azure for SharePoint People
SPCA2013 - Windows Azure for SharePoint People
NCCOMMS
 
Five Steps to Creating a Secure Hybrid Cloud Architecture
Five Steps to Creating a Secure Hybrid Cloud ArchitectureFive Steps to Creating a Secure Hybrid Cloud Architecture
Five Steps to Creating a Secure Hybrid Cloud Architecture
Amazon Web Services
 

Similar to The Enterprise IT Checklist for Docker Operations (20)

Monitoring in Motion: Monitoring Containers and Amazon ECS
Monitoring in Motion: Monitoring Containers and Amazon ECSMonitoring in Motion: Monitoring Containers and Amazon ECS
Monitoring in Motion: Monitoring Containers and Amazon ECS
 
How to accelerate docker adoption with a simple and powerful user experience
How to accelerate docker adoption with a simple and powerful user experienceHow to accelerate docker adoption with a simple and powerful user experience
How to accelerate docker adoption with a simple and powerful user experience
 
Tungsten Fabric Overview
Tungsten Fabric OverviewTungsten Fabric Overview
Tungsten Fabric Overview
 
Scaling Security on 100s of Millions of Mobile Devices Using Apache Kafka® an...
Scaling Security on 100s of Millions of Mobile Devices Using Apache Kafka® an...Scaling Security on 100s of Millions of Mobile Devices Using Apache Kafka® an...
Scaling Security on 100s of Millions of Mobile Devices Using Apache Kafka® an...
 
Scalability strategies for cloud based system architecture
Scalability strategies for cloud based system architectureScalability strategies for cloud based system architecture
Scalability strategies for cloud based system architecture
 
Characterizing and contrasting kuhn tey-ner awr-kuh-streyt-ors
Characterizing and contrasting kuhn tey-ner awr-kuh-streyt-orsCharacterizing and contrasting kuhn tey-ner awr-kuh-streyt-ors
Characterizing and contrasting kuhn tey-ner awr-kuh-streyt-ors
 
Build cloud native solution using open source
Build cloud native solution using open source Build cloud native solution using open source
Build cloud native solution using open source
 
Introduction to containers, k8s, Microservices & Cloud Native
Introduction to containers, k8s, Microservices & Cloud NativeIntroduction to containers, k8s, Microservices & Cloud Native
Introduction to containers, k8s, Microservices & Cloud Native
 
WSO2 Customer Webinar: WEST Interactive’s Deployment Approach and DevOps Prac...
WSO2 Customer Webinar: WEST Interactive’s Deployment Approach and DevOps Prac...WSO2 Customer Webinar: WEST Interactive’s Deployment Approach and DevOps Prac...
WSO2 Customer Webinar: WEST Interactive’s Deployment Approach and DevOps Prac...
 
Deploy Microservices in the Real World
Deploy Microservices in the Real WorldDeploy Microservices in the Real World
Deploy Microservices in the Real World
 
What's New in Docker - February 2017
What's New in Docker - February 2017What's New in Docker - February 2017
What's New in Docker - February 2017
 
Sector Sphere 2009
Sector Sphere 2009Sector Sphere 2009
Sector Sphere 2009
 
sector-sphere
sector-spheresector-sphere
sector-sphere
 
Infrastructure Considerations : Design : "webops"
Infrastructure Considerations : Design : "webops"Infrastructure Considerations : Design : "webops"
Infrastructure Considerations : Design : "webops"
 
Tokyo azure meetup #12 service fabric internals
Tokyo azure meetup #12   service fabric internalsTokyo azure meetup #12   service fabric internals
Tokyo azure meetup #12 service fabric internals
 
AWS re:Invent 2016: Introduction to Container Management on AWS (CON303)
AWS re:Invent 2016: Introduction to Container Management on AWS (CON303)AWS re:Invent 2016: Introduction to Container Management on AWS (CON303)
AWS re:Invent 2016: Introduction to Container Management on AWS (CON303)
 
AWS re:Invent 2016: Service Integration Delivery and Automation Using Amazon ...
AWS re:Invent 2016: Service Integration Delivery and Automation Using Amazon ...AWS re:Invent 2016: Service Integration Delivery and Automation Using Amazon ...
AWS re:Invent 2016: Service Integration Delivery and Automation Using Amazon ...
 
DCEU 18: From Legacy Mainframe to the Cloud: The Finnish Railways Evolution w...
DCEU 18: From Legacy Mainframe to the Cloud: The Finnish Railways Evolution w...DCEU 18: From Legacy Mainframe to the Cloud: The Finnish Railways Evolution w...
DCEU 18: From Legacy Mainframe to the Cloud: The Finnish Railways Evolution w...
 
SPCA2013 - Windows Azure for SharePoint People
SPCA2013 - Windows Azure for SharePoint PeopleSPCA2013 - Windows Azure for SharePoint People
SPCA2013 - Windows Azure for SharePoint People
 
Five Steps to Creating a Secure Hybrid Cloud Architecture
Five Steps to Creating a Secure Hybrid Cloud ArchitectureFive Steps to Creating a Secure Hybrid Cloud Architecture
Five Steps to Creating a Secure Hybrid Cloud Architecture
 

Recently uploaded

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

The Enterprise IT Checklist for Docker Operations

  • 1. THE ENTERPRISE IT CHECKLIST FOR DOCKER OPERATIONS Nicola Kabar Solutions Architect Docker @nicolakabar
  • 2. 1. The Enterprise IT Goal: Deliver Value to Customers, Fast!
  • 3. 2. Docker is at the center of it all
  • 4. 3. Biggest challenge is moving to production in time to prove value
  • 6. The Checklist  Infrastructure  Orchestration Management  Image Distribution  Security  Network  Storage  Logging and Monitoring  Integration  Disaster Recovery  Testing
  • 7. You can also follow along !
  • 8. Infrastructure  Cluster Sizing and Zoning  Supported and Compatible ( OS, Docker Engine, UCP, DTR)  Host Sizing ( Manager vs Worker Nodes) • Manager(minimum): 16G mem, 4 vCPU, 1+ Gbps, 32+ GB disk • Worker(minimum): 4G mem, 2 vCPU, 100+ Mbps, 8 GB disk
  • 9. Orchestration Management  Redundant/Highly Available UCP managers  Deployed in odd numbers (3,5,7) to maintain quorum  Distributed across DCs or Availability Zones (1-1-1, 2-2-1..etc)  Fine-tuned orchestration settings (e.g Task History Limit, Raft Settings, Node Certificate Rotation)
  • 10. Orchestration Management  Upstream TCP load balancing  No application workloads on managers  Automated join and leave process  Labeled resources (networks, volumes, containers, services, secrets, nodes)
  • 11. Image Distribution  Redundant (3,5,7) DTR Replicas  Replicated and secured image backend storage (NFS, S3, Azure Storage…etc)  Garbage collection enabled  Security scanning enabled
  • 12. Security  Utilize Docker EE RBAC Model ( Subjects, Grants, Roles, Collection, Resource)  AD/LDAP groups mapped to teams and organizations  Docker Content Trust Signing and Enforcement  Regular Run of Docker Security Bench
  • 13. Security  Restricted direct access (SSH/RDP)  Utilize built-in Secrets functionality (encrypted, controlled)  Rotate orchestration join keys  Use built-in or your own CA  Valid SSL/TLS certificates for UCP and DTR
  • 14. Network  Pick right networking driver for your application (overlay , bridge+host port mapping)  Select proper publishing mode for external traffic ( Ingress vs. Host Mode)  Pick suitable load-balancing mode ( client side = dnsrr, server- side = vip)  Network latency < 100ms
  • 15. Network  Segment app at L3 with overlays (1 App  1 Overlay Network)  Utilize built-in encrypted overlay feature ( app <--> app encrypted)  Pick the application subnet size carefully  Designated non-overlapping subnets to be used by Docker for overlay networks
  • 16. OVERLAY A: 10.10.10.0/24 10.10.10.0/24 CONTAINER A: 10.10.10.10/24 SERVER A:10.10.10.100 Docker Underlay Network Customer Story
  • 17. OVERLAY A: 10.10.200.0/24 10.10.10.0/24 CONTAINER A: 10.10.200.10/24 SERVER A:10.10.10.100 Docker Underlay Network Recommendation
  • 18. Customer Story X Improper network subnet design X Overlapping subnet with underlay range X Black holing traffic intended for services outside the cluster X Recommendation: dedicate subnets from the underlay to be used by Docker
  • 19. Storage  Production-ready configured engine storage backend ( esp. devicemapper for centos/RHEL)  Replicated and secure DTR storage backend  Certified and tested application data storage plugin for replicating application data
  • 20. Logging and Monitoring  External centralized logging for engine and application containers logs  Local logging for active trouble-shooting (JSON or JournalD)  Host-level and container-level resource monitoring  DTR image backend storage monitoring  Docker engine storage monitoring  Use built-in application health checking functionality
  • 22. Customer Story X DTR storage backend was not monitored X GC was not enabled X CI led to excessive image pushes X Storage filled up -> can’t push to DTR  Recommendation: Monitor storage backend, enable GC
  • 23. Integration  UCP and DTR are well integrated ( SSO, DCT..etc)  CI/CD tooling ( Jenkins, Bamboo, CircleCI, TravisCI..etc)  Development tooling (dev machines, IDEs)  Configuration automation tools (Puppet, Chef, Ansible, Salt)  Resource provisioning systems ( Terraform..etc)
  • 24. Integration  Change management systems  Internal/external DNS or other service discovery and registration systems  Load balancing for both the management plane and each of the applications ( L4/L7)  Incident/ticketing management systems (ServiceNow, etc)
  • 25. Disaster Recovery  Regular (rec. weekly) backups (UCP, DTR, and Swarm)  Well-tested, automated, and documented • platform restoration • upgrade + downgrade • application recovery procedure
  • 27. Customer Story X No backups since installation X Lost quorum led to cluster failure X No way to recover UCP and DTR configurations X Manual re-install + re-config of settings, teams, groups  Recommendation: Frequent backup, tested restore procedures
  • 28. Testing  Multi-platform image pull and push to DTR  Confirm users have the right set of access to their respective resources  Confirm application resource limitation works as expected  End-to-end stack deployment from CLI and UI  Updating applications with new configuration, images, networks using rolling upgrade
  • 30. Things you can find in Success Center ● Complete Docker EE Cluster Upgrade Guide ● End-to-End Security Best Practices ● Logging Design and Best Practices ● Support & Compatibility Matrix ● Troubleshooting Guides ● + 100s of Technical Assets
  • 31. Key Takeaways  Define a readiness checklist for an accelerated, smooth and successful path to production  Design the Docker Enterprise platform based on recommended architectures  Deliver to Differentiate
  • 32. Sign Up for Docker EE Hosted Demo and Kubernetes Beta ! docker.com/trial docker.com/kubernetes

Editor's Notes

  1. This talks is all about sharing a checklist that can accelerate your CaaS production readiness
  2. High Availability require 3,5,7 managers to match application requirements. Settings include task history limit, snapshotting limits, key rotation frequency, scheduling strategy...etc
  3. High Availability require 3,5,7 managers to match application requirements. Settings include task history limit, snapshotting limits, key rotation frequency, scheduling strategy...etc
  4. Managers 16 G memory 4 vCPU 1+ Gbps Network BW 32 GB Storage
  5. High Availability require 3,5,7 managers to match application requirements. Settings include task history limit, snapshotting limits, key rotation frequency, scheduling strategy...etc - Fine tune orchestration setting (Task History Limit = 1) Node Certificate Expiry Setting Raft Settings)
  6. High Availability require 3,5,7 managers to match application requirements. Settings include task history limit, snapshotting limits, key rotation frequency, scheduling strategy...etc - Fine tune orchestration setting (Task History Limit = 1) Node Certificate Expiry Setting Raft Settings)
  7. Role-based access control providing right level of access to the various team members
  8. (bridge for local services, overlay for secured west<>east traffic, or macvlan for north<>south ingress traffic)