Container Technology Wiki
Docker Containers
- Docker 101
- Basic Docker Operations
- Docker Administration
- Docker Security Resources
- Docker OS Interaction
- Docker With Other Tools
- Docker API
- Docker Compose
Kubernetes Guide
- Kubernetes 101
-
Kubernetes Architecture
- Kubernetes Ecosystem
- Kubernetes Nodes
- Kubernetes Pods
- Kubernetes Controllers and Control Plane
- Kubernetes DaemonSets
- Container Runtime Interface
- Working with Containers in Kubernetes
- Working with Images in Kubernetes
- Workloads in Kubernetes
- Kubernetes Services
- Kubernetes Jobs
- Kubernetes and Microservices
- Kubernetes Operators
- Kubernetes Persistent Volumes
- Kubernetes Advantages and Use Cases
-
Kubernetes Operations
- Installing Kubernetes
- Kubernetes Configuration
- Kubernetes Monitoring
- Kubernetes Debugging and Troubleshooting
- Kubernetes Load Balancing
- Kubernetes Security
- Kubernetes Networking
- Kubernetes Storage Management
- Kubernetes in Production
- Working with Kubernetes Ingress
- Kubernetes Security Best Practices
- Managing Kubernetes with Kops and Kubeadm
- Kubernetes Secrets
- Kubernetes Autoscaling
- Kubernetes ConfigMap
- Kubernetes Namespace
- Kubernetes Authentication
- Kubernetes Vault
- CIS Kubernetes Benchmark
- Kubernetes Cluster
- Kubernetes as a Service
- Managed Kubernetes
- Kubernetes Distributions
- Enterprise Kubernetes
Container Basics
- Container Architecture
- Advantages of Containers
- Container Challenges
- Containers and IT Infrastructure
- Enterprise DevOps
- eBPF
- eBPF Linux
Containers Ops
- Container Security Management
- Container Deployment
- Container Monitoring
- Container Automation
- Container Multitenancy
- Container Backup and Disaster Recovery
- Prometheus Monitoring
Container Security
- Container Security Best Practices
- Containers for DevSecOps
- Container Vulnerabilities and Threats
- Container Vulnerability Scanning
- Container Secrets Management
- Container Access Control
- Container Audits and Compliance
- Application Whitelisting
- Zero Trust Networks
- Network Segmentation for Containers
- Container Isolation
- Open Source Security Tools for Containers
- Open Source Vulnerability Scanner
- Open Source Security Tools
- Container Security Tools
Cloud Native Computing Foundation
- AWS EC2 Security
- Cloud-Native Applications
- Cloud-Native Architecture
- Cloud Native AWS
- Cloud Native Development
- Cloud Native Infrastructure
- Cloud Native Security
- Envoy Proxy
- Harbor Kubernetes
- Open Policy Agent
- Oracle Cloud Security
- SaaS Cloud Security
- Security Issues in Cloud Computing
- SPIFFE
- VMware Tanzu
Serverless Computing
- Serverless Architecture
- AWS Lambda
- Azure Functions
- Google Cloud Functions
- Serverless Security
- On-Premises Serverless Platforms
- Function as a Service - FaaS
- Knative
- Serverless vs Containers
Container Platforms
- Containers and Cloud Computing
- Container Operating Systems
- Red Hat Openshift
- Pivotal Container Service
- Multi-Cloud Strategy
- Kubernetes vs Cloud Foundry
- CWPP
Other Container Engines
Kubernetes Alternatives
Container Community and Events
- Container Technology Wiki
- Containers Ops
- Container Automation
Container Automation
Software development groups realize that the only way they can make the development and tooling processes work at scale is by automating as much as possible to reduce the scope of manual process. This page gathers resources about how containers integrate in different aspects of automation like automated builds, automated tests and more.
Below we have compiled publicly available sources from around the world that present views on Container Automation.
The Container Security book by Liz Rice
Fundamental Technology Concepts that Protect Containerized Applications
Perspectives on Container Automation
Aqua 1.1: Automating a Secure Container Pipeline
Introduction to a new version of Aqua with a security automation feature.
Securing Containerized Applications: Automate, Automate, Automate
This post talks about how vulnerability management, security policy enforcement, and threat prevention can move at the speed of continuous delivery.
How To

Configure Automated Builds on Docker Hub
docs.docker.com

How to Automate Kubernetes Workflows
buddy.works

Automate Installing Docker and Docker Compose With Ansible
nickjanetakis.com
Specific Technologies

Katalon Test Automation is now Running on Docker Container
executeautomation.com

Automating Jenkins Docker Setup
technologyconversations.com

Labelling Automated Builds on Docker Hub
medium.com

How to Automate a Kubernetes Cluster to Manage Containers
theserverside.com
Further Reading
Container Security Management — Securing containers requires a different approach. Since containers run on a shared host and typically use multiple components to deliver a complete solution, there are many considerations that are required to secure container environment. This page gathers resources about managing security in containers including security considerations, security best practices and more.
Container Deployment — Container-based deployments have become the preferred approach for managing the build and release of complex applications. Popular container technologies such as Docker enable developer velocity by providing a robust environment closely resembling production that can be constructed in minutes. This page gathers resources about container-based deployments, including overviews, tutorials and more.
Container Monitoring — Container monitoring is the activity of monitoring the performance of microservice containers in different environments. Monitoring is the first step towards optimizing and improving performance. This page gathers resources about the container monitoring process, tools and important metrics to watch during the process.
Container Automation — Software development groups realize that the only way they can make the development and tooling processes work at scale is by automating as much as possible to reduce the scope of manual process. This page gathers resources about how containers integrate in different aspects of automation like automated builds, automated tests and more.
Container Multitenancy — Multi-tenancy is an architecture in which a single instance of a software application serves multiple customers. Each customer is called a tenant. This page gathers resources about the importance of multitenancy in containerize apps delivery.
Container Backup and Disaster Recovery — Containers are like any other data source that needs to be protected. As your organization comes to rely on Docker containerization technology for critical IT functions, you need to ensure appropriate safeguards are in place to minimize disruptions to your business operations. This page gathers resources about container backup and disaster recovery methods, tools and guides on how to set it up.
Prometheus Monitoring— Prometheus is a systems and service monitoring system. It collects metrics from configured targets at given intervals, evaluates rule expressions, displays the results, and can trigger alerts if some condition is observed to be true. This Page gathers resources about Prometheus’ architecture, pros and cons, Installing Prometheus and more.
Get updates on container technology










