Kubernetes deployment via automated CI/CD pipelines is always a hassle that requires some expertise in the DevOps field. In this post, we talk about Devtron; a tool to create CI/CD pipelines for Kubernetes in a no Code format.
Podman, a platform which runs and manages rootless containers,adds an additional layer of security over Docker. In this post, we play around with the "docker alias" podman CLI to see if its really rootless.
Docker daemon runs with elevated root access which is a security loophole. Rootless containers avoid this by allowing non privileged users to run containers through the use of user namespaces.Podman is one framework that allows running and managing rootless containers.
Docker simplifies and accelerates your workflow and deployment.
But due to this friendly behavior of Docker, we tend to overlook some of its limitations & vulnerabilities. In this post we'll be looking at Docker through a major aspect: Security.
When a container is created, an additional writable layer called the "container layer" substitutes for the filesystem within the container. But all files created within the container will not be persisted on the host.
Hence, we use Docker bind mounts and volumes to allow persistence.
Deploying your application means that it should work on another system without any hiccups. How do you ensure that all consumers can use your application seamlessly? Let's look at how deployments were done over the past few years.
How are dependencies managed in Go? This post will walk you through Go package management with go modules along with the significance of the "go.mod" and "go.sum" files. You'll get familiar with a few handy commands like "go get" and "go mod" to create your own module in Go.
Go inherently supports concurrency through the use of Goroutines and Channels. These mechanisms are completely managed by the Go runtime making them a better choice over the use of threads