Useful Links
Computer Science
Cloud Computing
Cloud Native Development
1. Foundations of Cloud Native
2. Microservices Architecture
3. Containerization
4. Container Orchestration with Kubernetes
5. DevOps and Automation
6. Cloud Native Observability
7. Advanced Cloud Native Concepts
8. Cloud Native Platforms and Ecosystem
9. Cloud Native Development Practices
Containerization
Fundamentals of Containers
Containers vs. Virtual Machines
Resource Utilization
Isolation Mechanisms
Performance Characteristics
Use Case Comparison
Linux Kernel Features
Namespaces
Process Isolation
Network Isolation
Filesystem Isolation
User Isolation
Control Groups (cgroups)
Resource Limiting
Resource Accounting
Process Prioritization
Container Standards
The Open Container Initiative (OCI)
OCI Image Specification
OCI Runtime Specification
OCI Distribution Specification
Docker
Docker Engine and Architecture
Docker Daemon
Docker CLI
Container Runtime
containerd
runc
Docker Images
Image Layers
Layer Caching
Layer Sharing
Copy-on-Write
The Dockerfile
Instructions and Syntax
Multi-Stage Builds
Build Context
.dockerignore
Best Practices for Building Images
Minimizing Image Size
Security Considerations
Layer Optimization
Base Image Selection
Docker Containers
Container Lifecycle Management
Creating Containers
Starting Containers
Stopping Containers
Removing Containers
Container States
Networking in Docker
Bridge Networks
Host Networks
Overlay Networks
Custom Networks
Port Mapping
Volumes and Persistent Storage
Volume Types
Bind Mounts
tmpfs Mounts
Data Persistence Strategies
Docker Compose
Compose File Structure
Service Definitions
Networking in Compose
Volume Management
Environment Variables
Multi-Environment Configurations
Container Registries
Docker Hub
Private Registries
Registry Security
Image Tagging and Versioning
Image Pull and Push Operations
Registry APIs
Alternative Container Runtimes
Podman
CRI-O
containerd
Buildah
Container Security
Image Vulnerability Scanning
Static Analysis
Vulnerability Databases
Scanning Tools
Runtime Security
Least Privilege Principle
Seccomp Profiles
AppArmor Profiles
SELinux
Secrets Management in Containers
Environment Variables
Secret Mounting
External Secret Management
Image Signing and Verification
Content Trust
Notary
Cosign
Previous
2. Microservices Architecture
Go to top
Next
4. Container Orchestration with Kubernetes