Skip to content

Commit c521d41

Browse files
authored
Merge pull request #1 from toriancrane/torian/what-is-keyvault
Add "What is Azure Key Vault" SEO Page
2 parents 0abb6ca + fd5453d commit c521d41

File tree

3 files changed

+239
-36
lines changed

3 files changed

+239
-36
lines changed

pulumi-hugo/themes/default/content/what-is/what-are-docker-configs.md

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -4,24 +4,24 @@ meta_desc: |
44
Learn more about what Docker Configs are and how to use them.
55
66
type: what-is
7-
page_title: "What are Docker Configs"
7+
page_title: "What are Docker Configs?"
88
---
99

10-
Docker, a leading platform in containerization technology, has revolutionized how applications are developed, shipped, and deployed. An essential facet of this ecosystem is the effective management of configuration data. [Docker Configs](https://docs.docker.com/engine/swarm/configs/) is a feature specially crafted to handle non-sensitive configuration information within Docker environments. This guide explores the ins and outs of Docker Configs, highlighting its importance, functionality, and best practices.
10+
Docker, a leading platform in containerization technology, has revolutionized how applications are developed, shipped, and deployed. An essential facet of this ecosystem is the effective management of configuration data. [Docker Configs](https://docs.docker.com/engine/swarm/configs/) is a feature specially crafted to handle non-sensitive configuration information within Docker environments.
1111

12-
### What are Docker Configs?
12+
## What are Docker Configs?
1313

1414
Docker Configs are a resource in Docker for storing non-sensitive information such as configuration files, separate from a service's image or running containers within [Docker Swarm](https://docs.docker.com/engine/swarm/) environments. This enables keeping Docker images as generic as possible without the need for bind-mounting configuration files into containers or using environment variables. Unlike [Docker Secrets](/what-is/what-are-docker-secrets), Docker Configs are not encrypted at rest and are directly mounted into the container's filesystem.
1515

16-
#### Key Features
16+
### Key features
1717

18-
- **Separation of Configuration from Code**: Docker Configs allow you to store configuration files outside of your Docker images, leading to more generic and reusable images.
19-
- **Flexibility in Management**: Configs can be added, updated, or removed from services dynamically, without the need to rebuild or restart containers.
20-
- **Secure Transmission**: Configs are sent to the swarm manager over a mutual TLS connection and are stored securely.
21-
- **Easy Access within Containers**: Configs are automatically mounted into the container's filesystem, making them easily accessible to applications.
22-
- **Support for Various Data Types**: Configs can store generic strings or binary content, providing flexibility for different types of configuration data.
18+
- **Separation of configuration from code**: Docker Configs allow you to store configuration files outside of your Docker images, leading to more generic and reusable images.
19+
- **Flexibility in management**: Configs can be added, updated, or removed from services dynamically, without the need to rebuild or restart containers.
20+
- **Secure transmission**: Configs are sent to the swarm manager over a mutual TLS connection and are stored securely.
21+
- **Easy access within containers**: Configs are automatically mounted into the container's filesystem, making them easily accessible to applications.
22+
- **Support for various data types**: Configs can store generic strings or binary content, providing flexibility for different types of configuration data.
2323

24-
### Creating Configs
24+
## Creating Docker Configs
2525

2626
Docker Configs can be created via the Docker CLI. Before creating configs in Docker, you must first make sure you have [Docker installed](https://docs.docker.com/get-docker/). Once you have installed Docker, enable and start the Docker service.
2727

@@ -62,7 +62,7 @@ To add a worker to this swarm, run the following command:
6262
To add a manager to this swarm, run 'docker swarm join-token manager' and follow the instructions.
6363
```
6464

65-
#### Create a config via the CLI
65+
### Create a config via the CLI
6666

6767
You can create a config by piping the configuration data into the `docker config create` command.
6868

@@ -106,7 +106,7 @@ ID NAME IMAGE NODE
106106
kf8ysfgiipkb myservice.1 nginx:latest ip-172-31-30-90.eu-central-1.compute.internal Running Running 35 seconds ago
107107
```
108108

109-
#### Accessing configs inside a container
109+
### Accessing configs inside a container
110110

111111
Now that you have created a service with a config, you can access the value of this config from within the container.
112112

@@ -139,19 +139,19 @@ root@00a6ae3d1bd5:/# cat /my-config
139139
This is my config data
140140
```
141141

142-
### Challenges and Considerations
142+
## Challenges and considerations
143143

144144
Docker Configs, similar to Docker Secrets, provide a useful way to manage configuration data in Docker environments, particularly in Docker Swarm. However, they also come with their own set of challenges and considerations:
145145

146146
- **Limited to Docker Swarm**: Like Docker Secrets, Docker Configs are specifically designed for Docker Swarm. This means they are not natively available for standalone Docker containers or other container orchestrators like Kubernetes. This limitation can be significant for teams not using Docker Swarm.
147147

148-
- **Not Suitable for Sensitive Data**: Docker Configs are not encrypted at rest, unlike Docker Secrets. This makes them unsuitable for storing sensitive data such as passwords, tokens, or private keys. They should be used only for non-sensitive configuration data.
148+
- **Not suitable for sensitive data**: Docker Configs are not encrypted at rest, unlike Docker Secrets. This makes them unsuitable for storing sensitive data such as passwords, tokens, or private keys. They should be used only for non-sensitive configuration data.
149149

150-
- **Size Limitation**: There is a size limit for the contents of Docker Configs (typically around 500 KB). This limitation can be a challenge when dealing with large configuration files.
150+
- **Size limitation**: There is a size limit for the contents of Docker Configs (typically around 500 KB). This limitation can be a challenge when dealing with large configuration files.
151151

152-
- **Immutable Once Attached to Running Services**: Once a config is attached to a running service, it cannot be edited. Any changes require creating a new config and updating the service to use this new config, which might cause service disruption.
152+
- **Immutable once attached to running services**: Once a config is attached to a running service, it cannot be edited. Any changes require creating a new config and updating the service to use this new config, which might cause service disruption.
153153

154-
### Best Practices
154+
## Best practices
155155

156156
When using Docker Configs, it's important to follow best practices to ensure efficient and secure management of your configuration data:
157157

@@ -162,13 +162,13 @@ When using Docker Configs, it's important to follow best practices to ensure eff
162162

163163
By following these best practices, you can maximize the benefits of Docker Configs in managing your application's configuration data effectively and securely.
164164

165-
### Conclusion
165+
## Conclusion
166166

167167
Docker Configs offer a flexible and secure way to manage non-sensitive configuration data in Docker environments. By storing configuration outside of application code, Docker Configs facilitate a more modular and maintainable architecture.
168168

169169
Now that you're equipped with the knowledge of Docker Configs, take your cloud infrastructure management to the next level with Pulumi. Explore these key resources to deepen your understanding and enhance your implementation strategies:
170170

171-
- **Advanced Configuration Management**: Discover how to efficiently manage configuration data in your cloud applications. Dive into Pulumi's [Configuration Management docs](/docs/concepts/config/) for in-depth information on creating and managing configuration across stacks and projects.
172-
- **Container Management Solutions**: Learn about deploying containers with ease using Pulumi. Whether you prefer low-management solutions like AWS Fargate and Microsoft ACI for ease of deployment or require complete control with Kubernetes-based solutions, our [Container Management](/containers/) docs provide comprehensive insights. They cover everything from managing clusters and infrastructure to deploying application containers in various environments.
171+
- **Advanced configuration management**: Discover how to efficiently manage configuration data in your cloud applications. Dive into Pulumi's [Configuration Management docs](/docs/concepts/config/) for in-depth information on creating and managing configuration across stacks and projects.
172+
- **Container management solutions**: Learn about deploying containers with ease using Pulumi. Whether you prefer low-management solutions like AWS Fargate and Microsoft ACI for ease of deployment or require complete control with Kubernetes-based solutions, our [Container Management](/containers/) docs provide comprehensive insights. They cover everything from managing clusters and infrastructure to deploying application containers in various environments.
173173

174174
Our [community on Slack](https://slack.pulumi.com/) is always open for discussions, questions, and sharing experiences. Join us there and become part of our growing community of cloud professionals!

pulumi-hugo/themes/default/content/what-is/what-are-docker-secrets.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -4,22 +4,22 @@ meta_desc: |
44
Learn more about what Docker Secrets are and how to use them.
55
66
type: what-is
7-
page_title: "What are Docker Secrets"
7+
page_title: "What are Docker Secrets?"
88
---
99

10-
Docker, a leading platform in containerization technology, has revolutionized how applications are developed, shipped, and deployed. One critical aspect of this process is managing sensitive information, commonly known as "secrets." [Docker Secrets](https://docs.docker.com/engine/swarm/secrets/) is a feature specifically designed for safely transmitting and storing confidential data within Docker environments. This guide explores the ins and outs of Docker Secrets, highlighting its importance, functionality, and best practices.
10+
Docker, a leading platform in containerization technology, has revolutionized how applications are developed, shipped, and deployed. One critical aspect of this process is managing sensitive information, commonly known as "secrets." [Docker Secrets](https://docs.docker.com/engine/swarm/secrets/) is a feature specifically designed for safely transmitting and storing confidential data within Docker environments.
1111

12-
### What are Docker Secrets?
12+
## What are Docker Secrets?
1313

1414
Docker Secrets is a resource for securely managing sensitive data like passwords, tokens, and SSH keys within [Docker Swarm](https://docs.docker.com/engine/swarm/) environments. Unlike [Docker Configs](/what-is/what-are-docker-configs/) which only encrypts data in transit, Docker Secrets are designed to keep data safe both in transit and at rest.
1515

16-
#### Key Features
16+
### Key Features
1717

18-
- **Secure Storage**: Docker Secrets are encrypted during transit and at rest, offering a robust level of security.
19-
- **Managed Lifecycle**: Secrets can be created, updated, and removed without restarting containers, ensuring seamless management.
20-
- **Access Control**: Only services granted explicit access can retrieve these secrets, enhancing security through compartmentalization.
18+
- **Secure storage**: Docker Secrets are encrypted during transit and at rest, offering a robust level of security.
19+
- **Managed lifecycle**: Secrets can be created, updated, and removed without restarting containers, ensuring seamless management.
20+
- **Access control**: Only services granted explicit access can retrieve these secrets, enhancing security through compartmentalization.
2121

22-
### Creating Secrets
22+
## Creating secrets
2323

2424
Secrets can be created via the Docker CLI or Docker Compose files. Once created, they are stored in a secure part of the Docker Swarm. Before creating secrets in Docker, you must first make sure you have [Docker installed](https://docs.docker.com/get-docker/). Once you have installed Docker, enable and start the Docker service.
2525

@@ -60,7 +60,7 @@ To add a worker to this swarm, run the following command:
6060
To add a manager to this swarm, run 'docker swarm join-token manager' and follow the instructions.
6161
```
6262

63-
#### Create a secret via CLI
63+
### Create a secret via CLI
6464

6565
You can create a secret by piping the secret data into the `docker secret create` command.
6666

@@ -98,7 +98,7 @@ ID NAME IMAGE NODE
9898
w6i5cct5o9gw myservice.1 nginx:latest ip-172-31-30-90.eu-central-1.compute.internal Running Running 52 seconds ago
9999
```
100100

101-
#### Create a secret via Docker Compose
101+
### Create a secret via Docker Compose
102102

103103
Before implementing Docker Secrets with Docker Compose, ensure [Docker Compose is installed](https://docs.docker.com/compose/install/) on your system.
104104

@@ -124,7 +124,7 @@ Now use Docker Compose to deploy your stack. This will create the secret and att
124124
docker-compose up -d
125125
```
126126

127-
#### Accessing secrets inside a container
127+
### Accessing secrets inside a container
128128

129129
Now that you have created a service with a secret, you can access the value of this secret from within the container.
130130

@@ -157,11 +157,11 @@ root@00a6ae3d1bd5:/# cat /run/secrets/my_secret
157157
my_secret_data
158158
```
159159

160-
### Challenges and Considerations
160+
## Challenges and considerations
161161

162162
While Docker Secrets is a valuable tool for managing sensitive data in Docker Swarm, it has its limitations. One major challenge is its confinement to Docker Swarm environments, meaning it's not applicable for standalone Docker containers or other orchestrators like Kubernetes. Additionally, Docker Secrets lacks a direct mechanism for automatic secrets rotation, a crucial aspect for maintaining security over time.
163163

164-
### Best Practices
164+
## Best practices
165165

166166
When using Docker Secrets, it's important to follow best practices to ensure efficient and secure management of your sensitive data:
167167

@@ -173,13 +173,13 @@ When using Docker Secrets, it's important to follow best practices to ensure eff
173173

174174
By following these best practices, you can maximize the benefits of Docker Secrets in managing your application's sensitive data effectively and securely.
175175

176-
### Conclusion
176+
## Conclusion
177177

178178
Docker Secrets is a vital feature for anyone using Docker Swarm, offering a secure and straightforward way to handle sensitive data. By understanding and implementing Docker Secrets correctly, teams can significantly enhance the security posture of their containerized applications.
179179

180180
Now that you're equipped with the knowledge of Docker Secrets, take your cloud infrastructure management to the next level with Pulumi. Explore these key resources to deepen your understanding and enhance your implementation strategies:
181181

182-
- **Advanced Secrets Management**: Discover how to efficiently manage sensitive data and secrets in your cloud applications. Dive into Pulumi's [Secrets Management guide](/blog/managing-secrets-with-pulumi/) for in-depth information on encrypting specific values for added security and ensuring that these values never appear in plain text in your state file​.
183-
- **Container Management Solutions**: Learn about deploying containers with ease using Pulumi. Whether you prefer low-management solutions like AWS Fargate and Microsoft ACI for ease of deployment or require complete control with Kubernetes-based solutions, our [Container Management](/containers/) docs provide comprehensive insights. They cover everything from managing clusters and infrastructure to deploying application containers in various environments​.
182+
- **Advanced secrets management**: Discover how to efficiently manage sensitive data and secrets in your cloud applications. Dive into Pulumi's [Secrets Management guide](/blog/managing-secrets-with-pulumi/) for in-depth information on encrypting specific values for added security and ensuring that these values never appear in plain text in your state file​.
183+
- **Container management solutions**: Learn about deploying containers with ease using Pulumi. Whether you prefer low-management solutions like AWS Fargate and Microsoft ACI for ease of deployment or require complete control with Kubernetes-based solutions, our [Container Management](/containers/) docs provide comprehensive insights. They cover everything from managing clusters and infrastructure to deploying application containers in various environments​.
184184

185185
Our [community on Slack](https://slack.pulumi.com/) is always open for discussions, questions, and sharing experiences. Join us there and become part of our growing community of cloud professionals!

0 commit comments

Comments
 (0)