You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: pulumi-hugo/themes/default/content/what-is/what-are-docker-configs.md
+20-20Lines changed: 20 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,24 +4,24 @@ meta_desc: |
4
4
Learn more about what Docker Configs are and how to use them.
5
5
6
6
type: what-is
7
-
page_title: "What are Docker Configs"
7
+
page_title: "What are Docker Configs?"
8
8
---
9
9
10
-
Docker, a leading platform in containerization technology, has revolutionized how applications are developed, shipped, and deployed. An essential facet of this ecosystem is the effective management of configuration data. [Docker Configs](https://docs.docker.com/engine/swarm/configs/) is a feature specially crafted to handle non-sensitive configuration information within Docker environments. This guide explores the ins and outs of Docker Configs, highlighting its importance, functionality, and best practices.
10
+
Docker, a leading platform in containerization technology, has revolutionized how applications are developed, shipped, and deployed. An essential facet of this ecosystem is the effective management of configuration data. [Docker Configs](https://docs.docker.com/engine/swarm/configs/) is a feature specially crafted to handle non-sensitive configuration information within Docker environments.
11
11
12
-
###What are Docker Configs?
12
+
## What are Docker Configs?
13
13
14
14
Docker Configs are a resource in Docker for storing non-sensitive information such as configuration files, separate from a service's image or running containers within [Docker Swarm](https://docs.docker.com/engine/swarm/) environments. This enables keeping Docker images as generic as possible without the need for bind-mounting configuration files into containers or using environment variables. Unlike [Docker Secrets](/what-is/what-are-docker-secrets), Docker Configs are not encrypted at rest and are directly mounted into the container's filesystem.
15
15
16
-
####Key Features
16
+
### Key features
17
17
18
-
-**Separation of Configuration from Code**: Docker Configs allow you to store configuration files outside of your Docker images, leading to more generic and reusable images.
19
-
-**Flexibility in Management**: Configs can be added, updated, or removed from services dynamically, without the need to rebuild or restart containers.
20
-
-**Secure Transmission**: Configs are sent to the swarm manager over a mutual TLS connection and are stored securely.
21
-
-**Easy Access within Containers**: Configs are automatically mounted into the container's filesystem, making them easily accessible to applications.
22
-
-**Support for Various Data Types**: Configs can store generic strings or binary content, providing flexibility for different types of configuration data.
18
+
-**Separation of configuration from code**: Docker Configs allow you to store configuration files outside of your Docker images, leading to more generic and reusable images.
19
+
-**Flexibility in management**: Configs can be added, updated, or removed from services dynamically, without the need to rebuild or restart containers.
20
+
-**Secure transmission**: Configs are sent to the swarm manager over a mutual TLS connection and are stored securely.
21
+
-**Easy access within containers**: Configs are automatically mounted into the container's filesystem, making them easily accessible to applications.
22
+
-**Support for various data types**: Configs can store generic strings or binary content, providing flexibility for different types of configuration data.
23
23
24
-
###Creating Configs
24
+
## Creating Docker Configs
25
25
26
26
Docker Configs can be created via the Docker CLI. Before creating configs in Docker, you must first make sure you have [Docker installed](https://docs.docker.com/get-docker/). Once you have installed Docker, enable and start the Docker service.
27
27
@@ -62,7 +62,7 @@ To add a worker to this swarm, run the following command:
62
62
To add a manager to this swarm, run 'docker swarm join-token manager' and follow the instructions.
63
63
```
64
64
65
-
####Create a config via the CLI
65
+
### Create a config via the CLI
66
66
67
67
You can create a config by piping the configuration data into the `docker config create` command.
68
68
@@ -106,7 +106,7 @@ ID NAME IMAGE NODE
106
106
kf8ysfgiipkb myservice.1 nginx:latest ip-172-31-30-90.eu-central-1.compute.internal Running Running 35 seconds ago
107
107
```
108
108
109
-
####Accessing configs inside a container
109
+
### Accessing configs inside a container
110
110
111
111
Now that you have created a service with a config, you can access the value of this config from within the container.
Docker Configs, similar to Docker Secrets, provide a useful way to manage configuration data in Docker environments, particularly in Docker Swarm. However, they also come with their own set of challenges and considerations:
145
145
146
146
-**Limited to Docker Swarm**: Like Docker Secrets, Docker Configs are specifically designed for Docker Swarm. This means they are not natively available for standalone Docker containers or other container orchestrators like Kubernetes. This limitation can be significant for teams not using Docker Swarm.
147
147
148
-
-**Not Suitable for Sensitive Data**: Docker Configs are not encrypted at rest, unlike Docker Secrets. This makes them unsuitable for storing sensitive data such as passwords, tokens, or private keys. They should be used only for non-sensitive configuration data.
148
+
-**Not suitable for sensitive data**: Docker Configs are not encrypted at rest, unlike Docker Secrets. This makes them unsuitable for storing sensitive data such as passwords, tokens, or private keys. They should be used only for non-sensitive configuration data.
149
149
150
-
-**Size Limitation**: There is a size limit for the contents of Docker Configs (typically around 500 KB). This limitation can be a challenge when dealing with large configuration files.
150
+
-**Size limitation**: There is a size limit for the contents of Docker Configs (typically around 500 KB). This limitation can be a challenge when dealing with large configuration files.
151
151
152
-
-**Immutable Once Attached to Running Services**: Once a config is attached to a running service, it cannot be edited. Any changes require creating a new config and updating the service to use this new config, which might cause service disruption.
152
+
-**Immutable once attached to running services**: Once a config is attached to a running service, it cannot be edited. Any changes require creating a new config and updating the service to use this new config, which might cause service disruption.
153
153
154
-
###Best Practices
154
+
## Best practices
155
155
156
156
When using Docker Configs, it's important to follow best practices to ensure efficient and secure management of your configuration data:
157
157
@@ -162,13 +162,13 @@ When using Docker Configs, it's important to follow best practices to ensure eff
162
162
163
163
By following these best practices, you can maximize the benefits of Docker Configs in managing your application's configuration data effectively and securely.
164
164
165
-
###Conclusion
165
+
## Conclusion
166
166
167
167
Docker Configs offer a flexible and secure way to manage non-sensitive configuration data in Docker environments. By storing configuration outside of application code, Docker Configs facilitate a more modular and maintainable architecture.
168
168
169
169
Now that you're equipped with the knowledge of Docker Configs, take your cloud infrastructure management to the next level with Pulumi. Explore these key resources to deepen your understanding and enhance your implementation strategies:
170
170
171
-
-**Advanced Configuration Management**: Discover how to efficiently manage configuration data in your cloud applications. Dive into Pulumi's [Configuration Management docs](/docs/concepts/config/) for in-depth information on creating and managing configuration across stacks and projects.
172
-
-**Container Management Solutions**: Learn about deploying containers with ease using Pulumi. Whether you prefer low-management solutions like AWS Fargate and Microsoft ACI for ease of deployment or require complete control with Kubernetes-based solutions, our [Container Management](/containers/) docs provide comprehensive insights. They cover everything from managing clusters and infrastructure to deploying application containers in various environments.
171
+
-**Advanced configuration management**: Discover how to efficiently manage configuration data in your cloud applications. Dive into Pulumi's [Configuration Management docs](/docs/concepts/config/) for in-depth information on creating and managing configuration across stacks and projects.
172
+
-**Container management solutions**: Learn about deploying containers with ease using Pulumi. Whether you prefer low-management solutions like AWS Fargate and Microsoft ACI for ease of deployment or require complete control with Kubernetes-based solutions, our [Container Management](/containers/) docs provide comprehensive insights. They cover everything from managing clusters and infrastructure to deploying application containers in various environments.
173
173
174
174
Our [community on Slack](https://slack.pulumi.com/) is always open for discussions, questions, and sharing experiences. Join us there and become part of our growing community of cloud professionals!
Copy file name to clipboardExpand all lines: pulumi-hugo/themes/default/content/what-is/what-are-docker-secrets.md
+16-16Lines changed: 16 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,22 +4,22 @@ meta_desc: |
4
4
Learn more about what Docker Secrets are and how to use them.
5
5
6
6
type: what-is
7
-
page_title: "What are Docker Secrets"
7
+
page_title: "What are Docker Secrets?"
8
8
---
9
9
10
-
Docker, a leading platform in containerization technology, has revolutionized how applications are developed, shipped, and deployed. One critical aspect of this process is managing sensitive information, commonly known as "secrets." [Docker Secrets](https://docs.docker.com/engine/swarm/secrets/) is a feature specifically designed for safely transmitting and storing confidential data within Docker environments. This guide explores the ins and outs of Docker Secrets, highlighting its importance, functionality, and best practices.
10
+
Docker, a leading platform in containerization technology, has revolutionized how applications are developed, shipped, and deployed. One critical aspect of this process is managing sensitive information, commonly known as "secrets." [Docker Secrets](https://docs.docker.com/engine/swarm/secrets/) is a feature specifically designed for safely transmitting and storing confidential data within Docker environments.
11
11
12
-
###What are Docker Secrets?
12
+
## What are Docker Secrets?
13
13
14
14
Docker Secrets is a resource for securely managing sensitive data like passwords, tokens, and SSH keys within [Docker Swarm](https://docs.docker.com/engine/swarm/) environments. Unlike [Docker Configs](/what-is/what-are-docker-configs/) which only encrypts data in transit, Docker Secrets are designed to keep data safe both in transit and at rest.
15
15
16
-
####Key Features
16
+
### Key Features
17
17
18
-
-**Secure Storage**: Docker Secrets are encrypted during transit and at rest, offering a robust level of security.
19
-
-**Managed Lifecycle**: Secrets can be created, updated, and removed without restarting containers, ensuring seamless management.
20
-
-**Access Control**: Only services granted explicit access can retrieve these secrets, enhancing security through compartmentalization.
18
+
-**Secure storage**: Docker Secrets are encrypted during transit and at rest, offering a robust level of security.
19
+
-**Managed lifecycle**: Secrets can be created, updated, and removed without restarting containers, ensuring seamless management.
20
+
-**Access control**: Only services granted explicit access can retrieve these secrets, enhancing security through compartmentalization.
21
21
22
-
###Creating Secrets
22
+
## Creating secrets
23
23
24
24
Secrets can be created via the Docker CLI or Docker Compose files. Once created, they are stored in a secure part of the Docker Swarm. Before creating secrets in Docker, you must first make sure you have [Docker installed](https://docs.docker.com/get-docker/). Once you have installed Docker, enable and start the Docker service.
25
25
@@ -60,7 +60,7 @@ To add a worker to this swarm, run the following command:
60
60
To add a manager to this swarm, run 'docker swarm join-token manager' and follow the instructions.
61
61
```
62
62
63
-
####Create a secret via CLI
63
+
### Create a secret via CLI
64
64
65
65
You can create a secret by piping the secret data into the `docker secret create` command.
66
66
@@ -98,7 +98,7 @@ ID NAME IMAGE NODE
98
98
w6i5cct5o9gw myservice.1 nginx:latest ip-172-31-30-90.eu-central-1.compute.internal Running Running 52 seconds ago
99
99
```
100
100
101
-
####Create a secret via Docker Compose
101
+
### Create a secret via Docker Compose
102
102
103
103
Before implementing Docker Secrets with Docker Compose, ensure [Docker Compose is installed](https://docs.docker.com/compose/install/) on your system.
104
104
@@ -124,7 +124,7 @@ Now use Docker Compose to deploy your stack. This will create the secret and att
124
124
docker-compose up -d
125
125
```
126
126
127
-
#### Accessing secrets inside a container
127
+
### Accessing secrets inside a container
128
128
129
129
Now that you have created a service with a secret, you can access the value of this secret from within the container.
While Docker Secrets is a valuable tool for managing sensitive data in Docker Swarm, it has its limitations. One major challenge is its confinement to Docker Swarm environments, meaning it's not applicable for standalone Docker containers or other orchestrators like Kubernetes. Additionally, Docker Secrets lacks a direct mechanism for automatic secrets rotation, a crucial aspect for maintaining security over time.
163
163
164
-
### Best Practices
164
+
## Best practices
165
165
166
166
When using Docker Secrets, it's important to follow best practices to ensure efficient and secure management of your sensitive data:
167
167
@@ -173,13 +173,13 @@ When using Docker Secrets, it's important to follow best practices to ensure eff
173
173
174
174
By following these best practices, you can maximize the benefits of Docker Secrets in managing your application's sensitive data effectively and securely.
175
175
176
-
### Conclusion
176
+
## Conclusion
177
177
178
178
Docker Secrets is a vital feature for anyone using Docker Swarm, offering a secure and straightforward way to handle sensitive data. By understanding and implementing Docker Secrets correctly, teams can significantly enhance the security posture of their containerized applications.
179
179
180
180
Now that you're equipped with the knowledge of Docker Secrets, take your cloud infrastructure management to the next level with Pulumi. Explore these key resources to deepen your understanding and enhance your implementation strategies:
181
181
182
-
- **Advanced Secrets Management**: Discover how to efficiently manage sensitive data and secrets in your cloud applications. Dive into Pulumi's [Secrets Management guide](/blog/managing-secrets-with-pulumi/) for in-depth information on encrypting specific values for added security and ensuring that these values never appear in plain text in your state file.
183
-
- **Container Management Solutions**: Learn about deploying containers with ease using Pulumi. Whether you prefer low-management solutions like AWS Fargate and Microsoft ACI for ease of deployment or require complete control with Kubernetes-based solutions, our [Container Management](/containers/) docs provide comprehensive insights. They cover everything from managing clusters and infrastructure to deploying application containers in various environments.
182
+
- **Advanced secrets management**: Discover how to efficiently manage sensitive data and secrets in your cloud applications. Dive into Pulumi's [Secrets Management guide](/blog/managing-secrets-with-pulumi/) for in-depth information on encrypting specific values for added security and ensuring that these values never appear in plain text in your state file.
183
+
- **Container management solutions**: Learn about deploying containers with ease using Pulumi. Whether you prefer low-management solutions like AWS Fargate and Microsoft ACI for ease of deployment or require complete control with Kubernetes-based solutions, our [Container Management](/containers/) docs provide comprehensive insights. They cover everything from managing clusters and infrastructure to deploying application containers in various environments.
184
184
185
185
Our [community on Slack](https://slack.pulumi.com/) is always open for discussions, questions, and sharing experiences. Join us there and become part of our growing community of cloud professionals!
0 commit comments