1.
What is containerization in simple
terms?
Containerization is a method of
virtualizing an operating system so that
multiple isolated applications can run on a
single host operating system.
2. What is containerization with an
example?
Describe containerization?
Containerization is a method of
virtualization that packages applications
and their dependencies into isolated, self-
contained containers, allowing them to run
securely and independently from each
other on the same host. It provides an
efficient way to deploy, manage, and scale
applications across different platforms.
For example, Docker is a popular form of
containerization that allows software
developers to package their applications
into standardized isolated containers.
Docker makes it easier for applications to
run on any system, regardless of its
underlying infrastructure.
3. What is the greatest benefit of
containerization?
The most significant benefit of
containerization is increased efficiency.
Containers allow applications to run in
isolated, secure environments, improving
resource utilization and allowing for more
flexibility in deployment. Additionally,
containers make deploying, scaling, and
managing applications easier, resulting in
improved operational agility.
4. What are the three basic steps of
containerization?
Package the application and
dependencies into a standard file
format, such as a Docker image.
Deploy the packaged application and
its dependencies into a container.
Execute the containerized application
in the container runtime environment.
Repository vs. registry
The terms repository and registry may
be easily confused when talking about
containers. A container repository is
used to store related images for setup
and deployment. Container
repositories can be used to manage,
pull or push images.
Container registries store multiple
repositories of container images, as
well as storing API paths and access
control rules. Container registries also
have to option of being hosted publicly
or privately.
Q) what is Conatiner registry?
A container registry is a collection of
repositories made to store container
images. A container image is a file
comprised of multiple layers which can
execute applications in a single
instance.
Q) types of registry?
Public vs. private registries
1 )Public container registries
are generally the faster and easier
route when initiating a container
registry.
2)Public registries are also seen to be
easier to use.
3)they may also be less secure than
private registries.
4) They are for smaller teams and
wroks for standard and open
sourced images from public registries.
1) A private container
registry is set up by the
organization using it.
2) Private registries are either
hosted or on premises and popular
with larger organization or
enterprises that are more set on
using a container registry.
3) Having complete control over
the registry in development allows
an organization more freedom in
how they choose to manage it.
4) private registries are seen to be
the more secure .
Container security
Public containers are seen as less
secure because individual container
images may contain malicious or
outdated code which, if goes
unpatched, could lead to a data
breach. It may also be unknown
who has read or write access to an
image.
If an organization's priority is security
when it comes to container registries,
then they should implement a private
registry. Other security approaches to
container registries include:
Assigning role-based access
control (RBAC).
Scanning for vulnerabilities in
images.
Digitally signing images to ensure
each image is trusted.
Using authentication methods
such as access tokens or JSON
key files, similar to how Google's
container registry works.
Using Identity and Access
Manager (IAM) settings, like how
IBM's Cloud Container Registry
does.
Elastic Resources
(recall the example of amazon website
when it experience traffic during its Diwali
sales and hence uses elastic reources for
smooth functioning of its app)
1) Elastic resources are applications
and infrastructure that can be
summoned on demand when traffic or
workloads get high.
2)Cloud computing businesses such as
AWS and Google Cloud rely on elastic
resources as a business model to bill
customers on-demand like a utility bill.
3) This supply side and demand side
economic cycle are the underpinnings of
the cloud ecosystem.
A good example of an elastic resource is
an EC2 server. If a business only requires 2
servers to run their website, but see a
holiday traffic spike, they can simply
allocate additional elastic resources by
increasing the EC2 servers from 2 to 4 to
handle the holiday traffic load. Once that
traffic dies down, they can deprovision the
servers back to 2. This is an elastic
resource.”