|
6 | 6 |
|
7 | 7 | ## Workshop Outline
|
8 | 8 |
|
9 |
| -Pre-requirements |
10 |
| -VM environment |
11 |
| -Our sample application |
12 |
| -Running the application |
13 |
| -Container port mapping |
14 |
| -Identifying bottlenecks |
15 |
| -Scaling HTTP on a single node |
16 |
| -Put a load balancer on it |
17 |
| -Connecting to containers on other hosts |
18 |
| -Abstracting remote services with ambassadors |
19 |
| -Various considerations about ambassadors |
20 |
| -Docker for ops |
21 |
| -Backups |
22 |
| -Starting more containers from your container |
23 |
| -Docker events stream |
24 |
| -Attaching labels |
25 |
| -Logs |
26 |
| -Storing container logs in an ELK stack |
27 |
| -Security upgrades |
28 |
| -Network traffic analysis |
29 |
| -Dynamic orchestration |
30 |
| -Hands-on Swarm |
31 |
| -Deploying Swarm |
32 |
| -Cluster discovery |
33 |
| -Resource allocation |
34 |
| -Connecting containers with ambassadors |
35 |
| -Setting up Consul and overlay networks |
36 |
| -Multi-host networking |
37 |
| -Building images with Swarm |
38 |
| -Deploying a local registry |
39 |
| -Scaling workers |
40 |
| -Distributing Machine credentials |
41 |
| -Highly available Swarm managers |
42 |
| -Highly available containers |
43 |
| -Conclusions |
| 9 | +- Pre-requirements |
| 10 | +- VM environment |
| 11 | +- Our sample application |
| 12 | +- Running the application |
| 13 | +- Container port mapping |
| 14 | +- Identifying bottlenecks |
| 15 | +- Scaling HTTP on a single node |
| 16 | +- Put a load balancer on it |
| 17 | +- Connecting to containers on other hosts |
| 18 | +- Abstracting remote services with ambassadors |
| 19 | +- Various considerations about ambassadors |
| 20 | +- Docker for ops |
| 21 | +- Backups |
| 22 | +- Starting more containers from your container |
| 23 | +- Docker events stream |
| 24 | +- Attaching labels |
| 25 | +- Logs |
| 26 | +- Storing container logs in an ELK stack |
| 27 | +- Security upgrades |
| 28 | +- Network traffic analysis |
| 29 | +- Dynamic orchestration |
| 30 | +- Hands-on Swarm |
| 31 | +- Deploying Swarm |
| 32 | +- Cluster discovery |
| 33 | +- Resource allocation |
| 34 | +- Connecting containers with ambassadors |
| 35 | +- Setting up Consul and overlay networks |
| 36 | +- Multi-host networking |
| 37 | +- Building images with Swarm |
| 38 | +- Deploying a local registry |
| 39 | +- Scaling workers |
| 40 | +- Distributing Machine credentials |
| 41 | +- Highly available Swarm managers |
| 42 | +- Highly available containers |
| 43 | +- Conclusions |
0 commit comments