In this chapter, we learned about the various tools, APIs, and practices that help us deploy our application in a Docker-based environment. Initially, we looked at the Remote API and realized that all Docker commands are nothing but a result of REST-based calls to the
Then we saw how to inject processes to help debug running containers.
We then looked at various methods to achieve service discovery, both using native Docker features such as links, and with the help of specialized
config stores such as the
Finally, we discussed various aspects of security when using Docker, the various kernel features it relies on, their reliability, and their implications on the security of the host the containers run on.
In the ...