




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、采用Harbor开源企业级Registry实现高效安全 的镜像运维Agenda1Container Image Basics2Project Harbor Introduction3Consistency of Images4Security5Image Distribution6High Availability of RegistryLifecycle of Containers and Images5ImagesContainersStop Start RestartRunCommitDockerfileBuildtagtar archiveSaveLoadPushRegistryIma
2、gesPull6PushPullRepository for storing imagesIntermediary for shipping and distributing imagesIdeal for access control and other image managementRegistryImagesRegistry - Key Component to Manage ImagesAgenda1Container Image Basics2Project Harbor Introduction3Consistency of Images4Security5Image Distr
3、ibution6High Availability of RegistryProject HarborAn open source enterprise-class registry server.Initiated by VMware China, adopted by users worldwide.Integrated into vSphere Integrated Containers.Apache 2 license./vmware/harbor/8Key FeaturesUser management & access controlRBAC: admin, developer,
4、guestAD/LDAP integrationPolicy based image replicationVulnerability ScanningNotaryWeb UIAudit and logsRestful API for integrationLightweight and easy deployment9Users and Developers200+Users2600+20K+DownloadsDevelopersStarsUsers55Contributors700+Forks6Partners10Harbor ArchitectureDocker clientNginxH
5、arborBrowserUI APIAuthDBAD / LDAPCore ServiceLog CollectorReplication Job ServicesNotary clientRemote Harbor InstanceNotaryRegistry V2Vulnerability ScanningAdmin ServiceHarbor users and partners (selected)12Image replication (synchronization)13ProjectImagesPolicyImageProjectImagesInitial replication
6、Imageincremental replication (including image deletion)Agenda1Container Image Basics2Project Harbor Introduction3Consistency of Images4Security5Image Distribution6High Availability of RegistryConsistency of Container ImagesContainer images are used throughout the life cycle of software developmentDe
7、vTestStagingProductionConsistency must be maintainedVersion controlIssue trackingTroubleshootingAuditing15Same Dockerfile Always Builds Same Image?16Example:FROM ubuntuRUN apt-get install y python ADD app.jar /myapp/app.jarBase image ubuntu:latest could be changed between buildsubuntu:14.04 could al
8、so be changed due to patchingapt-get (curl, wget.) cannot guarantee always to install the same packagesADD depends on the build time environment to add filesShipping Images in Binary Format for Consistency17D.v R.gistryCIGitT.st R.gistryimag.s imag.simag.sStaging R.gistryimag.simag.sProduction R.gis
9、tryimag.sImag.s ar. synchroniz.d b.tw.n .nvironm.nts by using Harbor r.gistry.Agenda1Container Image Basics2Project Harbor Introduction3Consistency of Images4Security5Image Distribution6High Availability of RegistryAccess Control to ImagesOrganizations often keep images within their own organization
10、sIntellectual property stays in organizationEfficiency: LAN vs WANPeople with different roles should have different accessDeveloper Read/WriteTester Read OnlyDifferent rules should be enforced in different environmentsDev/test env many people can accessProduction a limited number of people can acces
11、sCan be integrated with internal user management systemLDAP/Active Directory19Example: Role Based Access Control in Harbor20ProjectMembersImagesGuest:Developer:Admin:$Project/ubuntu:14.04$Project/nginx:1.8, 1.9$Project/golang:1.6.2$Project/redis:3.0.docker pull .docker pull/push .Other security cons
12、iderationsEnable content trust by installing Notary serviceImage is signed by publishers private key during pushingImage is pulled using digestPerform vulnerability scanningPrevent images with vulnerabilities from being pulledRegular scanning based on updated vulnerability database21Content trust fo
13、r image provenanceRegistryNotaryImage CreatorImage ConsumerVulnerability ScanningStatic analysis of vulnerability by inspecting filesystem of container image and indexing features in database.Rescanning is needed only and only if new detectors are added.Update vulnerability data regularlyDebian Secu
14、rity Bug TrackerUbuntu CVE TrackerRed Hat Security DataOracle Linux Security DataAlpine SecDB24Vulnerability scanningSet vulnerability thresholdPrevent images from being pulled if they exceed thresholdPeriodic scanning based on updated vulnerability databaseRegistry Image Vulnerability ScanningAgend
15、a1Container Image Basics2Project Harbor Introduction3Consistency of Images4Security5Image Distribution6High Availability of RegistryImage DistributionContainer images are usually distributed from a registry.Registry becomes the bottleneck for a large cluster of nodesI/ONetworkScaling out an registry
16、 serverMultiple instances of registry sharing same storageMultiple instances of independent registry sharing no storage26Image Distribution via Master-Slave Replication27Mast.r - Slav. mod.lDocker ClientpushDocker hostDocker hostpullDocker hostDocker hostDocker hostDocker hostLoad balancingWorks w.l
17、l with g.ographically distribut.d cli.ntsHierarchical Image Distribution28Hi.rarchicalDocker ClientpushAgenda1Container Image Basics2Project Harbor Introduction3Consistency of Images4Security5Image Distribution6High Availability of RegistryHigh Availability of RegistryTo remove single point of failu
18、re on registryThree models to achieve HAShared storageReplication ( no shared storage )Using other HA platform30Shar.d Storag.L R.qu.stR.gistry instanc.sRegistries using Shared StorageImage replication between registries32L R.qu.stVMware ESXi-1Docker Volume Driver for vSphereVMware ESXi-2Docker Volume Driver for vSphereVMware ESXi-3Docker Volume Driver for vSphereShared StorageVirtual SANDocker Volume -1Docker Host VMHarborvSphere Docker Volume PluginDocker Volume -2Docker Volume-3Other Docker Volume sRegistry HA on vSphereRegistry in a VM protected by vSph
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 防盗门调研报告
- 2025年冷轧板材市场调查报告
- 2025-2030年中国细木工板拼板项目投资可行性研究分析报告
- 2025年抗敏口服液项目投资可行性研究分析报告
- 中国商业开关行业市场前景预测及投资价值评估分析报告
- 2025-2031年中国鞋用胶粘剂行业深度调研与市场前景预测报告
- 2025年中国磨砂灌浆行业市场前景预测及投资价值评估分析报告
- 2025年邳州中能新城区医院有限公司介绍企业发展分析报告模板
- 2025年中国超低温冰箱市场发展规划及投资战略可行性预测报告
- 2025年单板层积工程板材项目投资可行性研究分析报告
- 2025届江苏省南京市六区初三第二学期期中考试英语试题试卷含答案
- 加装电梯投标方案(技术方案)
- 影视后期调色-04达芬奇一级校色
- 2024版工程建设监理合同(电力工程)
- 高空广告字维修合同
- 《绿豆芽的生长》课件
- 石油化工设备维护检修规程设备完好标准SHS
- 知道智慧网课《科技伦理》章节测试答案
- 2024年云南省职业院校技能大赛(中职组)植物嫁接赛项考试题库(含答案)
- 工程居间合同范本电子版
- 写字楼客户服务与物业管理关系案例
评论
0/150
提交评论