We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Unboxing and building container images

Formale Metadaten

Titel
Unboxing and building container images
Untertitel
What is an image technically and how to assemble them manually
Serientitel
Anzahl der Teile
94
Autor
Lizenz
CC-Namensnennung 4.0 International:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen.
Identifikatoren
Herausgeber
Erscheinungsjahr
Sprache

Inhaltliche Metadaten

Fachgebiet
Genre
Abstract
Everyone wants to use containers today yet most don't really know how they function and what is in the box. Also building containers in unprivileged contexts can be challenging. In this talk we will look into a docker image and discuss how to create those packages using tools like kaniko For most people that want to create a docker image the journey ends with docker build. What this will trigger is building a docker image using the running docker engine on your host. The problems start at a point where you don't have access to the docker daemon, want to build a container in a container (as most CI systems execute in containers nowadays) or just have limited permissions on the system. For this we will open the mystical box of a docker image by looking into: - Layers - Empty Layers - Configuration Details Then we will look into the kaniko project that tries to build those images without ever touching a docker daemon to better understand how those images can be created and how to work in more restricted environments. Those information can also be very helpful when looking into container security and scanning what is in the box.