Merken

Deep Dive into Docker Containers for Rails Developers

Zitierlink des Filmsegments
Embed Code

Automatisierte Medienanalyse

Beta
Erkannte Entitäten
Sprachtranskript
the 1st 5 5 5 5 5 found a few find it earlier about to begin with so it's good to see that the room is not you know the book so know it's getting the idea you know the welcome to the Engine Alliance sponsored talk died into . containers of Orioles developers so that that's a mouthful so let's take a look at the uh the title of the
diagram on this is me and my wife scuba diving in the Philippines but the Advanced Open Water certified and and it's the full of under water and when you go deeper it's actually even more people so going to talk about
docker containers from among you have used by doctors before it's as good it's more than half but it will not this is a container but not Dr. it I want to it so this is not an introduction to top but we we we will look into adopted and sigh container internals faithfully what what are of containers made out so and then have to be
specific this is for that to make sure it is developers of because when they announced the and that announcement Scotland in Phoenix so I was just thinking 0 no
lot of Phoenix jokes right so you've probably heard a lot of jokes already rated so that is 17 it's 1 of the organizers In the bit string that some people have a lot to other languages framework that's fine you know of that you really here enough to say that in the you Israel's and a lot of people still
do but this is sponsored by the engineering of where where report on and we're celebrating our 10 years of these years so please join us tonight that the real party tonight at 7 PM so please join us and also the blue tomorrow on and and on Thursday so engine so greatly surround Uriel sification so we can easily scale from 1 to hundreds of servers that at the at 10 years of Ruby on Rails optimizations and upgrade of yes and in we got top-notch and presented support so that
let's let's get into a lot to talk about these or other topics that we're going to talk about the reasons for using containers of water continuous made off and Honduran containers of in production the so there are a lot of
it uses for containers but here we're going to focus specifically about on deploying your real sat inventing are a member when I started from the bank 2006 or a few years after 1 of the most popular the point until back then was catastrophic ever probably still is in some image a sheet of work on we still use that the the condition in of the of doing things that engineer all we have deployed a lot of real supplications using abstract you know customers the obligations and rights and even still works until now but here are going to try to use of discuss why why you should in what your real set in in a container so it that's value SSH into a server of you introducing get going to do it clone it people in solid jackass become assets and the neuron regulations and its final work so you now the gaps using that approach and it works so but sometimes when
given it goes down then no 1 would be able to deploy right but this is not enough on you know how we use them it's a great service to but when they go down a lot of people notice right because a lot of people use that our so we get a lot of work to get subtly when you know again of those that nothing strong would engineered platform but when you those that a lot of our customers can deploy on there's only a small a small reason the White should uh why should use a container of others but let's take a look at what's involved in using the internet here you would see that is still
need to install Ruby and install the packages copier code but solid John speak about that it's it's very similar to abstract greatly so you not set a silver bullet of that would of that would remove all the steps rate is still doing it but now you're putting it in a container and and
once you have that continue on your server needs only to know how to render dinner ready doesn't even know but since I just run that into on and you could write with other containers it could be another real sad if you have another 1 you could run it on the same server or it could even be something like red or or a database although you know are DVDs here and he you wouldn't like that you shouldn't review database potential but it is possible a at whatever you put inside it out and you're supposed knows how to run it then it should work on that it would also have multiple servers are there's no real world analogy that is but a duplicate of obtaining a easily you could run it on multiple servers so now when you try to scale up and you know that Wilson scale array of leaders right a lot of different servers and then on the servers you run your containers on 2 containers that acid and and you'll be able to easily run year of run any going back at the bottom container which makes the whole process faster than you're developers will be able to this whole class and staging or in production and you know you get a focus on on your business problems but what containers
but descriptions that at the beginning when people discussed containers 1
at 1st is likely to be announced and a lot of people don't like this description and because it's technically technically of a a container is categorical machine when you have a virtual machine are you you know you could have a host for example that's using this running Linux and you could have a machine and that is a Windows box right you could have a guess that that that is so different from your post of other maybe containers when you have a Linux owes you can only have tears up there are those containers of but we're not going to discuss the that's outside the scope of the talk arts over specifically looking at Linux Containers but I like this description that it's so like with be and because of what I described earlier that in a container you could put everything on it in fact you need to put roomy you need to put you know what factors make if you have a bicycle plant libraries you need to put those inside your container so when he incident the description so likely next is a C on series so future that if you have a directory for example I could make that your your new route of you would still be using the same linux-kernel so that means so you it's technically 1 OS but if you have different subdirectories interchange into that but you you could do a lot of interesting things like that's but take a look at
this time so here I'm going to have a going on server answerability directory and will just cause that and you could see that the directories on on that over 17 no foragers In our similar to what you can see in your are in your Linux box right but here are just some directories and you could right see true from currency
true so let's just to against and so you have in the winter directory you could see see trip into that and now you inside a different different OS rate you you think your inside 1704 so I'll check slash real the doesn't exist in the exists under those but not on on and the new route so here I also have a sample of 7 subdirectory and reconciliation through into that and now you would see that it's in its own if you could see the version of the OS but since it's the send us rather and I'll have young inside it so I haven't Winston box but have young running so it it all share the the same linux-kernel but you could see that you could run whatever bistro you want so here at the end just that have another of directory DBN and you could see that the rich so now I have 1 way to think it's a 16 0 4 LTS version but it showed you the other but this shows that I could run by using the truth and the truth is on the 1 of the things that that up until the users you have a file system on system isolation rewritten region inside if you can't see anything outside of it however it's not built for isolation so you could see he could not see different files outside but you know you could see other processes as I will show you later on but this was not is a very old technology like uh released in 1982 and it was used mainly for testing or for building software our you don't want to use an independent so it's like having your Pristina less inside your existing OS so the 3rd description is namespaces and groups
and this is the 3rd of the need of the topic and what containers really are instances incentives these are a of features so if you heard about users incentives this is your when your process running inside a space they think they're on their own system they don't think that there is another system but you don't see the hosted the see their own us a sense of the container you can look at it as a different group and in space and Seeger right so there are tools of ratings spaces public will look 1st at a higher level of level tools of the trade name spaces and these are the things that people are familiar with
I goal in the container in times of Ehrlich see for example on you know it it happened popular so here it has existed before and after it adopted the beginning was using exceed to grade of container so in the it was just a rapid of Persia it provides a lot of different from advantages but at the beginning and it was using out artsy males rocket system the and sponsor but the end you just creating namespaces and see groups so none of this of tools adding new features to to the currently they are using out in spaces and synapse so when you can
continue there's an allusion to the user that you are on different or less as I showed you earlier you can you think the process brings is in in its own or less so that that is it worker or would be a were recorded containers right so here will see this
each it again I am using a button to 1704 the and you would see that inside it so I could see all the different processes of the writing and it's clear the screen very quickly but I could grab for top I could see that crosses inside of and I could kill it right so if someone in the host was running up and and inside the the new rule killed it then while I'm sorry to that person running time so what namespace thus right on namespaces what they do is provided that isolation so 1st let's look at the p namespace on
so I'm going to introduce a tool called and share of programmable and shared that would create meaning space so I'm going to combine that
with the would true so going to say and share and make making new funding space from all 4 of 4 at the namespace situated wouldn't 1704 amusing scene being going to map out the brought file system and after a few years you would see that I only see the batch process and the the PS process so now I decided both thinks it's pity a number 1 of but in fact it's it's not a of you know process number 1 in the whole system it's something else so it's just map to something else that inside that namespace which we created using an chair it brings it is of the number 1 so now you created in in space that can go on can't heal the processes that are any nodes and once this important of and people run containers there of that repeatedly someone else you don't want that container to be able to go to those just kill and a process right so
next is the mountain in space so when you create a mapping space I you you inherit all the mug points off the server of the host but then when you make changes to it but do host 1 be affected so why is that important so when you create a new container for a new namespace Dr. for example changes the mount points for proxies and so the containers 1 have access to to hosts up to the hosts for example here the container won't have access to the nest was that important well if you have access to the disk then you could corrupted and everyone running that container or every every container running and articles without a problem so you don't want the continues to be able to access certain mount points and that's where the mappings is without another space that will look at his in space and this is actually a relatively new and even back up only added this year maybe of a few years ago so but this is like the mapping of brain with your running inside a container our you that what where ending as a user on the container you you're actually a different user 0 so it's like kidnapping solar containers from us from the inside of you you run as a reducer insight into here and that could be a problem because when you're writing this route without user namespace there also running this route under pose P and you know why that's not good right because if you have privileges under house then you could have a lot of different things so when you enable user namespace you'll have to remove the incident Tainan but you won't be rude the outside so you're not you won't be rude under pose X is network space of an incident energy will use their own network interfaces so it won't have any connection but what he what of dose for example is free of the bears of and use of bridge on the host so now you have 1 on the container 1 pair and a host and so it will be able to offer you the will to have your network connection and we will show later on how how that works and their 17
spaces right now and so we started with mount and the latest is this European space and this is actually are more than 10 years in the making face amount was added at the root of kernel 2 . 4 and and user for example was added the body and Siegel recently was added in the 4 . 6 4 so it wasn't you know there was that there was 80 but it just 1 time worrying but they were losing containers they release things spaces and the release of incrementally of so let's take a look at how you're going to use everything how you're going to combine everything to greater all containers and run reals inside it
so we're we're going back to the 2 are the same example on you know and share but now rely on but just showing here that you have article real sat on you know on user source at answering going to create namespaces using and chair but now we're going to best now UTS IPC Net key and runs each group so that it's what would be running of this whole talk about and you're going to mount a product in the next and going to add a lot of environment variables but research is needed by way my real out with the of the 2 means your answers you based on there current just it's easier to see and now I'm going to run bundle expect on real server to run my at so I'm now inside a container and running in real sense break so that a tries curled and see if I could access that and you will see that it would fail because they haven't set up the Network the fears that imagine you see here there's only 1 back in the so now I have to create those the fierce rates so among the 2nd tab on the host and the integration of the bears using the IP command on agencies each 4 dollars each IT unions C 4 and other pair so that there's I as I put the seed 1 and put it on the process ID so that's the container apart then it was the H 5 1 or 0 on the doctor bridge that is running Windows now you would see that there are 2 network interfaces phrase now I'm going to bring out those interfaces so Ring Ring of the loopback interface going to bring up the other that 1 here 1 end of the pair name the name is given as 0 inside container here I'm just going to add an IP address of course you want to be able to connect to your container on using an IP from the rich that I just chose randomly and I'm going to add or out on 2 the will to have connection of writing to the rich and after that I would be able to do all the kernel of there is an insight into container but note and using 1 of the local host so 1 2 7 0 0 1 inside but outside of it you in the host you need to use the of the IP address that the values 1st so here you would see that approval process is running out that's evolved now we of I 1 and you would see that it's been 9 inside container but it's a different breed out on the host so this is the big namespace out at work so next asylum-seekers see
absurd is the limited resources that you could you could have I could set a limit of memory limit the CPU limit or even access to devices on good also set a limit to the number of processors you can for it because you don't want to x hostile although you know all the the is the number of process you could run on and you know these where she groups were added under 2 . 6 kernel so let's take a look at how you're going to set a memory limit of to that so
the that at the beginning it's just the same I move in only we just create spaces of so we're we're doing the same thing at the beginning on creating an amount he as 0 means this is and then I'm going to mount a product do and then the environment where officials that meals needed the but before running out accordingly departing pool but we going to use either of student to set up a memory limit so here using a and the of no groups that so here using this FSC Group memory which is of this your file system has already mountain on on my boxer I think it was then basis and the so unlike namespaces reuse and share as the as the program deplete namespaces would seem groups yet polluters interface with wind of file system than we did see the PAL system so I create a directory of all create the reals directory on and you would see that if you you know I just created a directory but after creating it creates all these files for me are and those are the limits that I could use I you see memory limit of their and other other things so but we need to do now is get the process ID all of my continue so I'll get the process ID of batch and so is 1 0 4 5 maybe there and I'm going to put it inside the reals are slash tasks and tasks on bones on Cedar absurd of processes right so and saying process 1 0 4 5 8 should be under the real secret right so there's nothing special this I created the real secret right and I'm going to say 40 megabyte as will go to rails memory that you made in bytes thank so who wants suggested that's enough for a real supplication this very basic real supplications up so now I'm back to my container and I'm going to run for months of going to run bundle extend diarrheal server and assess its killed right so it out and we did with a limit of most 40 megabytes that our the goal of start so now I'm going to increase that to 80 megabytes and but see in words so this is but you realize that so I think this would do but as we work right so now you can create a of you could run that process and you see here that promise running out so that's that's how you see groups with our we materials that what so
next description and the last 1 and this is the most the the most accurate description is containers or processes so you you might have heard as they not the NCR processes and this is that in the correct description on and if you take away and nothing else from this is you know you could like run a lot of processes you know but containers make it easier on to to run those processes together on the same host so
let's take a look at this of next the video and you can see that I have a lot of of formal processes right so and then now I'm just showing you that the pig and that's easy to read but the PD namespaces so you could check that means this is on on the proper and they're all different so I'm just showing you that this processes are all in different namespaces right but the irony in spaces and what's interesting is I have a lot of little processes running head on and even Ruby installed on the host right so terrible was listening to to have anything in fact of there is no OS of core OS for a thing be renamed it to continue Linux but even that doesn't even have a pack of package managers because they want you to run everything in containers so here arbitrary but they run all the public you 1 up if again and using the same version so this is a container but you could run whatever reversion 1 whatever the app server you want you good you mix and match and promoting coordinated it's Italy it all containers make it all easier to to do all of that so you know I containers are processes but the containers being a Europe and having space and see the other not actually enough all that whenever you create containers you have to make
sure you know how to secure them so let's talk about a container security so those are the the way security works with containers is you apply layers of them there's just no 1 setting but that would make all the continuous security you have to run a number of different things to to make sure they are secure of for example of that at armor of
this cell in executing module or if you're opposed and supported as he Linux and limit the actions that a given program can take so it it provides a lot of limitations on on under container but actually if you start using the user spaces of a user namespace some obvious I some of these restrictions from up our not needed anymore but you know you still keep them so you you just have another layer of of of of security could so the next capability is In the beginning there's only of God did not that you're a regular user t you don't have an axis or you don't have deleted privileges to do a lot of things and interest capabilities so that a regular user would be able to do something if it has privileges of some privileges some capabilities but not it would not a pool of pledged the user so containers 1 some capabilities but you know you don't want to give them all the capabilities of so that's why also shouldn't run Covenas root of and while when limiting capabilities for some containers then you eliminate what what those containers can do so however how do you know which capabilities to restrict containers and of speech capabilities matter stake in fact the when you search you have for example and not the the universal and there's a lot of discussion and what capabilities to to of to allow work to deny so this there's no 1 answer later when you go to and when you use exceed the behaviors and set of capabilities and when you that the body view another set so it's you know it's different up and the other is stack up are so this is the Linux kernel feature filters to some calls and darker for example stables 44 calls out of 300 was of lake 1 example of a system call it blocks is opened by handle at because when you use that you can escape the container so that the you know the the solution is just to stable to single but again which settings the you know should you blocked version is stable so those 4 divorces and calls how did they arrive at the that those list it know it comes from years of of running in the back project and to know which you which system calls that lot later at beginning if there is a vulnerability of innocence some calls will have to be stable the tha
so on the last glorious son the running containers in production so I showed
you no namespaces and cigarettes so help but convince to get spaces units are containers of to run to run realize that but you don't go you know from this document creating namespaces and seat of central in the running and sharing because was the likely that would be not secured have and will have a lot of a lot of blogs for example I've shown you see true but that's not even actually what bothers using the using keyword group which is more secure than teacher because it's the truth wasn't meant for or isolation right so you don't right your own it's like I think it's like cryptography known right here and you let the prose style of so users of itinerant science other I've shown you doctor and rapid and that the actually good going to start running containers in production is suppressed that because they would create the the namespaces seeded Sandy would have default security for you but then we also have other problems rate so what if the Doppler demonized and you know I had to restart docket of times and you know all the containers on the forward even without the the site would be down you know that and so you use something on top of in a way uh and orchestration is them and here you would have communities masses that's what I need which is only like communities when you run your containers this system which is the host with resources rate so if you have 10 servers and it's a a I want to run these rules set than on this container materials happened then communities would choose you running on this also because it has a memory then when host when a server you remove its origin becomes inaccessible of grantees would then all the containers the running out as host and going to move them to to another post so we just about the the we just 17 around time you have to manage that self right so he that's why even bother or because the nodes and is running its own 1 servers that that there are many is also provides you don't and the voice of the gap containers than you if you want to be able to creative antennas and we renew versions but all of this is still need an image right which I in learning talk or included the technical
details you still had to create that image right Italian solar the solar packages copy you're going installed as Johnston you have to do that and some people they just don't want to that of course you could automate this rate a lot of you are using a report and have the using backward areas without the so you know you could use that reveal the and there's a lot of Ottoman automation that you could use you could tie them up with your a the near CI for example and you could have an image but what if you don't want to you to think about all this right that's click when a developer you you don't want to to think about continues groups namespaces and many good actually
of use a platform that there are a lot of open source projects for those days ship just you don't need an image you just push right you write a command like that get pushed over the class on release yes Bush and your app will be centered about and would run containers for you but in that case the the continuous just the implementation details right thing you don't get a running containers it has a scary Watson is guaranteed by push may have would in unseating inverted scale automatically and yeah that a signal so you now know about in spaces of the groups that you don't even have to to use them and in fact of engineering analysis some sort of plug and it a platform that that does that or will have a back from this that and there would be a an announcement joviality note on Thursday that really really cute more about it so we were on on that level actually we had a workshop to bring any so we can actually also work the workstation level but in most would just like to push that and just be done with it so the there in closing and the boy Uriel
sat in a container of looking to the technologies of its and it's mature enough a lot of people who were using containers so it's it also has a long way to go only databases I don't think you should not run your your databases yet I in containers is possible but it's still you early and and that's it thank you but if the so the
slope of
Softwareentwickler
Computeranimation
Diagramm
Offene Menge
Wasserdampftafel
Güte der Anpassung
Computeranimation
Softwareentwickler
Bit
Selbst organisierendes System
Formale Sprache
Framework <Informatik>
Computeranimation
Zeichenkette
Ruby on Rails
Reelle Zahl
Rohdaten
Wasserdampftafel
Minimierung
Server
Biprodukt
Computeranimation
Stereometrie
Dienst <Informatik>
Rechter Winkel
Reelle Zahl
Programmiergerät
Server
Systemplattform
Bildgebendes Verfahren
Regulator <Mathematik>
Computeranimation
Internetworking
Stereometrie
Zentrische Streckung
Vektorpotenzial
Subtraktion
Prozess <Physik>
Datenhaltung
Klasse <Mathematik>
Bitrate
Biprodukt
Code
Computeranimation
Suite <Programmpaket>
Reelle Zahl
Rechenschieber
Würfel
Server
Volumenvisualisierung
Softwareentwickler
Schwebung
Analogieschluss
Virtuelle Maschine
Deskriptive Statistik
Quader
Rechter Winkel
Bildschirmfenster
Programmbibliothek
Reihe
Routing
Inzidenzalgebra
Verzeichnisdienst
Teilbarkeit
Computeranimation
Namensraum
Subtraktion
Prozess <Physik>
Quader
sinc-Funktion
Gruppenkeim
Versionsverwaltung
Routing
Physikalisches System
Bitrate
Computeranimation
Deskriptive Statistik
Rechter Winkel
Software
Stichprobenumfang
Server
Dateiverwaltung
Verzeichnisdienst
Physikalisches System
Subtraktion
Namensraum
Prozess <Physik>
Gruppenkeim
Physikalisches System
Bitrate
Raum-Zeit
Computeranimation
Gradient
Übergang
Instantiierung
Namensraum
Prozess <Physik>
Schreiben <Datenverarbeitung>
Schlussregel
Computeranimation
Touchscreen
Demoszene <Programmierung>
Arithmetisches Mittel
Knotenmenge
Namensraum
Programmiergerät
Prozess <Physik>
Dateiverwaltung
Zahlenbereich
Physikalisches System
Stapelverarbeitung
Raum-Zeit
Computeranimation
Einfach zusammenhängender Raum
Proxy Server
Subtraktion
Namensraum
Punkt
Datennetz
Mathematisierung
Schreiben <Datenverarbeitung>
Bridge <Kommunikationstechnik>
Routing
Inzidenzalgebra
Ordnungsreduktion
Raum-Zeit
Computeranimation
Kernel <Informatik>
Mapping <Computergraphik>
Energiedichte
Verzeichnisdienst
Reelle Zahl
Datennetz
Mini-Disc
Server
Wurzel <Mathematik>
Gewicht <Mathematik>
Prozess <Physik>
Gruppenkeim
Zahlenbereich
Bridge <Kommunikationstechnik>
Zentraleinheit
Netzadresse
Computeranimation
Kernel <Informatik>
Erwartungswert
Variable
Unterring
Reelle Zahl
Bildschirmfenster
Inverser Limes
Kontrollstruktur
Coprozessor
Schnittstelle
Einfach zusammenhängender Raum
Namensraum
Datennetz
Interprozesskommunikation
Güte der Anpassung
Quellcode
Bitrate
Biprodukt
Integral
Festspeicher
Server
Programmierumgebung
Schlüsselverwaltung
Faserbündel
Namensraum
Prozess <Physik>
Materialisation <Physik>
Gruppenkeim
t-Test
Physikalisches System
Elektronische Publikation
Raum-Zeit
Computeranimation
Task
Arithmetisches Mittel
Deskriptive Statistik
Reelle Zahl
Rechter Winkel
Festspeicher
Basisvektor
Server
Dateiverwaltung
Inverser Limes
Wort <Informatik>
Optimierung
Stapelverarbeitung
Maßerweiterung
Verzeichnisdienst
Programmierumgebung
Faserbündel
App <Programm>
Namensraum
Subtraktion
Prozess <Physik>
Computersicherheit
Formale Grammatik
Versionsverwaltung
Zahlenbereich
Raum-Zeit
Computeranimation
Videokonferenz
Unendlichkeit
Datenmanagement
Menge
Reverse Engineering
Server
Filter <Stochastik>
Namensraum
Sichtenkonzept
App <Programm>
Computersicherheit
Gruppenoperation
Versionsverwaltung
Zellularer Automat
Systemaufruf
Kartesische Koordinaten
Mailing-Liste
Sprachsynthese
Physikalisches System
Biprodukt
Raum-Zeit
Computeranimation
Kernel <Informatik>
Menge
Regulärer Graph
Softwareschwachstelle
Inverser Limes
Projektive Ebene
Wurzel <Mathematik>
Optimierung
Zentralisator
Web Site
Web log
Gemeinsamer Speicher
Gruppenkeim
Versionsverwaltung
Fastring
Doppler-Effekt
Raum-Zeit
Computeranimation
Knotenmenge
Einheit <Mathematik>
Kryptologie
Rechenschieber
Softwareentwickler
Default
Bildgebendes Verfahren
Namensraum
Materialisation <Physik>
Rechenzeit
Namensraum
Computersicherheit
Ruhmasse
Schlussregel
Physikalisches System
Biprodukt
Bitrate
Flächeninhalt
Rechter Winkel
Festspeicher
Server
Schwebung
Verkehrsinformation
App <Programm>
Zentrische Streckung
Rechenzeit
Namensraum
Datenhaltung
Open Source
Klasse <Mathematik>
Gruppenkeim
Systemplattform
Abgeschlossene Menge
Implementierung
Systemplattform
Raum-Zeit
Quick-Sort
Computeranimation
Übergang
Rechter Winkel
Arbeitsplatzcomputer
Projektive Ebene
Bildgebendes Verfahren
Analysis
COM

Metadaten

Formale Metadaten

Titel Deep Dive into Docker Containers for Rails Developers
Serientitel RailsConf 2017
Teil 80
Anzahl der Teile 86
Autor Rigor, Christopher
Lizenz CC-Namensnennung - Weitergabe unter gleichen Bedingungen 3.0 Unported:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen und nicht-kommerziellen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen und das Werk bzw. diesen Inhalt auch in veränderter Form nur unter den Bedingungen dieser Lizenz weitergeben.
DOI 10.5446/31240
Herausgeber Confreaks, LLC
Erscheinungsjahr 2017
Sprache Englisch

Inhaltliche Metadaten

Fachgebiet Informatik
Abstract This is a sponsored talk by Engine Yard. Containers have gained popularity the past few years but they have been around much longer than that. In this talk, we'll dive into the internals of a container. If you have used or heard about Docker containers but are unsure how they work, this talk is for you. 
You’ll also learn how to run Rails in production-ready container environments like Kubernetes.

Ähnliche Filme

Loading...