版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、采用Harbor开源企业级Registry实现高效安全 的镜像运维Agenda1Container Image Basics2Project Harbor Introduction3Consistency of Images4Security5Image Distribution6High Availability of RegistryLifecycle of Containers and Images5ImagesContainersStop Start RestartRunCommitDockerfileBuildtagtar archiveSaveLoadPushRegistryIma
2、gesPull6PushPullRepository for storing imagesIntermediary for shipping and distributing imagesIdeal for access control and other image managementRegistryImagesRegistry - Key Component to Manage ImagesAgenda1Container Image Basics2Project Harbor Introduction3Consistency of Images4Security5Image Distr
3、ibution6High Availability of RegistryProject HarborAn open source enterprise-class registry server.Initiated by VMware China, adopted by users worldwide.Integrated into vSphere Integrated Containers.Apache 2 license./vmware/harbor/8Key FeaturesUser management & access controlRBAC: admin, developer,
4、guestAD/LDAP integrationPolicy based image replicationVulnerability ScanningNotaryWeb UIAudit and logsRestful API for integrationLightweight and easy deployment9Users and Developers200+Users2600+20K+DownloadsDevelopersStarsUsers55Contributors700+Forks6Partners10Harbor ArchitectureDocker clientNginxH
5、arborBrowserUI APIAuthDBAD / LDAPCore ServiceLog CollectorReplication Job ServicesNotary clientRemote Harbor InstanceNotaryRegistry V2Vulnerability ScanningAdmin ServiceHarbor users and partners (selected)12Image replication (synchronization)13ProjectImagesPolicyImageProjectImagesInitial replication
6、Imageincremental replication (including image deletion)Agenda1Container Image Basics2Project Harbor Introduction3Consistency of Images4Security5Image Distribution6High Availability of RegistryConsistency of Container ImagesContainer images are used throughout the life cycle of software developmentDe
7、vTestStagingProductionConsistency must be maintainedVersion controlIssue trackingTroubleshootingAuditing15Same Dockerfile Always Builds Same Image?16Example:FROM ubuntuRUN apt-get install y python ADD app.jar /myapp/app.jarBase image ubuntu:latest could be changed between buildsubuntu:14.04 could al
8、so be changed due to patchingapt-get (curl, wget.) cannot guarantee always to install the same packagesADD depends on the build time environment to add filesShipping Images in Binary Format for Consistency17D.v R.gistryCIGitT.st R.gistryimag.s imag.simag.sStaging R.gistryimag.simag.sProduction R.gis
9、tryimag.sImag.s ar. synchroniz.d b.tw.n .nvironm.nts by using Harbor r.gistry.Agenda1Container Image Basics2Project Harbor Introduction3Consistency of Images4Security5Image Distribution6High Availability of RegistryAccess Control to ImagesOrganizations often keep images within their own organization
10、sIntellectual property stays in organizationEfficiency: LAN vs WANPeople with different roles should have different accessDeveloper Read/WriteTester Read OnlyDifferent rules should be enforced in different environmentsDev/test env many people can accessProduction a limited number of people can acces
11、sCan be integrated with internal user management systemLDAP/Active Directory19Example: Role Based Access Control in Harbor20ProjectMembersImagesGuest:Developer:Admin:$Project/ubuntu:14.04$Project/nginx:1.8, 1.9$Project/golang:1.6.2$Project/redis:3.0.docker pull .docker pull/push .Other security cons
12、iderationsEnable content trust by installing Notary serviceImage is signed by publishers private key during pushingImage is pulled using digestPerform vulnerability scanningPrevent images with vulnerabilities from being pulledRegular scanning based on updated vulnerability database21Content trust fo
13、r image provenanceRegistryNotaryImage CreatorImage ConsumerVulnerability ScanningStatic analysis of vulnerability by inspecting filesystem of container image and indexing features in database.Rescanning is needed only and only if new detectors are added.Update vulnerability data regularlyDebian Secu
14、rity Bug TrackerUbuntu CVE TrackerRed Hat Security DataOracle Linux Security DataAlpine SecDB24Vulnerability scanningSet vulnerability thresholdPrevent images from being pulled if they exceed thresholdPeriodic scanning based on updated vulnerability databaseRegistry Image Vulnerability ScanningAgend
15、a1Container Image Basics2Project Harbor Introduction3Consistency of Images4Security5Image Distribution6High Availability of RegistryImage DistributionContainer images are usually distributed from a registry.Registry becomes the bottleneck for a large cluster of nodesI/ONetworkScaling out an registry
16、 serverMultiple instances of registry sharing same storageMultiple instances of independent registry sharing no storage26Image Distribution via Master-Slave Replication27Mast.r - Slav. mod.lDocker ClientpushDocker hostDocker hostpullDocker hostDocker hostDocker hostDocker hostLoad balancingWorks w.l
17、l with g.ographically distribut.d cli.ntsHierarchical Image Distribution28Hi.rarchicalDocker ClientpushAgenda1Container Image Basics2Project Harbor Introduction3Consistency of Images4Security5Image Distribution6High Availability of RegistryHigh Availability of RegistryTo remove single point of failu
18、re on registryThree models to achieve HAShared storageReplication ( no shared storage )Using other HA platform30Shar.d Storag.L R.qu.stR.gistry instanc.sRegistries using Shared StorageImage replication between registries32L R.qu.stVMware ESXi-1Docker Volume Driver for vSphereVMware ESXi-2Docker Volume Driver for vSphereVMware ESXi-3Docker Volume Driver for vSphereShared StorageVirtual SANDocker Volume -1Docker Host VMHarborvSphere Docker Volume PluginDocker Volume -2Docker Volume-3Other Docker Volume sRegistry HA on vSphereRegistry in a VM protected by vSph
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025江西省电子信息技师学院工作人员招聘考试试题
- 2025江华瑶族自治县职业中专学校工作人员招聘考试试题
- 市政道路改造施工方案
- 2026年美发工具市场造型技术突破报告
- 2025年生态养殖循环产业链与智能农业设备应用可行性报告
- 高中地理:校园生态环境教育课程设计与实施策略教学研究课题报告
- 幼儿园教师观察记录工具使用熟练度影响因素-基于2023年观察记录质量与培训记录
- 2026年智能生活行业创新报告及恒温调奶器市场应用前景报告
- 2026年语音交互点餐创新报告
- 2026年矿山行业智能采矿系统创新报告
- 2026浙江事业单位统考嘉兴市招聘107人考试参考题库及答案解析
- 物业保安服务工作方案范文
- 《2023版CSCO小细胞肺癌诊疗指南》
- 肾内科学科建设发展规划
- 2026年当辅警笔试题库及一套完整答案
- 三下第11课《同学要互助》教学课件
- 四不伤害安全培训课件
- 2025年度全球风险投资状况回顾报告:私募市场交易、投融资和退出数据及分析 State of Venture Global 2025 recap
- 广西玉林师范学院招聘考试真题2025
- 2026年人教版中考英语总复习新课标新增词汇
- 概率论与数理统计里判断题
评论
0/150
提交评论