Orchestration, part 2: securing and operating Swarm
This lab is longer than the other ones. It is designed to follow the part 1 (“from Compose to Swarm”) but can also be done independently (it provides jump-start instructions if you want to skip part 1).
You will learn about the security features of Swarm: secrets, cluster locking, network encryption, and more.
You will also see how to implement logging, metrics, and will given a galore of tips and tricks to operate Swarm.
We recommend that you open two tabs or two windows for that lab: one for the materials, another for the Play-With-Docker environment.
Links:
- Introduction (recommended reading)
- Part 2
- Play-With-Docker environment