Application deployment and Security Flashcards
Name the 4 tier structure for app deployment
Development
Testing
Staging
Production
Development models (types of servers)? (4)
Bare Metal
Virtual Machine
Container Based
Serverless
Difference between type 1 and type 2 hypervisor
Type 1 - Bare metal
Type 2 - runs as an application on a OS
Types of infrastructure? (5)
On-premise Private Cloud Public Cloud Hybrid Cloud Edge Cloud
What is docker?
Container based solution to contain an application, without worrying about underlying OS libraries etc.
Dockerfile - to pull from and existing image (first line of docker file)?
FROM
Dockerfile - set the working directory
WORKDIR
Dockerfile - copy files
COPY
Dockerfile - execute commands when docker starts
CMD
Dockerfile - execute commands as part of the build
RUN
Command to build docker image
docker build -t .
Start a docker image
docker run image_name
docker run -P vs -p
- p 8080:80 will translate local port 8080 to docker port 80
- P will use the dockerfile EXPOSE ports to local random ports
docker run but detach option
docker run -d image_name
docker - enter an running container
docker exec -it container_name /bin/sh
download a docker image
docker pull NAME:TAG
upload a docker image
docker push NAME:TAG
list running docker images
docker ps
docker container ls
In CI/CD explain what CI is
Its the process of continually merging small changes to the code so that any given change set is small with less impact than a big change
In CI/CD whats the difference between Continuous Delivery vs Continuous Deployment
Delivery - ensures shorts sprints are always done to ensure code is deployable
Deployment - code is constantly deployed provided its tagged ready for production (tests are done in Delivery)
Name methods to avoid impact to users when deploying new code or changes to code (3)
Rolling upgrade:
Canary Pipeline:
Blue/Green deployment
CI/CD Benefits (6)
Integration with agile methods Shorter MTTR Automated deployment Less disruptive Improved quality Improved time to market
Load balance methods (6)
Persistent Round Robin Least Connections IP Hash Blue-Green Canary
Three common web attacks
SQL injection
Cross-Site Scripting (XSS)
CSRF