Professional Documents
Culture Documents
CC Researchpaper
CC Researchpaper
CC Researchpaper
Microservices Containers
1
Utkarsh Pathak, 2 Sagar Vashist , and 3Dhawan Singh
1,2,3
Apex Institute of Technology, Chandigarh University, Mohali, India
3
University Centre for Research and Development, Chandigarh University, Mohali, India
3,*
dhawan_deor@yahoo.co.in
Systems like ETCD will prove beneficial for large Sometimes data is in the rest position; it can neither move
businesses because they have worked on security and nor be shared with anyone; therefore, it is also necessary to
authentication, and the main thing is that the admin can encrypt the data, which will provide security such that
identify the scammers who usually try to hack our data whatever information, i.e., private or public, will be stored
systems. safely. Sensitive information is abstracted from customers to
protect it from any unwanted usage, and it is done by
restricting usage of ETCD and by using an advanced client
authentication system and access rules. The permission part [3] D. Stahl, K. Hallen, and J. Bosch, “Achieving traceability in large
scale continuous integration and delivery deployment, usage, and
here is handled by role-based access control, and it validation of the Eiffel framework,” Empirical Software Engineering,
guarantees that only those who have permission can interact vol. 22, no. 3, pp. 967-995, 2016. Available: 10.1007/s10664-016-
with ETCD. 9457-1.
[4] K. Wiklund, S. Eldh, D. Sundmark, and K. Lundqvist, “Impediments
for software test automation: A systematic literature review,”
Giving regular updates to the security system of ETCD with Software Testing, Verification and Reliability, vol. 27, no. 8, p. e1639,
the most advanced security measures helps in avoiding 2017. Available: 10.1002/stvr.1639.
hackers taking unusual advantage and accessing sensitive [5] G. Adzic, “Bridging the Communication Gap: Specification by
information. To ensure all the ETCD clusters are safe and Example and Agile Acceptance Testing,” London: Neuri, 2009.
protected, all the updates can be deployed in very little time, [6] M. Ilyas, “Software Integration Challenges for GSD Vendors: An
Exploratory Study Using a Systematic Literature Review,” Journal of
providing real-time security updates. By using this, Computers, pp. 416-422, 2017. Available: 10.17706/jcp.12.5.416-
businesses now know who can access information in ETCD, 422.
and they can track down any unusual behaviour by [7] R. Vaasanthi, S. Philip and V. Prasanna, “Comparative Study of
implanting devices that record and audit the system. DevOps Build Automation Tools,” International Journal of Computer
Applications, vol. 170, no. 7, pp. 5-8, 2017. Available:
10.5120/ijca2017914908.
Continuously monitoring any kind of malicious activity and [8] M. Shahin, M. Ali Babar, and L. Zhu, “Continuous Integration,
unwanted access attempt helps in taking care of safety. As Delivery and Deployment: A Systematic Review on Approaches,
you can see the analysis on the given fig 6. Tools, Challenges, and Practices,” IEEE Access, vol. 5, pp. 3909-
3943, 2017. Available: 10.1109/access.2017.2685629.
[9] M. Meyer, “Continuous Integration and Its Tools,” IEEE Software,
VI. CONCLUSION vol. 31, no. 3, pp. 14-16, 2014. Available: 10.1109/ms.2014.58.
[10] L. Chen, “Continuous Delivery: Huge Benefits, but Challenges Too,”
At last, the conclusion of this paper is that due to the IEEE Software, vol. 32, no. 2, pp. 50-54, 2015. Available:
10.1109/ms.2015.27.
complex vulnerability, there is a chance of the container
[11] S. Asmus, A. Fattah and C. Pavlovski, “Enterprise Cloud
breakdown, so secure it. The author just implemented the Deployment: Integration Patterns and Assessment Model,” IEEE
security on the database, i.e., ETCD. Cloud Computing, vol. 3, no. 1, pp. 32-41, 2016. Available:
10.1109/MCC.2016.11.
[12] J. Wettinger, U. Breitenbucher, M. Falkenthal and F. Leymann,
In the ETCD, most of the time, data is not encrypted, which “Collaborative gathering and continuous delivery of DevOps solutions
will make it easier for hackers to hack it. With the help of through repositories,” Computer Science - Research and
TLS (Transport Layer Security), security is enhanced, which Development, vol. 32, no. 3-4, pp. 281-290, 2016. Available:
provides the encryption and decryption of the data while 10.1007/s00450-016-0338-z.
transferring it from one place to another. [13] P. Ajibade, E. M. Ondari-Okemwa, and M. M. Matlhako,
“Information technology integration for accelerated knowledge
sharing practices: challenges and prospects for small and medium
For compatibility and reliability, we just handle 70% of the enterprises,” Problems and Perspectives in Management, vol. 17, no.
4, pp. 131-140, 2019. Available: 10.21511/ppm.17(4).2019.11.
security from the admission controller system. A tool like
[14] J. Kanjilal, “DevOps - Bridging the Gap between Dev and Ops –
Kyverno will help to change the policy according to the InsightsSuccess,: InsightsSuccess, 2017. [Online].
situation at any time. The biggest advantage is that we will Available:https://www.insightssuccess.com/devopsbridging-the-
implement a procedure in the ETCD so that we get the logs gapbetween-dev-and-ops/.
of every user who is trying to enter in our database, and the [15] D. Lee, T. Lim and D. Arditi, “Automated stochastic quality function
system will check if the user's authentication and deployment system for measuring the quality performance of
design/build contractors,” Automation in Construction, vol. 18, no. 3,
authorization are valid or not; if they're not, it will block pp. 348-356, 2009. Available: 10.1016/j.autcon.2008.10.002.
them instantly. Also, the author has implemented RBAC [16] D. Farley and J. Humble, “Continuous delivery,” Addison-Wesley
(role-based access management), through which only users Professional, 2010.
can get authentication according to their roles. [17] D. Stahl and J. Bosch, “Modeling continuous integration practice
differences in industry software development,” Journal of Systems
and Software, vol. 87, pp. 48-59, 2014. Available:
10.1016/j.jss.2013.08.032.
[18] M. Virmani, “Understanding DevOps and bridging the gap from
continuous integration to continuous delivery,” Fifth International
REFERENCES Conference on the Innovative Computing Technology, 2015..
[1] T. Binz, C. Fehling, F. Leymann, A. Nowak and D. Schumm, [19] J. Hernantes, G. Gallardo and N. Serrano, “IT Infrastructure-
“Formalizing the Cloud through Enterprise Topology Graphs,” IEEE Monitoring Tools,” IEEE Software, vol. 32, no. 4, pp. 88-93, 2015.
Fifth International Conference on Cloud Computing, 2012. [20] M. Virmani, "Understanding DevOps and Bridging the Gap from
[2] M. Paul, “Fill the Gap Between CI and CD Pipelines With Continuous Continuous Integration to Continuous Delivery", Proc. 5th Int’l Conf.
Testing - DZone DevOps,” dzone.com, 2017. [Online]. Innovative Computing Technology, pp. 78-82, 2015.
Available:https://dzone.com/articles/fill-the-gap-between-ci-andcd- [21] D. Spinellis, “Don’t Install Software by Hand,” IEEE Software, vol.
pipelines-with-cont. 29, no. 4, pp. 86-87, 2012.