June 27, 2023


Exploring Default Docker Networking
Part 1

18 min read

Learn Docker networking starting with the three options every network engineer should know. Principal Engineer Hank Preston provides a step-by-step walkthrough of the default Docker bridge network environment in Linux, Docker container networking, and much more.

July 29, 2022


Quick Start: Prep Your Dev Environment for Kubernetes

3 min read

Getting started on a new platform, especially Kubernetes, can appear overwhelming. But with these tools, you’re much more likely to get ramped up quickly.

June 10, 2022


Custom Application Troubleshooting With Cisco IOx

7 min read

With Cisco IOx, creating your own custom application is a well-defined process. However, there may be subsequent steps during which you will create an application docker image. Read about the potential challenges when creating an IOx docker-based application image, and how best to handle them.

June 10, 2021


How to Simplify Container Automation: Intro to Cloud Native Buildpacks

3 min read

Here's one way DevNet supports App developer's NetDevOps journey -- Learn how buildpacks have everything app devs need to containerize their apps by executing one command.

February 16, 2021


Understanding Container Images, Part 3: Working with Overlays

4 min read

Learn more about the mechanism Docker uses to work with image layers, and how you can use it for other projects.

February 1, 2021


Understanding Container Images, Part 2: Optimizing Your Images

4 min read

See how to build containers that help you build your application in an automated and consistent way, and then use it in your environment.

January 25, 2021


Understanding Container Images, Part 1: Image Layers

9 min read

See how thinking about container images as an advanced file packaging system may be just what’s needed to make your application run.

December 1, 2020


Xanthe – Docker aware miner

1 min read

By Vanja Svajcer and Adam Pridgen, Cisco Incident Command Attackers are constantly reinventing ways of monetizing their tools. Cisco Talos recently discovered an interesting campaign affecting Linux systems employing a multi-modular botnet with several ways to spread and a payload focused on providing financial benefits for the attacker by mining Monero online currency. The actor […]