Plan for Swarm in production

Plan for Swarm in production

This article provides guidance to help you plan, deploy, and manage Docker Swarm clusters in business critical production environments. The following high level topics are covered:

Security

There are many aspects to securing a Docker Swarm cluster. This section covers:

  • Authentication using TLS
  • Network access control

These topics are not exhaustive. They form part of a wider security architecture that includes: security patching, strong password policies, role based access control, technologies such as SELinux and AppArmor, strict auditing, and more.

Configure Swarm for TLS

All nodes in