The goal of this is to show you how to get a Node.js application into a Docker container. In the first part of this guide, we will create a simple web application in Node.js, then we will build a Docker image for that application, and lastly, we will instantiate a container from that image.

An image is a blueprint for a container, a container is a running instance of an image normally. Let’s try to dockerize a node.js application step by step.

1. Create the Node.js app

First, open visual studio code and create and open a new folder to the making the application. Then…


Web development has become one of the most innovative and important areas of the IT industry. This article aims to demonstrate the principles, concepts, and technologies surrounding full-stack web development.

What is a “Full-Stack” Web Developer?

A full-stack web developer is a person who can develop both client and server software, also knows how to

  • Program a browser (like using JavaScript, jQuery, Angular, or Vue)
  • Program a server (like using PHP, ASP, Python, or Node)
  • Program a database (like using SQL, SQLite, or MongoDB)

According to that, the client-side is called Front-end, and the server-side is called Back-end.


This article is about security scanning vulnerabilities detection tools for secure DevOps. In Part 1, were discussed image scanning tools. In Part 2 we are discussing about Run time security scanning tools for secure DevOps.

There are many runtime scanning tools which help to detect application vulnerabilities in DevOps. Some of them are Sysdig, Sysdig Inspect, Falco, Kube-bench, Kube-hunter & Prometheus.

1. Sysdig


This article is about security scanning vulnerabilities detection tools for secure DevOps. It can be used DevOps security tools in environment to identify vulnerabilities & security flaws in the early stages of development applications.

Security testing has always been an important step in the application development process. Yet, traditional measures often occur too late in the process to effectively find and fix vulnerabilities before causing costly production delays.

Securing code in a DevOps development environment requires managing the software supply chain and checking the security of common components and frameworks, adopting a framework to automate testing and need to analyze…

Udara Vimukthi

3rd Year Undergraduate, University of Moratuwa.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store