{"id":1077,"date":"2017-09-28T14:04:11","date_gmt":"2017-09-28T14:04:11","guid":{"rendered":"https:\/\/www.bsetec.com\/blog\/?p=1077"},"modified":"2017-10-31T11:18:49","modified_gmt":"2017-10-31T11:18:49","slug":"secrets-of-docker-swarm","status":"publish","type":"post","link":"https:\/\/www.bsetec.com\/blog\/secrets-of-docker-swarm\/","title":{"rendered":"Secrets of Docker Swarm"},"content":{"rendered":"<p><a href=\"https:\/\/www.bsetec.com\/blog\/wp-content\/uploads\/2017\/09\/docker-swarm.png\"><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter size-full wp-image-1078\" src=\"https:\/\/www.bsetec.com\/blog\/wp-content\/uploads\/2017\/09\/docker-swarm.png\" alt=\"docker-swarm\" width=\"741\" height=\"400\" srcset=\"https:\/\/www.bsetec.com\/blog\/wp-content\/uploads\/2017\/09\/docker-swarm.png 741w, https:\/\/www.bsetec.com\/blog\/wp-content\/uploads\/2017\/09\/docker-swarm-300x162.png 300w\" sizes=\"(max-width: 741px) 100vw, 741px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Docker changed how development, testing and running software are done, and that\u2019s why software engineers and companies should develop new habits and follow best practices. On the other hand, orchestration technologies like Docker Swarm, K8S or Mesos are also changing depending on the industry demands. Security management, including secret management in Docker Swarm, is one of the things that have evolved as a reaction to these changes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When working with Docker and orchestration tools, following security best practices is important. Software is becoming more distributed and with the rise of new development models, e.g. Micro-services Architecture, communication between software components is adopting new patterns like message-based communication.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In a production environment, containers running different services may exchange some critical information. When deploying a software to different environments, it is evident that storing critical information like production passwords in the development environment is not a good practice. There are multiple scenarios where we can notice the need of a standardized interface for accessing secrets.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Datacenter Operating System, Kubernetes and other orchestration technologies have their own integrated secrets management solutions. \u00a0we are going to discover Docker native secret management.<\/span><\/p>\n<p><b>How Docker Swarm Work ?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Docker users can use Docker Secrets in a Swarm cluster. Managers in Docker Swarm act as an authoritative delegation to coordinate secrets management.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Secrets could be passwords, keys, certificates, sensitive environment data or any other custom data that a developer wants to protect e.g a database name, the administrator username, etc.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Docker Secrets is only available in the Swarm mode, so standalone containers can not use this feature. Swarm Mode allows you to centrally manage sensitive data and messages by encrypting and transmitting them in a secure way and only to containers that need to access to it.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When a user adds a new secret to a Swarm cluster, this secret is sent to a manager using a TLS connection.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">TLS is a cryptographic protocol that provides communications security over a network by providing communication encryption, privacy and data integrity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In order to make all managers up to date with a new secret, when one manager node receives the secret, it saves it to a Raft store with a 256-bit key.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Docker Swarm, it\u2019s undeniable that Swarm is one of the most successfully clustering solutions for containers and of course Docker.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Swarm is now rock-solid both in terms of feature and quality. Combined with the power of <\/span><i><span style=\"font-weight: 400;\">libnetwork<\/span><\/i><span style=\"font-weight: 400;\">, Swarm delivers a Software-Defined Network Docker clustering system that is easy to setup and use. It\u2019s the only clustering system that allows us to control a pool of Linux and Windows container engines <\/span><i><span style=\"font-weight: 400;\">at the same time<\/span><\/i><span style=\"font-weight: 400;\">. Enterprise adoption of Swarm is, IMHO, far easier than other clustering solutions. It\u2019s simple and it just works.<\/span><\/p>\n<p><b>What\u2019s container orchestration?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Containers basically packages services into one unit which you can deploy anywhere you like\u200a\u2014\u200alocal machine, test environment or production systems. In a production environment, you cannot pile up containers on one machine, because it\u2019ll run out of capacity. You need multiple machines to be running in a cluster and deploy these containers to them. Now the question is, If I have multiple nodes \/ machines running in my cluster. Where do I deploy my container to? You would tell the orchestration software to deploy a container and it takes care of the rest.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Orchestration software generally takes care of :<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Which is the best machine should I deploy this container to? Best machine can mean\u200a\u2014\u200athe machine that\u2019s most free of resources right now. It can also mean container with more memory, if you\u2019re deploying a memory intensive service\u200a\u2014\u200afor example, Redis.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">If machine fails, It should automatically deploy the containers which were deployed on that machine to a new machine.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">If a new machine is added to a cluster. Balance the containers to new machines without disrupting the service.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">If a container fails, auto restart it.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">\u2026and more.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Now that you\u2019ve understood why you need container orchestration. Let\u2019s look at two most popular choices out there and see how they compare with each other.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Docker Swarm<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Swarm is the native clustering engine by and for Docker. Any tools, services or software that works with containers with Docker run equally well in Docker Swarm. Here are few pros and cons about Docker Swarm.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Pros:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Ease of use. \u201cJust works??? user-experience,<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Zero single-point-of-failure architecture,<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Secure by default with automatically generated certificates,<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Backwards compatibility with existing components.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Open Source<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Cons:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Early in development \/ launch cycle. We do not recommend using Docker Swarm for business critical applications. It will be more mature with time.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Simple with limited features.<\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Docker changed how development, testing and running software are done, and that\u2019s why software engineers and companies should develop new habits and follow best practices. On the other hand, orchestration technologies like Docker Swarm, K8S or Mesos are also changing depending on the industry demands. Security management, including secret management in Docker Swarm, is [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1122,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1077","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Secrets of Docker Swarm | BSEtec<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bsetec.com\/blog\/secrets-of-docker-swarm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secrets of Docker Swarm | BSEtec\" \/>\n<meta property=\"og:description\" content=\"&nbsp; Docker changed how development, testing and running software are done, and that\u2019s why software engineers and companies should develop new habits and follow best practices. On the other hand, orchestration technologies like Docker Swarm, K8S or Mesos are also changing depending on the industry demands. Security management, including secret management in Docker Swarm, is [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bsetec.com\/blog\/secrets-of-docker-swarm\/\" \/>\n<meta property=\"og:site_name\" content=\"BSEtec\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/bsetec\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-28T14:04:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-10-31T11:18:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.bsetec.com\/blog\/wp-content\/uploads\/2017\/09\/imgpsh_fullsize.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"741\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"BSEtec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@BSEtech\" \/>\n<meta name=\"twitter:site\" content=\"@BSEtech\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"BSEtec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.bsetec.com\/blog\/secrets-of-docker-swarm\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.bsetec.com\/blog\/secrets-of-docker-swarm\/\"},\"author\":{\"name\":\"BSEtec\",\"@id\":\"https:\/\/www.bsetec.com\/blog\/#\/schema\/person\/24a8ed4eefa5e9bf112e896653ca21c4\"},\"headline\":\"Secrets of Docker Swarm\",\"datePublished\":\"2017-09-28T14:04:11+00:00\",\"dateModified\":\"2017-10-31T11:18:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.bsetec.com\/blog\/secrets-of-docker-swarm\/\"},\"wordCount\":779,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.bsetec.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.bsetec.com\/blog\/secrets-of-docker-swarm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.bsetec.com\/blog\/wp-content\/uploads\/2017\/09\/imgpsh_fullsize.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.bsetec.com\/blog\/secrets-of-docker-swarm\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.bsetec.com\/blog\/secrets-of-docker-swarm\/\",\"url\":\"https:\/\/www.bsetec.com\/blog\/secrets-of-docker-swarm\/\",\"name\":\"Secrets of Docker Swarm | BSEtec\",\"isPartOf\":{\"@id\":\"https:\/\/www.bsetec.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.bsetec.com\/blog\/secrets-of-docker-swarm\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.bsetec.com\/blog\/secrets-of-docker-swarm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.bsetec.com\/blog\/wp-content\/uploads\/2017\/09\/imgpsh_fullsize.jpg\",\"datePublished\":\"2017-09-28T14:04:11+00:00\",\"dateModified\":\"2017-10-31T11:18:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.bsetec.com\/blog\/secrets-of-docker-swarm\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.bsetec.com\/blog\/secrets-of-docker-swarm\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.bsetec.com\/blog\/secrets-of-docker-swarm\/#primaryimage\",\"url\":\"https:\/\/www.bsetec.com\/blog\/wp-content\/uploads\/2017\/09\/imgpsh_fullsize.jpg\",\"contentUrl\":\"https:\/\/www.bsetec.com\/blog\/wp-content\/uploads\/2017\/09\/imgpsh_fullsize.jpg\",\"width\":741,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.bsetec.com\/blog\/secrets-of-docker-swarm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.bsetec.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Secrets of Docker Swarm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.bsetec.com\/blog\/#website\",\"url\":\"https:\/\/www.bsetec.com\/blog\/\",\"name\":\"BSEtec\",\"description\":\"Exploring the World of Tech, One Byte at a Time\",\"publisher\":{\"@id\":\"https:\/\/www.bsetec.com\/blog\/#organization\"},\"alternateName\":\"BSEtec\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.bsetec.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.bsetec.com\/blog\/#organization\",\"name\":\"BSEtec\",\"url\":\"https:\/\/www.bsetec.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.bsetec.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.bsetec.com\/blog\/wp-content\/uploads\/2023\/01\/fav.ico\",\"contentUrl\":\"https:\/\/www.bsetec.com\/blog\/wp-content\/uploads\/2023\/01\/fav.ico\",\"width\":1,\"height\":1,\"caption\":\"BSEtec\"},\"image\":{\"@id\":\"https:\/\/www.bsetec.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/bsetec\/\",\"https:\/\/x.com\/BSEtech\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.bsetec.com\/blog\/#\/schema\/person\/24a8ed4eefa5e9bf112e896653ca21c4\",\"name\":\"BSEtec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.bsetec.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/20fcfaf426a285886f813fd3e9e0ad48f22440b11201e9a669807c088bfdac8e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/20fcfaf426a285886f813fd3e9e0ad48f22440b11201e9a669807c088bfdac8e?s=96&d=mm&r=g\",\"caption\":\"BSEtec\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Secrets of Docker Swarm | BSEtec","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bsetec.com\/blog\/secrets-of-docker-swarm\/","og_locale":"en_US","og_type":"article","og_title":"Secrets of Docker Swarm | BSEtec","og_description":"&nbsp; Docker changed how development, testing and running software are done, and that\u2019s why software engineers and companies should develop new habits and follow best practices. On the other hand, orchestration technologies like Docker Swarm, K8S or Mesos are also changing depending on the industry demands. Security management, including secret management in Docker Swarm, is [&hellip;]","og_url":"https:\/\/www.bsetec.com\/blog\/secrets-of-docker-swarm\/","og_site_name":"BSEtec","article_publisher":"https:\/\/www.facebook.com\/bsetec\/","article_published_time":"2017-09-28T14:04:11+00:00","article_modified_time":"2017-10-31T11:18:49+00:00","og_image":[{"width":741,"height":400,"url":"https:\/\/www.bsetec.com\/blog\/wp-content\/uploads\/2017\/09\/imgpsh_fullsize.jpg","type":"image\/jpeg"}],"author":"BSEtec","twitter_card":"summary_large_image","twitter_creator":"@BSEtech","twitter_site":"@BSEtech","twitter_misc":{"Written by":"BSEtec","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.bsetec.com\/blog\/secrets-of-docker-swarm\/#article","isPartOf":{"@id":"https:\/\/www.bsetec.com\/blog\/secrets-of-docker-swarm\/"},"author":{"name":"BSEtec","@id":"https:\/\/www.bsetec.com\/blog\/#\/schema\/person\/24a8ed4eefa5e9bf112e896653ca21c4"},"headline":"Secrets of Docker Swarm","datePublished":"2017-09-28T14:04:11+00:00","dateModified":"2017-10-31T11:18:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.bsetec.com\/blog\/secrets-of-docker-swarm\/"},"wordCount":779,"commentCount":0,"publisher":{"@id":"https:\/\/www.bsetec.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.bsetec.com\/blog\/secrets-of-docker-swarm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bsetec.com\/blog\/wp-content\/uploads\/2017\/09\/imgpsh_fullsize.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.bsetec.com\/blog\/secrets-of-docker-swarm\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.bsetec.com\/blog\/secrets-of-docker-swarm\/","url":"https:\/\/www.bsetec.com\/blog\/secrets-of-docker-swarm\/","name":"Secrets of Docker Swarm | BSEtec","isPartOf":{"@id":"https:\/\/www.bsetec.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.bsetec.com\/blog\/secrets-of-docker-swarm\/#primaryimage"},"image":{"@id":"https:\/\/www.bsetec.com\/blog\/secrets-of-docker-swarm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bsetec.com\/blog\/wp-content\/uploads\/2017\/09\/imgpsh_fullsize.jpg","datePublished":"2017-09-28T14:04:11+00:00","dateModified":"2017-10-31T11:18:49+00:00","breadcrumb":{"@id":"https:\/\/www.bsetec.com\/blog\/secrets-of-docker-swarm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bsetec.com\/blog\/secrets-of-docker-swarm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.bsetec.com\/blog\/secrets-of-docker-swarm\/#primaryimage","url":"https:\/\/www.bsetec.com\/blog\/wp-content\/uploads\/2017\/09\/imgpsh_fullsize.jpg","contentUrl":"https:\/\/www.bsetec.com\/blog\/wp-content\/uploads\/2017\/09\/imgpsh_fullsize.jpg","width":741,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/www.bsetec.com\/blog\/secrets-of-docker-swarm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.bsetec.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Secrets of Docker Swarm"}]},{"@type":"WebSite","@id":"https:\/\/www.bsetec.com\/blog\/#website","url":"https:\/\/www.bsetec.com\/blog\/","name":"BSEtec","description":"Exploring the World of Tech, One Byte at a Time","publisher":{"@id":"https:\/\/www.bsetec.com\/blog\/#organization"},"alternateName":"BSEtec","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bsetec.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.bsetec.com\/blog\/#organization","name":"BSEtec","url":"https:\/\/www.bsetec.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.bsetec.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.bsetec.com\/blog\/wp-content\/uploads\/2023\/01\/fav.ico","contentUrl":"https:\/\/www.bsetec.com\/blog\/wp-content\/uploads\/2023\/01\/fav.ico","width":1,"height":1,"caption":"BSEtec"},"image":{"@id":"https:\/\/www.bsetec.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/bsetec\/","https:\/\/x.com\/BSEtech"]},{"@type":"Person","@id":"https:\/\/www.bsetec.com\/blog\/#\/schema\/person\/24a8ed4eefa5e9bf112e896653ca21c4","name":"BSEtec","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.bsetec.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/20fcfaf426a285886f813fd3e9e0ad48f22440b11201e9a669807c088bfdac8e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/20fcfaf426a285886f813fd3e9e0ad48f22440b11201e9a669807c088bfdac8e?s=96&d=mm&r=g","caption":"BSEtec"}}]}},"blog_post_layout_featured_media_urls":{"thumbnail":["https:\/\/www.bsetec.com\/blog\/wp-content\/uploads\/2017\/09\/imgpsh_fullsize-150x150.jpg",150,150,true],"full":["https:\/\/www.bsetec.com\/blog\/wp-content\/uploads\/2017\/09\/imgpsh_fullsize.jpg",741,400,false]},"categories_names":{"1":{"name":"Uncategorized","link":"https:\/\/www.bsetec.com\/blog\/category\/uncategorized\/"}},"tags_names":[],"comments_number":"0","wpmagazine_modules_lite_featured_media_urls":{"thumbnail":["https:\/\/www.bsetec.com\/blog\/wp-content\/uploads\/2017\/09\/imgpsh_fullsize-150x150.jpg",150,150,true],"cvmm-medium":["https:\/\/www.bsetec.com\/blog\/wp-content\/uploads\/2017\/09\/imgpsh_fullsize.jpg",300,162,false],"cvmm-medium-plus":["https:\/\/www.bsetec.com\/blog\/wp-content\/uploads\/2017\/09\/imgpsh_fullsize.jpg",305,165,false],"cvmm-portrait":["https:\/\/www.bsetec.com\/blog\/wp-content\/uploads\/2017\/09\/imgpsh_fullsize.jpg",400,216,false],"cvmm-medium-square":["https:\/\/www.bsetec.com\/blog\/wp-content\/uploads\/2017\/09\/imgpsh_fullsize.jpg",600,324,false],"cvmm-large":["https:\/\/www.bsetec.com\/blog\/wp-content\/uploads\/2017\/09\/imgpsh_fullsize.jpg",741,400,false],"cvmm-small":["https:\/\/www.bsetec.com\/blog\/wp-content\/uploads\/2017\/09\/imgpsh_fullsize.jpg",130,70,false],"full":["https:\/\/www.bsetec.com\/blog\/wp-content\/uploads\/2017\/09\/imgpsh_fullsize.jpg",741,400,false]},"_links":{"self":[{"href":"https:\/\/www.bsetec.com\/blog\/wp-json\/wp\/v2\/posts\/1077","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bsetec.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bsetec.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bsetec.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bsetec.com\/blog\/wp-json\/wp\/v2\/comments?post=1077"}],"version-history":[{"count":1,"href":"https:\/\/www.bsetec.com\/blog\/wp-json\/wp\/v2\/posts\/1077\/revisions"}],"predecessor-version":[{"id":1079,"href":"https:\/\/www.bsetec.com\/blog\/wp-json\/wp\/v2\/posts\/1077\/revisions\/1079"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bsetec.com\/blog\/wp-json\/wp\/v2\/media\/1122"}],"wp:attachment":[{"href":"https:\/\/www.bsetec.com\/blog\/wp-json\/wp\/v2\/media?parent=1077"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bsetec.com\/blog\/wp-json\/wp\/v2\/categories?post=1077"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bsetec.com\/blog\/wp-json\/wp\/v2\/tags?post=1077"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}