This lab is longer than the other ones. It is designed to follow the part 1 (“from Compose to Swarm”) but can also be done independently (it provides jump-start instructions if you want to skip part 1). You will learn about the security features of Swarm: secrets, cluster locking, network encryption, and more. You will also see how to implement logging, metrics, and will given a galore of tips and tricks to operate Swarm. We recommend that you open two tabs or two windows for that lab: on...