Atjaunināt sīkdatņu piekrišanu

Kubernetes Patterns: Reusable Elements for Designing Cloud Native Applications 2nd Revised edition [Mīkstie vāki]

4.28/5 (174 ratings by Goodreads)
  • Formāts: Paperback / softback, 300 pages, height x width: 233x178 mm
  • Izdošanas datums: 28-Mar-2023
  • Izdevniecība: O'Reilly Media
  • ISBN-10: 1098131681
  • ISBN-13: 9781098131685
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 60,87 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 71,61 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 300 pages, height x width: 233x178 mm
  • Izdošanas datums: 28-Mar-2023
  • Izdevniecība: O'Reilly Media
  • ISBN-10: 1098131681
  • ISBN-13: 9781098131685
Citas grāmatas par šo tēmu:

The way developers design, build, and run software has changed significantly with the evolution of microservices and containers. These modern architectures offer new distributed primitives that require a different set of practices than many developers, tech leads, and architects are accustomed to. With this focused guide, Bilgin Ibryam and Roland Huss provide common reusable patterns and principles for designing and implementing cloud native applications on Kubernetes.

Each pattern includes a description of the problem and a Kubernetes-specific solution. All patterns are backed by and demonstrated with concrete code examples. This updated edition is ideal for developers and architects familiar with basic Kubernetes concepts who want to learn how to solve common cloud native challenges with proven design patterns.

You'll explore:

  • Foundational patterns covering core principles and practices for building and running container-based cloud native applications
  • Behavioral patterns that delve into finer-grained concepts for managing various types of container and platform interactions
  • Structural patterns for organizing containers within a Pod for addressing specific use cases
  • Configuration patterns that provide insight into how application configurations can be handled in Kubernetes
  • Security patterns for hardening the access to cloud native applications running on KubernetesAdvanced patterns covering more complex topics such as operators and autoscaling

Foreword xi
Preface xiii
1 Introduction
1(14)
The Path to Cloud Native
1(2)
Distributed Primitives
3(8)
Containers
5(1)
Pods
6(1)
Services
7(1)
Labels
8(2)
Namespaces
10(1)
Discussion
11(1)
More Information
12(3)
Part I Foundational Patterns
2 Predictable Demands
15(14)
Problem
15(1)
Solution
15(11)
Runtime Dependencies
16(2)
Resource Profiles
18(3)
Pod Priority
21(2)
Project Resources
23(2)
Capacity Planning
25(1)
Discussion
26(1)
More Information
26(3)
3 Declarative Deployment
29(12)
Problem
29(1)
Solution
29(7)
Rolling Deployment
31(3)
Fixed Deployment
34(1)
Blue-Green Release
34(1)
Canary Release
35(1)
Discussion
36(2)
More Information
38(3)
4 Health Probe
41(10)
Problem
41(1)
Solution
41(7)
Process Health Checks
42(1)
Liveness Probes
42(2)
Readiness Probes
44(2)
Startup Probes
46(2)
Discussion
48(1)
More Information
49(2)
5 Managed Lifecycle
51(10)
Problem
51(1)
Solution
51(7)
SIGTERM Signal
52(1)
SIGKILL Signal
52(1)
PostStart Hook
53(1)
PreStop Hook
54(1)
Other Lifecycle Controls
55(3)
Discussion
58(1)
More Information
59(2)
6 Automated Placement
61(18)
Problem
61(1)
Solution
61(11)
Available Node Resources
62(1)
Container Resource Demands
63(1)
Scheduler Configurations
63(1)
Scheduling Process
64(2)
Node Affinity
66(1)
Pod Affinity and Anti-Affinity
67(1)
Topology Spread Constraints
68(2)
Taints and Tolerations
70(2)
Discussion
72(3)
More Information
75(4)
Part II Behavioral Patterns
7 Batch Job
79(8)
Problem
79(1)
Solution
80(5)
Discussion
85(1)
More Information
86(1)
8 Periodic Job
87(4)
Problem
87(1)
Solution
88(1)
Discussion
89(1)
More Information
90(1)
9 Daemon Service
91(6)
Problem
91(1)
Solution
92(3)
Discussion
95(1)
More Information
95(2)
10 Singleton Service
97(10)
Problem
97(1)
Solution
98(6)
Out-of-Application Locking
98(2)
In-Application Locking
100(3)
Pod Disruption Budget
103(1)
Discussion
104(1)
More Information
105(2)
11 Stateless Service
107(8)
Problem
107(1)
Solution
108(5)
Instances
108(2)
Networking
110(1)
Storage
111(2)
Discussion
113(1)
More Information
114(1)
12 Stateful Service
115(12)
Problem
115(3)
Storage
116(1)
Networking
116(1)
Identity
117(1)
Cardinality
117(1)
Other Requirements
117(1)
Solution
118(6)
Storage
119(1)
Networking
120(1)
Identity
121(1)
Ordinality
122(1)
Other Features
122(2)
Discussion
124(1)
More Information
125(2)
13 Service Discovery
127(18)
Problem
127(1)
Solution
128(14)
Internal Service Discovery
129(4)
Manual Service Discovery
133(2)
Service Discovery from Outside the Cluster
135(4)
Application Layer Service Discovery
139(3)
Discussion
142(1)
More Information
143(2)
14 Self Awareness
145(8)
Problem
145(1)
Solution
146(3)
Discussion
149(1)
More Information
149(4)
Part III Structural Patterns
15 Init Container
153(8)
Problem
153(1)
Solution
154(4)
Discussion
158(1)
More Information
159(2)
16 Sidecar
161(6)
Problem
161(1)
Solution
162(2)
Discussion
164(1)
More Information
164(3)
17 Adapter
167(4)
Problem
167(1)
Solution
167(3)
Discussion
170(1)
More Information
170(1)
18 Ambassador
171(6)
Problem
171(1)
Solution
171(2)
Discussion
173(1)
More Information
174(3)
Part IV Configuration Patterns
19 EnvVar Configuration
177(8)
Problem
177(1)
Solution
177(5)
Discussion
182(1)
More Information
183(2)
20 Configuration Resource
185(8)
Problem
185(1)
Solution
185(6)
Discussion
191(1)
More Information
191(2)
21 Immutable Configuration
193(8)
Problem
193(1)
Solution
194(5)
Docker Volumes
194(2)
Kubernetes Init Containers
196(2)
OpenShift Templates
198(1)
Discussion
199(1)
More Information
200(1)
22 Configuration Template
201(10)
Problem
201(1)
Solution
201(5)
Discussion
206(1)
More Information
207(4)
Part V Security Patterns
23 Process Containment
211(10)
Problem
211(1)
Solution
212(6)
Running Containers with a Non-Root User
212(1)
Restricting Container Capabilities
213(2)
Avoiding a Mutable Container Filesystem
215(1)
Enforcing Security Policies
216(2)
Discussion
218(1)
More Information
219(2)
24 Network Segmentation
221(16)
Problem
221(1)
Solution
222(13)
Network Policies
223(8)
Authentication Policies
231(4)
Discussion
235(1)
More Information
235(2)
25 Secure Configuration
237(16)
Problem
237(1)
Solution
238(13)
Out-of-Cluster Encryption
239(8)
Centralized Secret Management
247(4)
Discussion
251(1)
More Information
252(1)
26 Access Control
253(26)
Problem
253(1)
Solution
254(20)
Authentication
255(1)
Authorization
256(1)
Admission Controllers
256(1)
Subject
257(6)
Role-Based Access Control
263(11)
Discussion
274(1)
More Information
275(4)
Part VI Advanced Patterns
27 Controller
279(14)
Problem
279(1)
Solution
280(10)
Discussion
290(1)
More Information
291(2)
28 Operator
293(16)
Problem
293(1)
Solution
294(12)
Custom Resource Definitions
294(3)
Controller and Operator Classification
297(3)
Operator Development and Deployment
300(2)
Example
302(4)
Discussion
306(1)
More Information
307(2)
29 Elastic Scale
309(26)
Problem
309(1)
Solution
310(23)
Manual Horizontal Scaling
310(1)
Horizontal Pod Autoscaling
311(14)
Vertical Pod Autoscaling
325(3)
Cluster Autoscaling
328(3)
Scaling Levels
331(2)
Discussion
333(1)
More Information
333(2)
30 Image Builder
335(20)
Problem
335(1)
Solution
336(17)
Container Image Builder
337(4)
Build Orchestrators
341(1)
Build Pod
342(4)
OpenShift Build
346(7)
Discussion
353(1)
More Information
353(2)
Afterword 355(4)
Index 359