Atjaunināt sīkdatņu piekrišanu

Serverless Beyond the Buzzword: A Strategic Approach to Modern Cloud Management 2nd ed. [Mīkstie vāki]

  • Formāts: Paperback / softback, 710 pages, height x width: 254x178 mm, weight: 1392 g, 388 Illustrations, black and white; XXXIII, 710 p. 388 illus., 1 Paperback / softback
  • Izdošanas datums: 15-Dec-2022
  • Izdevniecība: APress
  • ISBN-10: 1484287606
  • ISBN-13: 9781484287606
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 55,83 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 65,69 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 710 pages, height x width: 254x178 mm, weight: 1392 g, 388 Illustrations, black and white; XXXIII, 710 p. 388 illus., 1 Paperback / softback
  • Izdošanas datums: 15-Dec-2022
  • Izdevniecība: APress
  • ISBN-10: 1484287606
  • ISBN-13: 9781484287606
Citas grāmatas par šo tēmu:
Know how Serverless and cloud-native systems work, their benefits and roles in automating and optimizing organizations, and the challenges to be considered. Anyone interested in Serverless architecture will benefit from this book, regardless of their level of technical understanding.





This revised and expanded new edition explains many related terms, such as microservices, cloud-native, architecture, several relevant AWS services, and how it all works together to produce cost-effective, scalable solutions in the cloud. The book starts at a high level and gradually gets more in-depth and technical.

The less technical decision maker will learn how Serverless can affect finance, security, people, and compliance. The book touches on important decisions, such as selecting and working with external or internal specialists and teams; finding, evaluating, and training them; and the flexibility and dynamics available within digital projects.





Deployment automation and DevOps also feature heavily in this book, and you will find real-world use cases and examples of Serverless architecture to get you started. It's worth noting that this book is not a development guide; it gives you a comprehensive understanding of what Serverless is so you can make informed decisions for your organization and projects.











What Youll Learn















Understand Serverless architecture and strategy Understand modern cloud management strategy, governance, and organizational team structure Handle budget planning and management Get started with Serverless architecture design Gain knowledge of best practices and security, as well as data management and DevOps Study proactive logging, operations, architecture examples, case studies, and more











































Who This Book Is For





Anyone interested in a deep understanding of Serverless and how it canimpact organizations and projects, regardless of their technical level. Strategic insights are provided for entrepreneurs and executives, planning and team insights for project managers, and technical insights for architects and team leads. Cloud consultants working with enterprises can read everything for a full, in-depth understanding of the topic. Other readers, such as less technical CTOs/CIOs, VPs, entrepreneurs, product owners, project managers, etc., can get what they need from the first 5-7 chapters. More technical readers and those experienced with Serverless can skim through the first 3 chapters and start with the security deep dive in Chapter 4.
About the Author xxiii
Acknowledgments xxv
Prologue xxvii
Chapter 1 Serverless Basics
1(36)
What Is Serverless Architecture?
1(4)
Pay for What You Use
2(1)
Server vs. Fully Managed vs. Serverless
3(2)
What Serverless Is Not
5(1)
Microservices
5(7)
Independence
8(3)
Reusability
11(1)
Security
11(1)
Separation of Front End (User Interface) and Back End (Processing)
12(1)
Serverless Example
12(2)
History of Serverless
14(4)
Virtual Servers
14(1)
The Cloud
15(1)
Software
16(1)
Modern Containers
16(2)
Serverless
18(1)
Types of Projects
18(2)
Key Challenges
20(3)
Vendor Lock-In
20(1)
Finding Talent
20(1)
Less Control
21(1)
Service-Level Agreements (SLAs)
21(1)
Latency
21(1)
(Almost) Unlimited Scaling
22(1)
Calculating Cloud Operational Costs
22(1)
Cloud Management
23(1)
Service Limits
23(1)
Key Benefits
23(3)
Near-Zero Wastage
23(1)
Reduced Scope of Responsibility and Effort
24(1)
Accurate Operational Cost Estimation and Tracking
24(1)
Highly Reusable Microservices
24(1)
Better Access Security
25(1)
Agility and DevOps Are Easier to Implement
25(1)
Easier to Manage Time, Budgets, and Teams
25(1)
Highly Scalable, Fast Scaling
26(1)
Significantly Lower Maintenance Cost
26(1)
Common Objections
26(3)
Less Stable
26(1)
Less Observable
27(1)
A Lot to Configure
27(1)
Architectural Complexity
27(2)
Public Case Studies
29(8)
NorthOne Bank
29(3)
Liberty Mutual
32(2)
Coca-Cola
34(3)
Chapter 2 Strategy
37(72)
Introduction
37(1)
Traditional Organization Structure vs. Serverless
38(3)
Cloud Center of Excellence (CCoE)
41(8)
Platform Architecture and Operations Roles
44(3)
From a Traditional Org Structure to a CCoE
47(2)
Cloud Controls as Compliance Guardrails
49(9)
Directive Controls
52(1)
Preventive Controls
53(2)
Detective Controls
55(2)
Corrective Controls
57(1)
Which Controls to Prioritize?
57(1)
Supporting Tools
58(2)
Self-Service Portal
58(1)
Shared Central Library
59(1)
Developer Tools
60(1)
Serverless Adoption: Current State
60(2)
Serverless Adoption: Desired State
62(7)
Serverless Adoption Framework: Business Perspective
66(1)
Serverless Adoption Framework: People Perspective
67(1)
Serverless Adoption Framework: Governance Perspective
67(1)
Serverless Adoption Framework: Platform Perspective
68(1)
Serverless Adoption Framework: Security Perspective
68(1)
Serverless Adoption Framework: Operations Perspective
69(1)
Serverless Adoption: Gap Analysis
69(3)
Application Suitability for Serverless
72(8)
Serverless Application Risk Assessment
72(1)
Assessment Domains
73(1)
Assessment Guide
73(7)
Event Storming
80(23)
Common Challenges
80(2)
Event Storming Basics
82(3)
Event Storming Steps
85(17)
Architecture Design
102(1)
Final Notes
103(1)
Public Case Studies
103(6)
Toyota
103(1)
Netflix
104(1)
T-Mobile
105(4)
Chapter 3 Finances
109(50)
Total Cost of Ownership (TCO)
109(3)
The Value of Paying for Utilization
112(4)
Scaling User Numbers
114(1)
Per-User Cost
115(1)
The Cost to Develop Serverless
116(4)
The Research
116(1)
The Project
116(2)
Comparing the Estimates
118(1)
Development Time
119(1)
The Cost of Migrating Applications
120(2)
The Cost of Maintenance and Operations
122(1)
Estimating the Cloud Operational Costs
123(2)
Collecting the Input Data for an Estimate
125(24)
Business Parameters
126(1)
Technical Parameters
126(2)
Pricing Parameters
128(1)
Service Pricing
129(5)
Request Fees
134(1)
Data Transfer
134(4)
Other Costs
138(1)
Architecture Examples
139(4)
Calculating the Estimate
143(1)
Calculator Tab
144(1)
Processing Tab
145(1)
AWS Service Pricing Tab
146(1)
Pricing API
147(2)
Cost Management
149(5)
AWS Cost Management Services
150(2)
Custom Tracking
152(1)
Resource Tags
153(1)
Regional Differences
154(1)
Cost Optimization
154(5)
S3 Cost Optimization
154(1)
S3 Lifecycle Policies
155(1)
Lambda Cost Optimization
156(1)
AWS Cost Reductions
156(1)
AWS Credits
156(1)
Consolidated Billing for AWS Organizations
157(2)
Chapter 4 Security
159(58)
Shared Responsibility
159(3)
Examples of Shared Responsibility
161(1)
Serverless Security
162(1)
Principle of Least Privilege
163(4)
PoLP Applied to Teams
163(1)
Static vs. Dynamic Privileges
164(1)
PoLP Applied to Servers
165(1)
PoLP for Serverless
166(1)
Identity and Access Management (IAM)
167(5)
Wildcards
169(1)
IAM Tips
170(2)
AWS Security Services
172(8)
AWS Organizations
172(1)
Single Sign-On (SSO)
173(1)
AWS Config (Detective Controls)
173(1)
Amazon GuardDuty
174(1)
AWS X-Ray
174(1)
AWS Shield
174(1)
AWS Resource Access Manager or RAM
174(1)
Firewall Manager
174(1)
Amazon Cognito
175(1)
AWS Directory Service
175(1)
Amazon Detective
175(1)
CloudHSM
175(1)
AWS Certificate Manager
175(1)
ECR Image Scan
176(1)
CodeGuru
176(1)
API Gateway
176(1)
API Authentication and Authorization
177(1)
Security Best Practices for API Gateway
178(1)
Serverless S3 Antivirus Scanning
179(1)
S3 Policies and ACLs
179(1)
Securing Containers by Decoupling
179(1)
Security Is Hard!
180(1)
User Input Validation
180(8)
API Gateway Model Schemas
184(4)
Storing Credentials
188(4)
$45,000 Bill for Losing Credentials
188(1)
AWS Public Scanning
189(1)
Systems Manager Parameter Store
190(1)
Secrets Manager
191(1)
Encryption
192(3)
Encryption of Data at Rest
192(1)
Encryption of Data in Transit
193(1)
Public/Private Key Encryption
193(1)
Envelope Encryption
194(1)
Encryption Exceptions in AWS Cloud
194(1)
Protecting Data
195(7)
CloudFront
197(1)
Other S3 Features
198(1)
S3 Monitoring
199(1)
On-Demand Data Redaction
200(2)
Securing Databases
202(3)
Tokenization
203(2)
Database Monitoring
205(1)
Privacy and GDPR
205(7)
What Is Privacy in a Technology Context, and Why Is It Important?
206(1)
Complying with GDPR
207(1)
Cloud and GDPR
208(1)
Why Serverless for GDPR Compliance
209(1)
Implementing for Compliance
210(2)
Security Monitoring with ElectricEye
212(5)
Key Points
212(1)
Deployment and Setup
213(4)
Chapter 5 People
217(56)
Evolving Teams
217(1)
Build, Buy, or Borrow
218(9)
Building a Team
218(3)
Buying a Team
221(2)
Interviews
223(4)
Serverless Roles: Solution Architect
227(1)
Serverless Roles: Cloud Security Engineer
228(1)
Serverless Roles: Deployment Automation Engineer
229(2)
Serverless Roles: Full-Stack Developer
231(2)
Serverless Roles: Database Engineer
233(1)
Serverless Roles: Project Manager
234(1)
Serverless Training
235(16)
Foundational Certification
238(1)
Associate Certification
238(2)
Professional Certification
240(1)
Specialty Certification
241(3)
Online Resources to Learn About Serverless
244(7)
Serverless Team Structure
251(2)
Serverless Careers
253(3)
Key Performance Indicators (KPIs)
255(1)
Borrowing a Team: Working with Serverless Vendors
256(7)
Experienced Serverless Vendors
258(1)
Capable Vendor
259(1)
The Three Pillars
260(1)
General Best Practices
261(2)
Vetting Serverless Capabilities
263(10)
Chapter 6 DevOps and Tooling
273(70)
What Is DevOps?
273(3)
Principles and Practices of DevOps
274(1)
Problems Solved by DevOps
274(2)
Evolution of DevOps
276(1)
Infrastructure-as-Code
276(5)
Key Values of IaC
278(2)
IaC Tools and Frameworks
280(1)
AWS CloudFormation
281(8)
Declarative vs. Imperative
283(2)
CloudFormation Example
285(2)
CloudFormation Challenges
287(2)
AWS CloudFormation Planning
289(9)
Nested Stacks
290(4)
Modules
294(1)
Macros
295(3)
Terraform
298(4)
Challenges
301(1)
AWS Serverless Application Model (SAM)
302(2)
Serverless Application Repository
304(1)
Challenges
304(1)
AWS Amplify
304(3)
AWS Cloud Development Kit (CDK)
307(4)
Differences Between Amplify and CDK
311(1)
CDK Technical Considerations
311(9)
Local Dev and Testing
312(1)
Existing Cloud Formation Projects
313(1)
Extending CDK
313(1)
CDK DevOps
314(5)
CDK Tips
319(1)
Serverless Framework
320(3)
Challenges
322(1)
Code Repositories
323(5)
Mono-repo
323(1)
Multi-repo
324(4)
GIT Submodules
328(6)
Common Challenges
333(1)
Lambda Layers
333(1)
Developer Tooling
334(6)
AWS Command-Line Interface (CLI)
334(1)
LocalStack
334(1)
Integrated Development Environment (IDE)
335(4)
Other Tools
339(1)
Code Quality Assurance
340(3)
AWS Well-Architected Framework
340(1)
AWS Trusted Advisor
341(1)
AWS CodeGuru
341(1)
Amazon CodeWhisperer Preview
342(1)
Chapter 7 Data
343(58)
Data Is a Valuable Asset
343(2)
Database Selection
345(4)
Event Sourcing
349(3)
Data Tenancy
352(4)
Relational Database Service (RDS)
356(6)
RDS Proxy
357(1)
Amazon Aurora
358(1)
Aurora Serverless
358(3)
Aurora Serverless Data API
361(1)
Redshift Serverless
362(1)
DynamoDB
362(16)
Billing Models
363(2)
Transactional Operations
365(1)
Comparison of DynamoDB Billing Models
366(1)
Keys and Queries
367(1)
Adaptive Capacity
368(1)
DynamoDB Indexes
369(1)
Query Examples
370(5)
Other DynamoDB Features
375(2)
AWS DynamoDB Checklist
377(1)
NoSQL
378(2)
Serverless NoSQL Databases
380(2)
Amazon Keyspaces
380(1)
Amazon Timestream
380(1)
Amazon Quantum Ledger Database
381(1)
Managed NoSQL Databases
382(1)
DocumentDB
382(1)
Amazon Neptune
383(1)
NoSQL Databases Comparison
383(2)
In-Memory Databases
385(2)
ElastiCache
385(1)
MemoryDB
386(1)
AppSync
387(5)
Under- and Over-fetching
387(5)
Simple Storage Solution (S3)
392(7)
S3 Events
392(1)
Signed URLs
393(1)
Multipart Upload
394(1)
S3 Object Lambda
394(3)
Avoiding Size Limit Issues in Lambda
397(2)
Elastic File System (EFS)
399(2)
Chapter 8 Logging and Testing
401(86)
Logging
401(1)
Reactive Logging
402(1)
Proactive Logging
403(2)
General Considerations
404(1)
Logging Format and Content
405(2)
Service Logs in the Cloud
407(1)
Cloud Logging Services
408(1)
CloudWatch
409(3)
CloudWatch Metrics
409(1)
CloudWatch Logs
410(1)
CloudWatch Alarms
410(1)
CloudWatch Metric Filter
411(1)
Exporting Logs to S3
412(1)
CloudWatch Subscriptions
413(3)
Managed Services for Proactive Logging
416(1)
Error Monitoring
417(4)
CloudWatch Events
420(1)
Performance Optimization
421(14)
Lambda Rightsizing
422(2)
Lambda Insights
424(2)
X-Ray
426(1)
Cost Tracking
427(1)
Lambda Cost Tracking
428(2)
S3 Cost Tracking
430(3)
Tracking the Cost of Other Services
433(2)
Security Monitoring
435(6)
Macie
435(2)
GuardDuty
437(2)
CloudWatch Subscription
439(2)
Logging Best Practices
441(5)
Centralized Logging
441(1)
Error Messages
441(2)
Sensitive Data in Logs
443(3)
Testing
446(1)
Testing Challenges in Serverless
446(7)
Testing Environments
447(1)
Creating and Maintaining Tests
448(1)
Local Testing
449(1)
Integrated Managed Services
450(1)
Debugging Failed Tests
450(2)
What to Test
452(1)
Types of Tests
453(6)
Unit Tests
454(1)
Integration Tests
455(2)
End-to-End Tests
457(2)
User Simulation
459(1)
Contract Testing
459(6)
Pact
461(2)
Comparing the Types of Testing
463(1)
Contract Testing with Pact for Serverless
463(2)
Asynchronous Testing
465(5)
Risk Assessment for Testing
470(1)
Test Pyramid vs. Test Honeycomb
471(2)
Deployment Pipeline
473(2)
AWS Testing Services
475(12)
Serverless Application Model (SAM)
475(1)
LocalStack
476(2)
CodeBuild
478(1)
CloudWatch Synthetics
478(2)
CloudWatch Real User Monitoring (RUM)
480(2)
CloudWatch Evidently
482(2)
Fault Injection Simulator (FIS)
484(2)
Device Farm
486(1)
Chapter 9 Architecture
487(140)
Challenges and Mitigations
487(18)
Vendor Lock-In
487(4)
Service-Level Agreements (SLAs)
491(1)
Stateless Microservices
491(1)
Latency
492(4)
Fully Managed Scaling
496(2)
Maturity of the Technology
498(1)
Service Limits
499(4)
Learning Curve
503(1)
Database Strategy
504(1)
Other Challenges
505(1)
AWS: Microservices and APIs
505(19)
Lambda Scalability and Cold Start
505(1)
Reserved Concurrency
506(2)
Layers
508(1)
To VPC or Not to VPC?
508(3)
Lambda DevOps
511(1)
Lambda Environment Variables
512(1)
Lambda and CloudWatch
512(1)
What Metrics to Monitor for CloudWatch and Why?
513(1)
Lambda and API Gateway
514(1)
WebSockets
515(3)
Proxy vs. Non-proxy Integration
518(1)
Request Transformation
519(1)
Dynamic HTML
520(1)
Error Reporting
520(1)
Other Integrations
520(1)
Lambda and Application Load Balancer
521(3)
Design Patterns
524(2)
When Not to Use Strict Microservice Architecture
525(1)
Microservice Example Architectures
526(8)
Basic CRUDAPI
526(1)
Triggered or Decoupled
527(2)
Gatekeeper
529(1)
CRON or Scheduled
530(2)
Edge Compute
532(2)
Stateless Architecture
534(5)
Decoupling Microservices
539(5)
Decoupling Started with Servers
539(1)
Benefits of Decoupling
540(1)
Challenges of Decoupling
541(1)
Decoupling Example
541(3)
AWS: Decoupling
544(21)
Simple Queue Service (SQS)
544(1)
SQS Message Delay and Visibility Timeout
545(4)
SQS and Lambda Integration
549(3)
Dead Letter Queue (DLQ)
552(2)
SQS Buffer Example
554(2)
Simple Notification Service (SNS)
556(3)
EventBridge
559(3)
Step Functions
562(2)
Workflow Studio
564(1)
Event-Driven Architecture
565(7)
Asynchronous Design Pattern
572(5)
Parallel Processing
573(4)
Containers
577(2)
Lambda vs. Containers
578(1)
Serverless Containers
578(1)
Lambda Custom Containers
579(1)
AWS: Edge
579(7)
Lambda@Edge
580(2)
FreeRTOS
582(1)
IoT Greengrass
582(3)
Snowball
585(1)
Outposts
585(1)
AWS: Internet of Things (IoT)
586(15)
AWS Robotics
592(2)
Industrial Internet of Things (MoT)
594(1)
Predictive Quality
594(2)
Predictive Maintenance
596(3)
Asset Management
599(2)
AWS: Managed Machine Learning (ML)
601(9)
Rekognition
601(2)
DeepLens
603(1)
Textract
603(1)
Polly `
604(1)
Transcribe
605(2)
Lex
607(2)
QnA Bot
609(1)
Comprehend
609(1)
AWS: Ledger Technology
610(2)
Managed Blockchain
611(1)
Quantum Ledger Database (QLDB)
612(1)
AWS: Call Center
612(3)
Well-Architected Framework
615(6)
The Five Pillars of the Well-Architected Framework
616(1)
The Design Principles
617(1)
Why Use the AWS Well-Architected Framework?
618(1)
AWS Well-Architected Tool
619(1)
Serverless Lens and Its Layers
619(2)
Serverless Tips
621(6)
Uploading Files
621(1)
Layers of Caching
621(1)
Multilingual
622(1)
Typescript
623(1)
Pick the Right Tool for the Job
623(1)
Cognito as a User Database
624(3)
Chapter 10 Case Studies
627(58)
Introduction
627(2)
Proactive Logging
629(10)
Cost Tracking
632(1)
Parsing S3 Logs
633(3)
Parsing API Gateway Logs
636(3)
Serverless Data Lake
639(6)
Serverless Video
645(6)
Elemental Media Services
646(1)
Making the Media Services More Serverless
647(2)
Video Processing and Analysis
649(2)
Serverless Minecraft
651(6)
Minecraft Server Setup
655(2)
Notes
657(1)
SEO-Friendly Website and CMS
657(2)
Serverless Websites
658(1)
Another Approach
659(3)
Serverless Website Tips
661(1)
Virtual Host
662(3)
True Serverless Containersl
665(20)
1 Create, Configure, and Build Our Docker Container
667(1)
2 Put the Container in a Registry
667(1)
3 Enable Long ARN Names in ECS
668(1)
4 Create Any Support Services
668(1)
5 Create the Policies and Roles
669(2)
6 Create a Task Definition
671(1)
7 Add the Container to the Task Definition
671(1)
8 Create the Cluster (and VPC) That the Task Will Run In
672(4)
9 Launch the Container
676(1)
The Lambda Microservice
677(2)
Launching a VPC and Cluster (If We Went with Option 3)
679(3)
Launching a Fargate Service
682(1)
Retrieve the Container IP
682(1)
Finished
683(2)
Epilogue 685(2)
References 687(8)
Index 695
Thomas Smart has been actively involved with digital projects since 2002. His experience crosses many industries and types and sizes of organisations, giving him a wealth of experience and knowledge to draw upon as part of his consulting services. Since 2020 he has worked as a senior consultant for Sourced Singapore, helping large, regulated enterprises evolve their cloud strategy to productively deliver Serverless applications. This experience has provided many new insights for large enterprises and their unique challenges when adopting modern cloud strategies.