دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Pethuru Raj, Skylab Vanga, Akshita Chaudhary سری: ISBN (شابک) : 1119814766, 9781119814764 ناشر: Wiley-IEEE Press سال نشر: 2022 تعداد صفحات: 341 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 14 Mb
در صورت تبدیل فایل کتاب Cloud-native Computing: How to Design, Develop, and Secure Microservices and Event-Driven Applications به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب رایانش بومی ابری: نحوه طراحی، توسعه و ایمن ریزسرویسها و برنامههای رویداد محور نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
در رایانش بومی ابری: نحوه طراحی، توسعه و امنیت میکروسرویسها و برنامههای کاربردی رویداد محور، تیمی از متخصصان برجسته، درمان جامع و روشنگری را از فناوریها و ابزارهای محاسباتی بومی ابری ارائه میدهند. این کتاب با تأکید ویژه بر پلت فرم Kubernetes و همچنین راهحلهای سرویس مش و دروازه API، نیاز به اطمینان از قابلیت اطمینان در هر محیط توزیعشده را نشان میدهد.
نویسندگان جنبههای مهندسی کاربرد و مدرنسازی میراث این فناوری را به همراه مدلهای برنامهنویسی چابک بهطور کامل توضیح میدهند. توضیحات MSA و EDA به عنوان ابزارهایی برای تسریع طراحی و توسعه نرم افزار، با بحث در مورد اینکه چگونه ابزار DevOps ابری یکپارچه سازی، تحویل و استقرار مداوم را تقویت می کند، همراه است.
Cloud-Native Computing همچنین دستگاههای لبه و ابرهای اثبات شدهای را معرفی میکند که برای ساخت برنامههای لبه محور و بیدرنگ میکروسرویسها استفاده میشوند. در نهایت، خوانندگان از موارد زیر بهره مند خواهند شد:
مناسب برای دانشجویان فارغ التحصیل و کارشناسی ارشد در انواع تخصص های مرتبط با فناوری اطلاعات و ابر، < /span>Cloud-Native Computing همچنین متعلق به کتابخانههای متخصصان فناوری اطلاعات و رهبران تجاری است که درگیر یا علاقهمند به کاربرد فناوریهای ابری در عملیاتهای مختلف تجاری هستند.
In Cloud-Native Computing: How to Design, Develop, and Secure Microservices and Event-Driven Applications, a team of distinguished professionals delivers a comprehensive and insightful treatment of cloud-native computing technologies and tools. With a particular emphasis on the Kubernetes platform, as well as service mesh and API gateway solutions, the book demonstrates the need for reliability assurance in any distributed environment.
The authors explain the application engineering and legacy modernization aspects of the technology at length, along with agile programming models. Descriptions of MSA and EDA as tools for accelerating software design and development accompany discussions of how cloud DevOps tools empower continuous integration, delivery, and deployment.
Cloud-Native Computing also introduces proven edge devices and clouds used to construct microservices-centric and real-time edge applications. Finally, readers will benefit from:
Perfect for graduate and postgraduate students in a variety of IT- and cloud-related specialties, Cloud-Native Computing also belongs in the libraries of IT professionals and business leaders engaged or interested in the application of cloud technologies to various business operations.
Cover Title Page Copyright Page Contents About the Authors Preface Acknowledgments Chapter 1 The Dawning of the Digital Era Demystifying the Digitization Paradigm Delineating the Digitalization Technologies Trendsetting Technologies for the Digital Era Why Digitization Is Indispensable The Connectivity and Integration Options The Promising Digital Intelligence Methods The Technological Approaches Toward Smarter Environments Briefing the Brewing Idea of Digital Twin Envisioning the Digital Universe Cloud-Native Applications (CNAs) Conclusion References Chapter 2 The Cloud-Native Computing Paradigm for the Digital Era Introduction The Onset of the Digital Era The Maturity of Software-defined Cloud Environments The Hybrid Model of Microservices Architecture (MSA) and Event-driven Architecture (EDA) The Aspect of Containerization The Emergence of Container Lifecycle Management Platforms Tending Toward Cloud-Native Computing Demystifying the Cloud-Native Architecture Style Distinguishing Cloud-Native Infrastructure Cloud-Native Security Cloud-Native Computing Advantages Conclusion References Chapter 3 Kubernetes Architecture, Best Practices, and Patterns Introduction The Emergence of Containerized Applications for IT Portability Microservices Architecture (MSA) Applications for IT Agility and Adaptivity The Onset of Containerized Cloud Environments The Need for Container Orchestration Platform Solutions The Significance of Kubernetes for Cloud-Native Systems Kubernetes for Edge Cloud Environments Kubernetes for Multi-Cloud Implementations Delineating the Kubernetes’ Master–Slave Architecture The Special Features of the Kubernetes Platform Best Practices for Efficient and Effective Kubernetes Kubernetes Patterns Conclusion References Chapter 4 The Observability, Chaos Engineering, and Remediation for Cloud-Native Reliability Introduction The Emergence of Cloud-Native Observability The Key Motivations for Cloud-Native Applications Cloud-Native Applications: The Realization Technologies DevOps for Cloud-Native Applications (CNAs) Container Orchestration Platforms The Cloud-Native Application Challenges [1, 2] Cloud-Native Resiliency Cloud-Native Chaos Engineering Cloud-Native Observability [3–5] Cloud-Native Observability: The Benefits Cloud-Native Observability for Chaos Engineering AIOps-Enabled Cloud-Native Observability Building System Resilience Through AIOps Cloud-Native Remediation Conclusion References Chapter 5 Creating Kubernetes Clusters on Private Cloud (VMware vSphere) Introduction Purpose Scope Deployment Pre-requirements Prerequisites vCenter Requirements Cluster Resources Required IP Addresses DNS Records Create Local Linux Installer VM on VMware vSphere Generating an SSH Private Key and Adding it to the Agent Create DHCP Server Download OpenShift Installation for vSphere Procedure Adding vCenter Root CA Certificates to your Installer VM Deploying the OCP Cluster on VMware vSphere Installing the CLI on Linux Uninstall OpenShift Cluster Considerations When you Delete OpenShift for VMware (https://cloud.ibm.com/docs/vmwaresolutions) Conclusion Further Reading Chapter 6 Creating Kubernetes Clusters on Public Cloud (Microsoft Azure) Introduction Prerequisites Configuring a Public DNS Zone in Azure DNS Creation Prerequisites Create a DNS Zone Required Azure Roles Creating a Service Principal Azure CLI Setup Manually Create IAM Start Installation of OCP Uninstall Cluster Conclusion Further Reading Chapter 7 Design, Development, and Deployment of Event-Driven Microservices Practically Introduction Technology Stack to Build Microservices Express Framework Steps to Set Up Your Project Blog Post Microservice Comments Microservice Implementation of Event-Driven Model Event Bus Deployment Strategies Conclusion Chapter 8 Serverless Computing for the Cloud-Native Era Introduction The Key Motivations for Serverless Computing [1, 2] Briefing Serverless Computing The Serverless Implications The Evolution of Serverless Computing [3, 4] Serverless Application Patterns Containers as the Function Runtime Serverless Computing Components [5, 6] Advantages of Using a Serverless Database Disadvantages of Using Serverless Databases Top Benefits of Serverless Computing Overcoming Serverless Obstacles The Future of Serverless Computing Conclusion Appendix Knative for Serverless Computing References Chapter 9 Instaling Knative on a Kubernetes Cluster Introduction Knative Serving Resources Further Reading Chapter 10 Delineating Cloud-Native Edge Computing Introduction Briefing Cloud-Native Computing Technical and Business Cases for Cloud-Native Computing [3, 4] The Emergence of Edge Computing Cloud-Native Technologies for Edge Computing Benefits of Bringing the Cloud-Native Principles to the Edge The Deployment Scenarios at the Edge Kubernetes Deployment Options for Edge Computing Cloud-Native at the Edge: The Use Cases Navigating Heterogeneous Environments at the Edge Monitoring Kubernetes-Enabled Edge Environments Edge Analytics for Real-Time Video Surveillance Describing Edge AI Conclusion References Chapter 11 Setting up a Kubernetes Cluster using Azure Kubernetes Service Introduction Benefits of Azure Kubernetes Service Purpose Scope An Introduction to Azure Kubernetes Service Features of Azure Kubernetes Services Azure Kubernetes Service Use Cases Common Uses for Azure Kubernetes Service High-Level Architecture Architecture Design Deployment Pre-Requisites Conclusion Further Reading Chapter 12 Reliable Cloud-Native Applications through Service Mesh Introduction Delineating the Containerization Paradigm Demystifying Microservices Architecture Decoding the Growing Role of Kubernetes for the Container Era Describing the Service Mesh Concept [1–3] Demystifying Service Mesh The Service Mesh Contributions The Leading Service Mesh Solutions Why Service Mesh is Paramount? Service Mesh Architectures Monitoring the Service Mesh Service Mesh Deployment Models Conclusion Appendix Deploying the Red Hat OpenShift Service Mesh Control Plane References Chapter 13 Cloud-Native Computing: The Security Challenges and the Solution Approaches Introduction to Cloud Capabilities Delineating the Cloud-Native Paradigm Why Cloud-Native Computing About Cloud-Native Applications Beginning of Cloud-Native Application Security Cloud-Native Security Challenges Capabilities of Cloud-Native Security Solutions Cloud-Native Application Security Procedures Securing Cloud-Native Applications Pillars of Cloud-Native Security Cloud-Native Security: Best Practices Kubernetes Security Best Practices Container Security Best Practices Cloud-Native Security Best Practices The Emergence of Cloud-Native Security Products and Platforms Key Properties of Cloud-Native Security Platforms Cloud Workload Protection Platforms Kubernetes Security Products AIOps for Cloud-Native Security Conclusion Reference Chapter 14 Microservices Security: The Concerns and the Solution Approaches Microservice Security Challenges and Concerns Best Practices to Secure Microservices How to Implement Fundamental Authentication and Authorization Strategies Dive Deeper into API Gateway APACHE APISIX Configuring APISIX Conclusion Further Reading Chapter 15 Setting Up Apache Kafka Clusters in a Cloud Environment and Secure Monitoring Introduction Introspecting Kafka Kafka Component Overview Guide to Set Up a Kafka Cluster Prerequisites Steps to Install Step 1: Setup virtual machines for Kafka Step 2: Configure Zookeeper and Kafka on both the machines zookeeper.service kafka.service Step 3: Test Zookeeper and Kafka installation Kafka Command Line Features Set Up Your Monitoring Tools for Your Cluster: Prometheus and Grafana Fetch Metrics Using Prometheus Install JMX Exporter Agent on Kafka broker Create Prometheus as a service on the Admin machine Visualize using Grafana Secure your cluster Encryption Authentication Authorization Conclusion Further Reading Chapter 16 Installing Knative Serving On EKS Prerequisites EKS Installation Procedure Installing Knative Serving Using YAML Files Prerequisites System Requirements Install the Serving component Verify the Installation Configure DNS Install kn Using a Binary Install kn Using Go Sample Application Creating Your Deployment with the Knative CLI Interacting with Your App Index EULA