دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: First Edition
نویسندگان: Graham Dumpleton
سری:
ISBN (شابک) : 9781492032489
ناشر: O'Reilly Media
سال نشر: 2018
تعداد صفحات: 162
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 6 مگابایت
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Deploying to Openshift به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب در حال استقرار در Openshift نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Copyright\nTable of Contents\nPreface\n Who Should Read This Book\n Why I Wrote This Book\n Online Resources\n Conventions Used in This Book\n O’Reilly Safari\n How to Contact Us\n Acknowledgments\nChapter 1. The OpenShift Container Platform\n The Role of Containers\n Orchestrating at Scale\n Containers as a Service\n Platform as a Service\n Deploying Your Application\nChapter 2. Running an OpenShift Cluster\n Using OpenShift Online\n Installing OpenShift Origin\n Launching Using Minishift\n Running oc cluster up\n Summary\nChapter 3. Accessing the OpenShift Cluster\n Using the Web Console\n Using the Command Line\n Using the OpenShift REST API\n Summary\nChapter 4. Adding Applications to a Project\n The Role of a Project\n Creating a Project\n Adding a Collaborator\n Deploying Applications\n Deploying from the Catalog\n Deploying an Image\n Deploying a Set of Resources\n Summary\nChapter 5. Deploying Applications from Images\n Deploying Your First Image\n Scaling Up the Application\n Runtime Configuration\n Deleting the Application\n Deploying Using the Web Console\n Importing an Image\n Pushing to the Registry\n Images and Security\n Summary\nChapter 6. Building and Deploying from Source\n The Source Build Strategy\n Deploying from Source\n Creating a Separate Build\n Triggering a New Build\n Building from a Local Source\n Binary Input Builds\n Testing the Container Image\n Build and Runtime Configuration\n Summary\nChapter 7. Building an Image from a Dockerfile\n The Docker Build Strategy\n Security and Docker Builds\n Creating the Build\n Deploying the Image\n Build and Runtime Configuration\n Using an Inline Dockerfile\n Summary\nChapter 8. Understanding Source-to-Image Builders\n The Source-to-Image Project\n Building the Application Image\n Assembling the Source Code\n Creating an S2I Builder Image\n Building the S2I Builder Image\n Using the S2I Builder with OpenShift\n Adding an S2I Builder to the Catalog\n Summary\nChapter 9. Customizing Source-to-Image Builds\n Using Environment Variables\n Overriding the Builder Scripts\n Read-Only Code Repositories\n Overriding the Runtime Image\n Updating the Image Metadata\n Summary\nChapter 10. Using Incremental and Chained Builds\n Faster Builds Using Caching\n Using Incremental Builds\n Saving Artifacts from a Build\n Restoring the Build Artifacts\n Enabling Incremental Builds\n Using Chained Builds\n Summary\nChapter 11. Webhooks and Build Automation\n Using a Hosted Git Repository\n Accessing a Private Git Repository\n Adding a Repository Webhook\n Customized Build Triggers\n Summary\nChapter 12. Configuration and Secrets\n Passing Environment Variables\n Working with Configuration Files\n Handling of Secret Information\n Deleting Configuration and Secrets\n Summary\nChapter 13. Services, Networking, and Routing\n Containers and Pods\n Services and Endpoints\n Connecting Between Projects\n Creating External Routes\n Using Secure Connections\n Internal and External Ports\n Exposing Non-HTTP Services\n Local Port Forwarding\n Summary\nChapter 14. Working with Persistent Storage\n Types of Persistent Storage\n Claiming a Persistent Volume\n Unmounting a Persistent Volume\n Reusing a Persistent Volume Claim\n Sharing Between Applications\n Sharing Between Containers\n Deleting a Persistent Volume\n Copying Data to a Volume\n Summary\nChapter 15. Resource Quotas and Limits\n What Is Managed by Quotas\n Quotas versus Limit Ranges\n Requests Versus Limits\n Resource Requirements\n Overriding Build Resources\n Summary\nChapter 16. Monitoring Application Health\n The Role of a Readiness Probe\n The Role of a Liveness Probe\n Using an HTTP Request\n Using a Container Command\n Using a Socket Connection\n Probe Frequency and Timeouts\n Summary\nChapter 17. Application Lifecycle Management\n Deployment Strategies\n Rolling Deployment\n Recreate Deployment\n Custom Deployments\n Container Runtime Hooks\n Init Containers\n Summary\nChapter 18. Logging, Monitoring, and Debugging\n Viewing the Build Logs\n Viewing Application Logs\n Monitoring Resource Objects\n Monitoring System Events\n Viewing Container Metrics\n Running an Interactive Shell\n Debugging Startup Failures\n Summary\nAfterword\n What Was Covered\n Final Words\nIndex\nAbout the Author\nColophon