您好,欢迎来到聚文网。 登录 免费注册
云原生开发(使用容器函数和数据构建下一代应用程序影印版)(英文版)

云原生开发(使用容器函数和数据构建下一代应用程序影印版)(英文版)

  • 字数: 284
  • 出版社: 东南大学
  • 作者: (美)鲍里斯·斯科尔//特伦特·斯旺森//彼得·约索维奇|责编:张烨
  • 商品条码: 9787564188801
  • 版次: 1
  • 开本: 16开
  • 页数: 213
  • 出版年份: 2020
  • 印次: 1
定价:¥78 销售价:登录后查看价格  ¥{{selectedSku?.salePrice}} 
库存: {{selectedSku?.stock}} 库存充足
{{item.title}}:
{{its.name}}
精选
内容简介
开发者在第一次接触云计算的时候往往感到非常 困难。既需要学习分布式系统,熟悉诸如容器和函数 之类的技术,还得知道如何将这些东西组合在一起, 过程实在令人生畏。通过这本实用的指导书,你将了 解构建云原生应用程序的模式以及消息传递、事件处 理和DevOps等常见任务的最佳实践。 作者Boris Scholl、Trent Swanson和Peter Jausovec为你阐述了现代云原生应用程序的架构模 块。你将了解如何使用微服务、容器、无服务器计 算、存储类型、可移植性和函数。你还将探索云原生 应用程序的基础知识,包括如何设计、开发和操作它 们。
目录
Preface 1. Introduction to Cloud Native Distributed Systems Fallacies of Distributed Systems CAP Theorem The Twelve-Factor App Availability and Service-Level Agreements Summary 2. Fundamentals Containers Container Isolation Levels Container Orchestration Kubernetes Overview Kubernetes and Containers Serverless Computing Functions From VMs to Cloud Native Lift-and-Shift Application Modernization Application Optimization Microservices Benefits of a Microservices Architecture Challenges with a Microservices Architecture Summary 3. Designing Cloud Native Applications Fundamentals of Cloud Native Applications Operational Excellence Security Reliability and Availability Scalability and Cost Cloud Native versus Traditional Architectures Functions versus Services Function Scenarios Considerations for Using Functions Composite of Functions and Services API Design and Versioning API Backward and Forward Compatibility Semantic Versioning Service Communication Protocols Messaging Protocols Serialization Considerations Idempotency Request/Response Publisher/Subscriber Choosing Between Pub/Sub and Request Response Synchronous versus Asynchronous Gateways Routing Aggregation Offloading Implementing Gateways Egress Service Mesh Example Architecture Summary 4. Working with Data Data Storage Systems Objects, Files, and Disks Databases Streams and Queues Blockchain Selecting a Datastore Data in Multiple Datastores Change Data Capture Write Changes as an Event to a Change Log Transaction Supervisor Compensating Transactions Extract, Transform, and Load Microservices and Data Lakes Client Access to Data Restricted Client Tokens (Valet-Key) Database Services with Fine-Grained Access Control GraphQL Data Service Fast Scalable Data Sharding Data Caching Data Content Delivery Networks Analyzing Data Streams Batch Data Lakes on Object Storage Data Lakes and Data Warehouses Distributed Query Engines Databases on Kubernetes Storage Volumes StatefulSets DaemonSets Summary 5. DevOps What Is DevOps? Collaboration Automation Lean Principles and Processes Measurement Sharing Testing Test Doubles Test Automation Pyramid When to Run Which Types of Tests Testing Cadence Testing in Production Development Environments and Tools Development Tools Development Environments Local Development Environments Local Development with a Remote Cluster Skaffold Development Workflow Remote Cluster Routed to Local Development Cloud Development Environments CI/CD Source Code Control Build Stage (CI) Test Stage (CI) Deploy Stage (CD) Release Stage (CD) Post-Release Stage Monitoring Collecting Metrics Observable Services Confguration Management Single-Environment Variable Multiple-Environment Variables Adding ConfigMap Data to a Volume Storing Secrets Deployment Configuration Sample CI/CD Flows Summary 6. Best Practices Moving to Cloud Native Breaking Up the Monolith for the Right Reasons Decouple Simple Services First Learn to Operate on a Small Scale Use an Anticorruption Layer Pattern Use a Strangler Pattern Come Up with a Data Migration Strategy Rewrite Any Boilerplate Code Reconsider Frameworks, Languages, Data Structures, and Datastores Retire Code Ensuring Resiliency Handle Transient Failures with Retries Use a Finite Number of Retries Use Circuit Breakers for Nontransient Failures Graceful Degradation Use a Bulkhead Pattern Implement Health Checks and Readiness Checks Define CPU and Memory Limits for Your Containers Implement Rate Limiting and Throttling Ensuring Security Treat Security Requirements the Same as Any Other Requirements Incorporate Security in Your Designs Grant Least-Privileged Access Use Separate Accounts/Subscriptions/Tenants Securely Store All Secrets Obfuscat

蜀ICP备2024047804号

Copyright 版权所有 © jvwen.com 聚文网