Cloud Native DevOps with Kubernetes, 2nd Edition
Building, Deploying, and Scaling Modern Applications in the Cloud
Book Details
| Authors | Justin Domingus, John Arundel |
| Publisher | O'Reilly Media |
| Published | 2022 |
| Edition | 2nd |
| Paperback | 358 pages |
| Language | English |
| ISBN-13 | 9781098116828 |
| ISBN-10 | 1098116828 |
| License | Compliments of Nginx |
Book Description
Kubernetes has become the operating system of today's cloud native world, providing a reliable and scalable platform for running containerized workloads. In this friendly, pragmatic book, cloud experts Justin Domingus and John Arundel show you what Kubernetes can do-and what you can do with it.
This updated second edition guides you through the growing Kubernetes ecosystem and provides practical solutions to everyday problems with software tools currently in use. You'll walk through an example containerized application running in Kubernetes step-by-step, from the development environment through the continuous deployment pipeline, exploring patterns you can use for your own applications. Make your development teams lean, fast, and effective by adopting Kubernetes and DevOps principles.
- Understand containers and Kubernetes-no experience necessary;
- Run your own applications on managed cloud Kubernetes services or on-prem environments;
- Design your own cloud native services and infrastructure;
- Use Kubernetes to manage resource usage and the container lifecycle;
- Optimize clusters for cost, performance, resilience, capacity, and scalability;
- Learn the best tools for developing, testing, and deploying your applications;
- Apply the latest industry practices for observability and monitoring;
- Secure your containers and clusters in production.
This book is published as open-access, which means it is freely available to read, download, and share without restrictions.
If you enjoyed the book and would like to support the author, you can purchase a printed copy (hardcover or paperback) from official retailers.
Download and Read Links
Share this Book
[localhost]# find . -name "*Similar_Books*"
Cloud Native Application Protection Platforms
Cloud native security isn't a game for individual players. It requires team collaboration with a platform that can help cloud security engineers, developers, and operations people do their best work. That's what the cloud native application protection platform (CNAPP) delivers. With this practical guide, you'll learn how CNAPPs can help you consoli
Hacking Secret Ciphers with Python
There are many books that teach beginners how to write secret messages using ciphers. There are a couple books that teach beginners how to hack ciphers. As far as I can tell, there are no books to teach beginners how to write programs to hack ciphers. This book fills that gap. This book is for complete beginners who do not know anything about encry
Cloud Native Go
What do Docker, Kubernetes, and Prometheus have in common? All of these cloud native technologies are written in the Go programming language. This practical book shows you how to use Go's strengths to develop cloud native services that are scalable and resilient, even in an unpredictable environment. You'll explore the composition and construction
Migrating to Cloud-Native Application Architectures
Adoption of cloud-native application architectures is helping many organizations transform their IT into a force for true agility in the marketplace. This report defines the unique characteristics of cloud-native application architectures such as microservices and twelve-factor applications. Author Matt Stine also examines the cultural, organizatio
Building Cloud Apps with Microsoft Azure
This book walks you through a patterns-based approach to building real-world cloud solutions. The patterns apply to the development process as well as to architecture and coding practices. Developers who are curious about developing for the cloud, are considering a move to the cloud, or are new to cloud development will find here a concise overview
Defense against the Black Arts
As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It