The Enterprise Path to Service Mesh Architectures, 2nd Edition

Decoupling at Layer 5


The Enterprise Path to Service Mesh Architectures, 2nd Edition
The Enterprise Path to Service Mesh Architectures, 2nd Edition

Book Details

Author Lee Calcote
Publisher O'Reilly Media
Published 2020
Edition 2
Paperback 85 pages
Language English
ISBN-13 9781492089339
ISBN-10 1492089338
License Compliments of Nginx

Book Description

Planning to build a microservice-driven cloud native application or looking to modernize existing application services? Consider using a service mesh. A service mesh approach can help you create robust and scalable applications, but it also introduces new challenges. This updated report answers common questions regarding service mesh architectures through the lens of a large enterprise.

Author Lee Calcote, founder and CEO of Layer5, shows developers, operators, architects, and IT leaders how to evaluate your organization's readiness for using a service mesh-and provides a clear path to help you adopt one. You'll evaluate several factors when deciding which applications should be built from the ground up and which can be converted with a new service mesh architecture.

This updated edition discusses several service meshes available and the tools you need to implement them. You'll explore:
- Service mesh concepts, architecture, and components, such as control planes and data planes;
- How a service mesh provides observability, resiliency, security, and traffic control of distributed application services;
- Differences among service meshes and service mesh components from several vendors;
- How service meshes compare to related technologies, including container orchestrators, API gateways, and client-side libraries;
- Practical steps for service mesh adoption, deployment, customization, and integration;
- The intelligence of the service mesh management plane and the power of the data plane.


This book is published as open-access, which means it is freely available to read, download, and share without restrictions.

If you enjoyed the book and would like to support the author, you can purchase a printed copy (hardcover or paperback) from official retailers.

Download and Read Links

PDF

Share This Book

[localhost]# find . -name "*Similar_Books*"


Mastering the Lightning Network

Bitcoin Blockchain Cryptocurrency

The Lightning Network (LN) is a rapidly growing second-layer payment protocol that works on top of Bitcoin to provide near-instantaneous transactions between two parties. With this practical guide, authors Andreas M. Antonopoulos, Olaoluwa Osuntokun, and Rene Pickhardt explain how this advancement will enable the next level of scale for Bitcoin, in

Defense against the Black Arts

Hacking

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

The Definitive Guide to Graph Databases

Graph NoSQL

First and foremost, the authors did not write this book to criticize relational databases or undermine a still-valuable technology. Without relational databases, many of today's most mission-critical applications would not function, and without the early innovations of RDBMS pioneers, modern database technology would not have advanced as far as it

Asterisk: The Future of Telephony, 2nd Edition

Asterisk

This bestselling book is now the standard guide to building phone systems with Asterisk, the open source IP PBX that has traditional telephony providers running scared! Revised for the 1.4 release of the software, the new edition of Asterisk: The Future of Telephony reveals how you can save money on equipment and support, and finally be in control

A Practical Guide to TPM 2.0

Security

A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool

Taking Kubernetes from Test to Production

Kubernetes

With Kubernetes came many new concepts, particularly around networking and traffic management. Alongside these new concepts were entirely new classes of tools, designed for ephemeral, containerized, and distributed application deployments. In particular, Ingress controllers and service meshes did not exist prior to the Kubernetes era. Nor were Laye