Kubernetes in Action
Manning Publications (Verlag)
978-1-61729-761-8 (ISBN)
- Noch nicht erschienen (ca. April 2025)
- Versandkostenfrei innerhalb Deutschlands
- Auch auf Rechnung
- Verfügbarkeit in der Filiale vor Ort prüfen
- Artikel merken
RETAIL SELLING POINTS
• Up and running with Kubernetes
• Deploying containers across a cluster
• Securing clusters
• Updating applications with zero downtime
AUDIENCE
For intermediate software developer
Marko Lukša is an engineer at Red Hat working on Kubernetes and OpenShift.
table of contents detailed TOC PART 1: FIRST TIME ON A BOAT: INTRODUCTION TO KUBERNETES READ IN LIVEBOOK 1INTRODUCING KUBERNETES READ IN LIVEBOOK 2UNDERSTANDING CONTAINERS READ IN LIVEBOOK 3DEPLOYING YOUR FIRST APPLICATION PART 2: LEARNING THE ROPES: KUBERNETES API OBJECTS READ IN LIVEBOOK 4INTRODUCING KUBERNETES API OBJECTS READ IN LIVEBOOK 5RUNNING WORKLOADS IN PODS READ IN LIVEBOOK 6MANGING THE POD LIFECYCLE READ IN LIVEBOOK 7ATTACHING STORAGE VOLUMES TO PODS READ IN LIVEBOOK 8PERSISTING DATA IN PERSISTENTVOLUMES READ IN LIVEBOOK 9CONFIGURATION VIA CONFIGMAPS, SECRETS, AND THE DOWNWARD API READ IN LIVEBOOK 10ORGANIZING OBJECTS USING NAMESPACES AND LABELS READ IN LIVEBOOK 11EXPOSING PODS WITH SERVICES READ IN LIVEBOOK 12EXPOSING SERVICES WITH INGRESS READ IN LIVEBOOK 13REPLICATING PODS WITH REPLICASETS READ IN LIVEBOOK 14MANAGING PODS WITH DEPLOYMENTS 15 DEPLOYING STATEFUL WORKLOADS WITH STATEFULSETS 16 DEPLOYING SPECIALIZED WORKLOADS WITH DAEMONSETS, JOBS, AND CRONJOBS PART 3: GOING BELOW DECK: KUBERNETES INTERNALS 17 UNDERSTANDING THE KUBERNETES API IN DETAIL 18 UNDERSTANDING THE CONTROL PLANE COMPONENTS 19 UNDERSTANDING THE CLUSTER NODE COMPONENTS 20 UNDERSTANDING THE INTERNAL OPERATION OF KUBERNETES CONTROLLERS PART 4: SAILING OUT TO HIGH SEAS: MANAGING KUBERNETES 21 DEPLOYING HIGHLY-AVAILABLE CLUSTERS 22 MANAGING THE COMPUTING RESOURCES AVAILABLE TO PODS 23 ADVANCED SCHEDULING USING AFFINITY AND ANTI-AFFINITY 24 AUTOMATIC SCALING USING THE HORIZONTALPODAUTOSCALER 25 SECURING THE API USING ROLE-BASED ACCESS CONTROL 26 PROTECTING CLUSTER NODES 27 SECURING NETWORK COMMUNICATION USING NETWORKPOLICIES 28 UPGRADING, BACKING UP, AND RESTORING KUBERNETES CLUSTERS 29 ADDING CENTRALIZED LOGGING, METRICS, ALERTING, AND TRACING PART 5: BECOMING A SEASONED MARINER: MAKING THE MOST OF KUBERNETES 30 KUBERNETES DEVELOPMENT AND DEPLOYMENT BEST PRACTICES 30 EXTENDING KUBERNETES WITH CUSTOMRESOURCEDEFINITIONS AND OPERATORS
Erscheinungsdatum | 01.12.2023 |
---|---|
Verlagsort | New York |
Sprache | englisch |
Themenwelt | Informatik ► Betriebssysteme / Server ► Virtualisierung |
Mathematik / Informatik ► Informatik ► Netzwerke | |
ISBN-10 | 1-61729-761-5 / 1617297615 |
ISBN-13 | 978-1-61729-761-8 / 9781617297618 |
Zustand | Neuware |
Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich