Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 8
- Application software 7
- Cloud computing 4
- Computer programs 3
- Kubernetes 3
- Software architecture 3
- Adobe Photoshop elements 2
- Application program interfaces (Computer software) 2
- Computer graphics 2
- Computer software 2
- Digital techniques 2
- Image processing 2
- Monitoring 2
- Open source software 2
- Photography 2
- C (Computer program language) 1
- C# (Computer program language) 1
- C++ (Computer program language) 1
- Client/server computing 1
- Computer Communication Networks 1
- Computer architecture 1
- Computer bootstrapping 1
- Computer communication systems 1
- Computer networks 1
- Data logging 1
- Datenverkehr 1
- Deployment 1
- Distributed operating systems 1
- Distributed processing 1
- Docker 1
-
1
-
2Publicado 2023“…To help you implement their capabilities, most service meshes use a sidecar proxy, an architecture that comes with operational complexities and costly resource overhead. …”
Libro electrónico -
3por Calcote, LeeTabla de Contenidos: “…-- Envoy in Istio -- Sidecar Injection -- Manuelle Sidecar Injection -- Sidecars ad hoc injizieren -- Automatische Sidecar Injection -- Init-Container von Kubernetes -- Bereitstellung von Sidecar-Ressourcen -- Die Funktionalität von Envoy -- Kernkonstrukte -- Zertifikate und Schutz des Datenverkehrs -- Kapitel 6: Sicherheit und Identität -- Zugriffssteuerung -- Authentifizierung -- Autorisierung -- Identität -- SPIFFE -- Architektur der Schlüsselverwaltung -- Citadel -- Knotenagenten -- Envoy -- Pilot -- mTLS -- Die Richtlinien für Authentifizierung/Autorisierung von Istio konfigurieren -- Authentifizierungsrichtlinie: mTLS konfigurieren -- Autorisierungsrichtlinie: Konfigurieren, wer mit wem sprechen kann -- Kapitel 7: Pilot -- Pilot konfigurieren -- Mesh-Konfiguration -- Netzwerkkonfiguration -- Diensterkennung -- Konfiguration übermitteln -- Debugging und Fehlersuche in Pilot -- istioctl -- Fehlerbehebung in Pilot -- Eine Konfiguration verfolgen -- Listener -- Routen -- Cluster -- Kapitel 8: Verwaltung des Datenverkehrs -- Der Datenverkehrsfluss in Istio -- Die Netzwerk-APIs von Istio -- ServiceEntry -- DestinationRule -- VirtualService -- Gateway -- Lenkung und Routing des Datenverkehrs -- Resilienz -- Strategie zur Lastverteilung -- Ausreißer erkennen -- Wiederholungen -- Time-outs -- Fault Injection -- Ingress und Egress -- Eingehender Datenverkehr - Ingress…”
Publicado 2020
Libro electrónico -
4por Sacido, JorgeTabla de Contenidos: “…The short story and the difficulty of modernism / Allegory and fragmentation in Wyndham Lewis's The wild body and Djuna Barnes's A book / Subject vanishes: modernist contradiction, postmodernist effacement and the short story genre. Man in a sidecar: madness, totality and narrative drive the short story / Stories, spectres, screens / The writing machine: J.G. …”
Publicado 2012
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
5por McFarland, Scholle“…Scholle introduces you to new capabilities such as Voice Control, Continuity Sketch (for importing a drawing from your iPad or iPhone straight into a Mac document), Sidecar (for using an iPad as an external display), better tools for managing your Apple ID and iCloud Family Sharing, and a variety of updated built-in apps. …”
Publicado 2019
Libro electrónico -
6Publicado 2022Tabla de Contenidos: “…The BookInfo Application -- Setting up Istio -- Deploying the Application -- Sidecar Magic -- Start the Application Services -- Apply Default Destination Rules -- Accessing the Application -- Summary -- Index…”
Libro electrónico -
7Publicado 2024Tabla de Contenidos: “…-- Default collectors -- conntrack -- cpu -- diskstats -- filesystem -- loadavg -- meminfo -- netdev -- pressure -- Others -- The textfile collector -- Troubleshooting the Node Exporter -- Summary -- Further reading -- Part 3: Extending Prometheus -- Chapter 9: Utilizing Remote Storage Systems with Prometheus -- Technical requirements -- Understanding remote write and remote read -- Remote read -- Remote write -- Using VictoriaMetrics -- Deployment methods -- Deploying to Kubernetes -- Using Grafana Mimir -- Comparing to VictoriaMetrics -- Deploying to Kubernetes -- Summary -- Further reading -- Chapter 10: Extending Prometheus Globally with Thanos -- Technical requirements -- Overview of Thanos -- Why use Thanos? -- Thanos Sidecar…”
Libro electrónico -
8Publicado 2018Tabla de Contenidos: “…Intro -- Title -- Copyright and Credits -- Contributor -- Packt Upsell -- Table of Contents -- Preface -- Kubernetes Design Patterns -- Software Design Patterns -- Uses of Software Design Patterns -- Classification of Software Design Patterns -- Kubernetes Design Patterns -- Structural Patterns -- Sidecar Pattern -- Activity: Running a Web Server with Synchronization -- Initialization Pattern -- Activity: Running a Web Server after Content Preparation -- Behavioral Patterns -- Job Pattern -- Scheduled Job Pattern -- Daemon Service Pattern -- Singleton Service Pattern -- Introspective Pattern -- Activity: Injecting Data into Applications -- Deployment Strategies -- Recreate Strategy -- Deploying the Application Using the Recreate Strategy -- Rolling Update Strategy -- Deploying an Application Using the Rolling Update Strategy -- Blue/Green Strategy -- Deploying an Application Using the Blue/Green Strategy -- A/B Testing Strategy -- Deployment Strategies Summary -- Summary -- Kubernetes Client Libraries -- Accessing the Kubernetes API -- Kubernetes API Style -- Getting a JSON Response from the Kubernetes API -- Accessing the Kubernetes API -- Connecting to the Kubernetes API and Creating Namespaces -- Accessing the Kubernetes API inside a Cluster -- To Connect to the Kubernetes API inside a Cluster -- Official Client Libraries -- Go Client Library -- Repository -- Documentation -- Installation -- Creating Configuration -- Creating Clientset -- Making API Calls -- To Use the Kubernetes Go Client outside the Cluster -- Activity: Using the Kubernetes Go Client inside the Cluster -- Python Client Library -- Repository -- Installation -- Client Usage -- Packaging -- Using the Kubernetes Python Client inside the Cluster -- Other Official Client Libraries -- Community-Maintained Client Libraries -- Summary -- Kubernetes Extensions…”
Libro electrónico -
9por Grover, VikasTabla de Contenidos: “…Automating delivery and deployment with GitOps -- Push versus pull deployments -- Enabling GitOps using Argo CD -- Best practices for GitOps -- Summary -- Further reading -- Chapter 4: Communicating across Kubernetes -- Pod design patterns -- The sidecar pattern -- The adapter pattern -- The ambassador pattern -- Container-to-container communication -- Pod-to-pod communication -- Pods with multiple interfaces -- Pod-to-service communication -- External-to-service communication -- How to discover pods and services -- How to publish services -- How to stitch multiple K8s clusters…”
Publicado 2023
Libro electrónico -
10Publicado 2018Tabla de Contenidos: “…. -- Extending your services with sidecars -- How to do it... -- Using API Gateways for routing requests to services -- Design considerations -- How to do it... -- Stopping cascading failures with Hystrix -- How to do it... -- Rate limiting -- How to do it... -- Using service mesh for shared concerns -- How to do it... -- Chapter 3: Inter-service Communication -- Introduction -- Service-to-service communication -- How to do it... -- Asynchronous requests -- How to do it... -- Service discovery -- How to do it... -- Registering with the service registry -- Finding services -- Server-side load balancing -- How to do it... -- Client-side load balancing -- How to do it... -- Building event-driven microservices -- How to do it... -- Message producer -- Message consumer -- Evolving APIs -- How to do it... -- Chapter 4: Client Patterns -- Introduction -- Modeling concurrency with dependent futures -- How to do it... -- Backend for frontend -- How to do it... -- Consistent RPC with HTTP and JSON -- How to do it... -- Using Thrift -- How to do it…”
Libro electrónico -
11Publicado 2024Tabla de Contenidos: “…Secrets extern verwalten -- Secrets konsumieren -- Secrets als native Kubernetes-Secrets konsumieren -- Secrets über Sidecar-Container injizieren -- Secrets über ein CSI-Volume konsumieren -- Wir erweitern die Beispielimplementierung -- Ziele -- Datenfluss von HashiCorp Vault über ESO in denCluster -- Schritt 1: Das Config-Repo bootstrappen -- Schritt 2: Anwendungen in neuen Namespacedeployen -- Schritt 3: ESO mit HashiCorp Vault verbinden -- Schritt 4: Beispiel-Secret erstellen -- Schritt 5: Das Secret integrieren -- Schritt 6: Das Secret ändern -- Fazit -- Repositories und Ordner strukturieren…”
Libro electrónico -
12Publicado 2022Tabla de Contenidos: “…Target Architecture -- Stateful Service -- Distributed Service -- Target Architecture Diagram -- Examples -- Project Structure -- Service Bus Configuration -- Coordinator -- Summary -- Chapter 4: The Social Media Problem -- Background -- Requirements -- Options -- Manual Process -- CQRS -- Benefits -- Drawbacks -- Consistency Models -- Strong or Strict Consistency -- Sequential or Causal Consistency -- Weak or Eventual Consistency -- Target Architecture -- Examples -- Schema Creation -- Updating the Database -- Update a Local Version of the Database Directly -- Call a Web Service to Update the Database -- Checking the Data -- Web Service -- Accessing MongoDB -- The Client -- Process Data Service -- Summary -- Chapter 5: The Admin Application Problem -- Background -- Requirements -- Options -- Manual Process -- SOLID -- Single Responsibility -- Testability -- Code Churn -- Software Resilience -- A Better Way -- Open-Closed -- Inheritance -- Polymorphism -- Liskov Substitution -- Interface Segregation Principle -- Dependency Inversion Principle -- Inversion of Control -- Methods of Extending Software -- Hooks -- Messages -- Mediator -- Injection -- Security -- Target Architecture -- Examples -- Basic Functionality -- Extensibility -- Custom Functionality -- Summary -- Chapter 6: The Travel Rep Problem -- Background -- Requirements -- Options -- Manual Process -- Caching -- Sidecar Pattern -- Ambassador Pattern -- Microservices and Containers -- Target Architecture -- Containers -- Examples -- Project Structure -- TravelRep.CentralApi -- Chaos Monkey -- TravelRep.App -- TravelRep.Ambassador -- Hangfire -- Enqueue and Schedule -- Persistence and Configuration -- Hangfire Dashboard -- Containers -- Docker Compose -- Displaying a UI -- Contacting the Host Machine from a Container -- host.docker.internal -- Configuring SSL/TLS -- mkcert…”
Libro electrónico -
13Publicado 2023Tabla de Contenidos: “…-- Exploring alternatives to Istio -- Kuma -- Linkerd -- Consul -- AWS App Mesh -- OpenShift Service Mesh -- F5 NGINX Service Mesh -- Preparing your workstation for Istio installation -- System specifications -- Installing minikube and the Kubernetes command-line tool -- Installing Istio -- Enabling Istio for a sample application -- Sidecar injection -- Istio gateways -- Observability tools -- Kiali -- Jaeger -- Prometheus -- Grafana -- Istio architecture -- Summary -- Chapter 3: Understanding Istio Control -- Part 2: Istio in Practice -- Chapter 4: Managing Application Traffic -- Technical requirements -- Setting up the environment -- Creating an EKS cluster -- Setting up kubeconfig and kubectl -- Deploying the Sockshop application -- Managing Ingress traffic using the Kubernetes Ingress resource -- Managing Ingress using the Istio Gateway -- Creating the gateway -- Creating virtual services -- Traffic routing and canary release -- Traffic mirroring -- Routing traffic to services outside of the cluster -- Exposing Ingress over HTTPS -- Enabling HTTP redirection to HTTPS -- Enabling HTTPS for multiple hosts -- Enabling HTTPS for CNAME and wildcard records -- Managing Egress traffic using Istio -- Summary -- Chapter 5: Managing Application Resiliency -- Application resiliency using fault injection -- What is HTTP delay?…”
Libro electrónico -
14Publicado 2021Tabla de Contenidos: “…The network is homogeneous -- CAP theorem and eventual consistency -- Sagas and compensating transactions -- Choreography-based sagas -- Orchestration-based sagas -- Making your system fault tolerant and available -- Calculating your system's availability -- Building fault-tolerant systems -- Redundancy -- Leader election -- Consensus -- Replication -- Master-slave replication -- Multi-master replication -- Queue-based load leveling -- Back pressure -- Detecting faults -- Sidecar design pattern -- Heartbeat mechanism -- Leaky bucket counter -- Minimizing the impact of faults -- Retrying the call -- Avoiding cascading failures -- Circuit breaker -- Bulkhead -- Geodes -- Integrating your system -- Pipes and filters pattern -- Competing consumers -- Transitioning from legacy systems -- Anti-corruption layer -- Strangler pattern -- Achieving performance at scale -- CQRS and event sourcing -- Command-query responsibility segregation -- Command-query separation -- Event sourcing -- Caching -- Updating caches -- Write-through approach -- Write-behind approach -- Cache-aside -- Deploying your system -- The sidecar pattern -- Deploying a service with tracing and a reverse proxy using Envoy -- Zero-downtime deployments -- Blue-green deployments -- Canary releases -- External configuration store -- Managing your APIs -- API gateways -- Summary -- Questions -- Further reading -- Chapter 5: Leveraging C++ Language Features -- Technical requirements -- Designing great APIs -- Leveraging RAII -- Specifying the interfaces of containers in C++ -- Using pointers in interfaces -- Specifying preconditions and postconditions -- Leveraging inline namespaces -- Leveraging std::optional -- Optional function parameters -- Optional function return values -- Optional class members -- Writing declarative code -- Showcasing a featured items gallery -- Introducing standard ranges…”
Libro electrónico -
15Publicado 2024Tabla de Contenidos: “…-- Identifying a Role -- Roles versus ClusterRoles -- Negative Roles -- Aggregated ClusterRoles -- RoleBindings and ClusterRoleBindings -- Combining ClusterRoles and RoleBindings -- Mapping enterprise identities to Kubernetes to authorize access to resources -- Implementing namespace multi-tenancy -- Kubernetes auditing -- Creating an audit policy -- Enabling auditing on a cluster -- Using audit2rbac to debug policies -- Summary -- Questions -- Answers -- Chapter 8: Managing Secrets -- Technical Requirements -- Getting Help -- Examining the difference between Secrets and Configuration Data -- Managing Secrets in an Enterprise -- Threats to Secrets at Rest -- Threats to Secrets in Transit -- Protecting Secrets in Your Applications -- Understanding Secrets Managers -- Storing Secrets as Secret Objects -- Sealed Secrets -- External Secrets Managers -- Using a Hybrid of External Secrets Management and Secret Objects -- Integrating Secrets into Your Deployments -- Volume Mounts -- Using Kubernetes Secrets -- Using Vault's Sidecar Injector -- Environment Variables -- Using Kubernetes Secrets -- Using the Vault Sidecar -- Using the Kubernetes Secrets API -- Using the Vault API -- Summary -- Questions -- Answers -- Chapter 9: Building Multitenant Clusters with vClusters -- Technical requirements -- Getting Help -- The Benefits and Challenges of Multitenancy -- Exploring the Benefits of Multitenancy -- The Challenges of Multitenant Kubernetes -- Using vClusters for Tenants -- Deploying vClusters -- Securely Accessing vClusters -- Accessing External Services from a vCluster -- Creating and Operating High-Availability vClusters -- Understanding vCluster High Availability -- Upgrading vClusters -- Building a Multitenant Cluster with Self Service -- Analyzing Requirements -- Designing the Multitenant Platform…”
Libro electrónico -
16Publicado 2018Tabla de Contenidos: “…-- What Kubernetes is not -- Understanding container orchestration -- Physical machines, virtual machines, and containers -- The benefits of containers -- Containers in the cloud -- Cattle versus pets -- Kubernetes concepts -- Cluster -- Node -- Master -- Pod -- Label -- Annotations -- Label selectors -- Replication controllers and replica sets -- Services -- Volume -- StatefulSet -- Secrets -- Names -- Namespaces -- Diving into Kubernetes architecture in-depth -- Distributed systems design patterns -- Sidecar pattern -- Ambassador pattern -- Adapter pattern -- Multinode patterns -- The Kubernetes APIs -- Resource categories -- Workloads API -- Discovery and load balancing -- Config and storage -- Metadata -- Cluster -- Kubernetes components -- Master components -- API server -- Etcd -- Kube controller manager -- Cloud controller manager -- Kube-scheduler -- DNS -- Node components -- Proxy -- Kubelet -- Kubernetes runtimes -- The Container Runtime Interface (CRI) -- Docker -- Rkt -- App container -- Cri-O -- Rktnetes -- Is rkt ready for use in production? …”
Libro electrónico -
17Publicado 2022Tabla de Contenidos: “…Using the Calibration panel -- Working with Filmstrips -- Working with Profiles -- Looking at the Adobe Camera Raw profiles -- Managing profiles -- Creating a Favorites list -- Opening Non-Raw Images in the Camera Raw Editor -- Changing Image Defaults -- Working with XML Files and Preferences -- Changing program defaults -- Using Save Options -- Using sidecar files -- Chapter 8 Making and Modifying Selections -- Defining Selections -- Creating Rectangular and Elliptical Selections -- Perfecting squares and circles with Shift and Alt (Option on the Mac) -- Applying Marquee options -- Making Freeform Selections with the Lasso Tools -- Selecting with the Lasso tool -- Getting straight with the Polygonal Lasso tool -- Snapping with the Magnetic Lasso tool -- Working Wizardry with the Magic Wand -- Talking about Tolerance -- Wielding the Wand to select -- Modifying Your Selections -- Adding to, subtracting from, and intersecting a selection -- Avoiding key collisions -- Painting with the Selection Brush -- Painting with the Quick Selection Tool -- Selecting with the Auto Selection Tool -- Selecting Your Subject -- Fine-Tuning with the Refine Selection Brush -- Working with the Cookie Cutter Tool -- Eliminating with the Eraser Tools -- The Eraser tool -- The Background Eraser tool -- The Magic Eraser tool -- Using the Select Menu -- Selecting all or nothing -- Reselecting a selection -- Inversing a selection -- Feathering a selection -- Refining the edges of a selection -- Using the Modify commands -- Applying the Grow and Similar commands -- Saving and loading selections -- Chapter 9 Working with Layers -- Getting to Know Layers -- Converting a background to a layer -- Anatomy of the Layers panel -- Using the Layer and Select menus -- Working with Different Layer Types -- Image layers -- Adjustment layers -- Fill layers -- Shape layers -- Type layers…”
Libro electrónico -
18por Obermeier, BarbaraTabla de Contenidos: “…Using the Basic panel -- Sharpening and reducing noise -- Sharpening images -- Adjusting noise -- Using the Calibration panel -- Working with Filmstrips -- Working with Profiles -- Looking at the Adobe Camera Raw profiles -- Managing profiles -- Creating a Favorites list -- Opening Non-Raw Images in the Camera Raw Editor -- Changing Image Defaults -- Working with XML Files and Preferences -- Changing program defaults -- Using Save Options -- Using sidecar files -- Chapter 8 Making and Modifying Selections -- Defining Selections -- Creating Rectangular and Elliptical Selections -- Perfecting squares and circles with Shift and Alt (Option on the Mac) -- Applying Marquee options -- Making Freeform Selections with the Lasso Tools -- Selecting with the Lasso tool -- Getting straight with the Polygonal Lasso tool -- Snapping with the Magnetic Lasso tool -- Working Wizardry with the Magic Wand -- Talking about Tolerance -- Wielding the Wand to select -- Modifying Your Selections -- Adding to, subtracting from, and intersecting a selection -- Avoiding key collisions -- Painting with the Selection Brush -- Painting with the Quick Selection Tool -- Selecting with the Auto Selection Tool -- Selecting Your Subject, Background, or Sky with One-Click Selecting -- Fine-Tuning with the Refine Selection Brush -- Working with the Cookie Cutter Tool -- Eliminating with the Eraser Tools -- The Eraser tool -- The Background Eraser tool -- The Magic Eraser tool -- Using the Select Menu -- Selecting all or nothing -- Reselecting a selection -- Inversing a selection -- Feathering a selection -- Refining the edges of a selection -- Using the Modify commands -- Applying the Grow and Similar commands -- Saving and loading selections -- Chapter 9 Working with Layers -- Getting to Know Layers -- Converting a background to a layer -- Anatomy of the Layers panel…”
Publicado 2023
Libro electrónico -
19Publicado 2023Tabla de Contenidos: “…DaemonSets -- Jobs -- CronJobs -- Ensuring resilience and high availability with Kubernetes resources -- Understanding advanced Pod application patterns -- Init containers -- Sidecar containers -- Ambassador containers -- Adaptor containers -- Verifying application health -- Understanding the execution of probes -- Termination of Pods -- Container life cycle hooks -- Resource management and scalability -- Horizontal Pod autoscaling -- Improving application security with Pods -- Security contexts -- Security best practices -- Labs -- Summary -- Chapter 10: Leveraging Application Data Management in Kubernetes -- Technical requirements -- Understanding the data within your application -- Applying configurations using ConfigMaps -- Using the downward API to inject configuration data -- Managing sensitive data using Secret resources -- Managing stateless and stateful data -- Using volumes for storing data -- Enhancing storage management in Kubernetes with PV resources -- Provisioning and decommissioning storage -- Labs -- Summary -- Chapter 11: Publishing Applications -- Technical requirements -- Understanding Kubernetes features for publishing applications cluster-wide -- Proxying and forwarding applications for debugging -- Kubernetes client proxy feature -- Kubernetes client port-forward feature -- Using the host network namespace for publishing applications -- Using the hostNetwork key -- Using hostPort -- Publishing applications with Kubernetes' NodePort feature -- Providing access to your Services with LoadBalancer Services -- Understanding Ingress Controllers -- Deploying an Ingress Controller -- Ingress resources -- Improving our applications' security -- Network policies -- Service mesh -- Labs -- Improving application access by deploying your own Ingress Controller…”
Libro electrónico -
20Publicado 2022Tabla de Contenidos: “…-- Anti-corruption Pattern -- Cloud Native Runtime Pattern for Microservices -- Fail Fast -- Retry -- Sidecar -- Init Containers -- Saga Pattern -- Event Driven and Choreography -- Orchestrator-Based Saga Pattern -- Summary -- Part II: Elements of Cloud Native Architecture and Design -- Chapter 5: Microservices Architecture and Design -- Evolution of Microservices -- What Is a Microservices Architecture? …”
Libro electrónico