|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1046682414 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
180731s2018 caua ob 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d MERER
|d STF
|d OCLCQ
|d TOH
|d OCLCF
|d CEF
|d G3B
|d S9I
|d UAB
|d CZL
|d OCLCQ
|d OCLCO
|d OCLCQ
|
020 |
|
|
|a 1491988762
|
020 |
|
|
|a 9781491988763
|
020 |
|
|
|z 9781491988763
|
029 |
1 |
|
|a GBVCP
|b 1029873186
|
035 |
|
|
|a (OCoLC)1046682414
|
037 |
|
|
|a CL0500000982
|b Safari Books Online
|
050 |
|
4 |
|a QA76.76.A65
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Posta, Christian,
|e author.
|
245 |
1 |
0 |
|a Introducing Istio service mesh for microservices :
|b build and deploy resilient, fault-tolerant cloud-native applications /
|c Christian Posta and Burr Sutter.
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a Sebastopol, CA :
|b O'Reilly Media,
|c [2018]
|
264 |
|
4 |
|c ©2018
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed July 26, 2018).
|
504 |
|
|
|a Includes bibliographical references.
|
520 |
|
|
|a Microservices fundamentally change the way you design enterprise software. By adding network dependencies to your application logic, you invite in a host of potential hazards that grow proportionally with the number of connections you make. With this practical ebook, DevOps teams will learn how to use the Istio service mesh to connect, manage, and secure microservices in order to create powerful cloud-native applications. Christian Posta and Burr Sutter from Red Hat introduce you to several key microservices capabilities that Istio provides on top of Kubernetes and OpenShift. You'll learn how your application can offload service discovery, load balancing, resilience, observability, and security to Istio so you can focus on differentiating business logic. You'll dive into Istio with detailed examples of: Traffic control: Examine Istio patterns including smarter canaries and dark launches Service resiliency: Discover how Istio provides load balancing, circuit breaking, and pool ejection Chaos testing: Test your system's ability to withstand turbulent conditions through fault injection Observability: Use tracing and metrics to learn the relationships between individual system components Security: Explore Istio's blacklist and whitelist security concepts.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Web applications.
|
650 |
|
0 |
|a Application software
|x Development.
|
650 |
|
0 |
|a Cloud computing.
|
650 |
|
0 |
|a Electronic data processing
|x Distributed processing.
|
650 |
|
6 |
|a Applications Web.
|
650 |
|
6 |
|a Logiciels d'application
|x Développement.
|
650 |
|
6 |
|a Infonuagique.
|
650 |
|
6 |
|a Traitement réparti.
|
650 |
|
7 |
|a Application software
|x Development.
|2 fast
|0 (OCoLC)fst00811707
|
650 |
|
7 |
|a Cloud computing.
|2 fast
|0 (OCoLC)fst01745899
|
650 |
|
7 |
|a Electronic data processing
|x Distributed processing.
|2 fast
|0 (OCoLC)fst00906987
|
650 |
|
7 |
|a Web applications.
|2 fast
|0 (OCoLC)fst01895855
|
700 |
1 |
|
|a Sutter, Burr,
|e author.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781491988770/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|