Cargando…

Service mesh : a new pattern, not a new technology /

"In a service mesh, a proxy is deployed locally with each service in an application. Each service only communicates directly with the proxy on its host, and proxies communicate with each other to pass traffic between services over the network. Marco Palladino (Kong) explores the service mesh pa...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: O'Reilly Software Architecture Conference
Formato: Electrónico Congresos, conferencias Video
Idioma:Inglés
Publicado: [Place of publication not identified] : O'Reilly Media, [2019]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a2200000 i 4500
001 OR_on1141405071
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cna||||||||
007 vz czazuu
008 200221s2019 xx 051 o vleng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d TOH  |d OCLCO  |d OCLCQ  |d OCLCO 
035 |a (OCoLC)1141405071 
037 |a CL0501000099  |b Safari Books Online 
050 4 |a QA76.754 
049 |a UAMI 
100 1 |a Palladino, Marco,  |e on-screen presenter. 
245 1 0 |a Service mesh :  |b a new pattern, not a new technology /  |c Marco Palladino. 
264 1 |a [Place of publication not identified] :  |b O'Reilly Media,  |c [2019] 
264 4 |c ©2019 
300 |a 1 online resource (1 streaming video file (51 min.)) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
337 |a video  |b v  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
511 0 |a Presenter, Marco Palladino. 
500 |a Title from title screen (viewed February 21, 2020). 
520 |a "In a service mesh, a proxy is deployed locally with each service in an application. Each service only communicates directly with the proxy on its host, and proxies communicate with each other to pass traffic between services over the network. Marco Palladino (Kong) explores the service mesh pattern and discusses the problems the pattern is designed to solve, including security (proxies can encrypt all network traffic without services being aware of it), observability (proxies collect metrics, logs, and tracing data from network traffic), reliability (proxies can enforce rate limiting, retries, and handle network drops), composability (swap or reuse services with nothing but a proxy configuration change), standardization (east-west traffic can all be secured in the same way), and efficient development (service developers can focus on business logic instead of interservice communication). Finally, he explains the requirements for any technology that supports this pattern: services can be any size, in any language, or run on any infrastructure or a mix; proxies need to be lightweight, since an instance will be deployed with each service; proxies should be flexible and composable to provide security, reliability, and observability benefits; proxies should be simple to deploy and replace in containerized environments; and proxies should be self-reliant and resilient to network slowdowns and failures. This session was recorded at the 2019 O'Reilly Software Architecture Conference in San Jose."--Resource description page 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Software architecture. 
650 0 |a Computer networks  |x Management. 
650 6 |a Architecture logicielle. 
650 6 |a Réseaux d'ordinateurs  |x Gestion. 
650 7 |a Computer networks  |x Management.  |2 fast  |0 (OCoLC)fst00872323 
650 7 |a Software architecture.  |2 fast  |0 (OCoLC)fst01200416 
655 4 |a Electronic videos. 
710 2 |a O'Reilly (Firm),  |e publisher. 
711 2 |a O'Reilly Software Architecture Conference  |d (2019 :  |c San Jose, Calif.)  |j issuing body. 
856 4 0 |u https://learning.oreilly.com/videos/~/0636920337683/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP