舉報

會員
Hands-On Microservices:Monitoring and Testing
Microservicesarethelatest"right"wayofdevelopingwebapplications.Microservicesarchitecturehasbeengainingmomentumoverthepastfewyears,butonceyou'vestarteddownthemicroservicespath,youneedtotestandoptimizetheservices.Thisbookfocusesonexploringvarioustesting,monitoring,andoptimizationtechniquesformicroservices.Thebookstartswiththeevolutionofsoftwarearchitecturestyle,frommonolithictovirtualized,tomicroservicesarchitecture.Thenyouwillexploremethodstodeploymicroservicesandvariousimplementationpatterns.Withthehelpofareal-worldexample,youwillunderstandhowexternalAPIshelpproductdeveloperstofocusoncorecompetencies.Afterthat,youwilllearntestingtechniques,suchasUnitTesting,IntegrationTesting,FunctionalTesting,andLoadTesting.Next,youwillexploreperformancetestingtools,suchasJMeter,andGatling.Then,wedeepdiveintomonitoringtechniquesandlearnperformancebenchmarkingofthevariousarchitecturalcomponents.Forthis,youwillexploremonitoringtoolssuchasAppdynamics,Dynatrace,AWSCloudWatch,andNagios.Finally,youwilllearntoidentify,address,andreportvariousperformanceissuesrelatedtomicroservices.
目錄(151章)
倒序
- coverpage
- Title Page
- Dedication
- Packt Upsell
- Why subscribe?
- Packt.com
- Contributors
- About the author
- About the reviewer
- Packt is searching for authors like you
- Preface
- Who this book is for
- What this book covers
- To get the most out of this book
- Download the example code files
- Code in action
- Conventions used
- Get in touch
- Reviews
- Software Architecture Patterns
- The monolithic architecture pattern
- Monolithic application example
- Benefits of monolithic application architecture
- When to use monolithic architecture
- Limitations of monolithic application architecture
- Software development processes with monolithic architecture
- Microservice architecture pattern
- Microservice application example
- Benefits of microservice application architecture
- Disadvantages of the microservice architecture pattern
- When to use microservice architecture
- Service-oriented architecture (SOA)
- SOA versus microservice architecture
- Summary
- Anatomy of Microservice Decomposition Services
- Anatomy of a microservice
- Context boundaries
- Decomposition based on business capability
- Decomposition on the basis of domain
- Microservice chassis to handle cross-cutting concerns
- Building microservices
- SOAP versus RESTful microservices
- Summary
- Microservices Deployment Patterns
- Microservices deployment
- Multiple instances of microservices per host
- A single instance of a microservice per host
- Benefits
- Drawbacks
- A single instance of a microservice per VM
- Benefits
- Drawbacks
- A single instance of microservice per container
- Benefits
- Drawbacks
- Service deployment platforms
- Serverless deployment
- Summary
- Inter-Service Communication
- Approaches to service communication
- Synchronous communication
- REST
- Benefits of REST
- Google Remote Procedure Calls
- Apache Thrift
- Asynchronous communication
- Messaging
- Benefits of messaging
- Drawbacks of messaging
- Transactional messaging
- One-to-one service communication
- One-to-many service communication
- Event-based communication
- The Command Query Responsibility Segregation pattern
- The Event Sourcing Model pattern
- Benefits
- The Eventual Consistency pattern
- Domain-specific protocol
- Summary
- Service Registry and Discovery
- Technical Requirements
- The need for service discovery in microservice architecture
- Service discovery patterns
- The client-side discovery pattern
- The server-side discovery pattern
- Microservice registry and discovery with Eureka
- Implementing Service Registry with Eureka
- Implementing the Eureka Discovery server
- Summary
- External API Gateway
- Technical Requirements
- Introducing an API gateway
- Client-to-microservice communication
- Drawbacks
- Using an API gateway
- Benefits
- Drawbacks
- Building an API gateway
- API gateway performance and scalability
- Building an API gateway using a reactive programming model
- API gateway and service invocation mechanism support
- API gateway and service discovery
- Handling partial failures
- Building an API gateway using Spring Cloud's Netflix Zuul proxy
- MuleSoft
- Summary
- Testing of Microservices
- Technical Requirements
- Testing strategies for microservices
- The testing pyramid strategy
- The testing honeycomb strategy
- Unit testing
- Unit testing – an example
- Integration testing
- Database integration testing – an example
- REST API integration – an example
- Component testing
- Contract testing
- End-to-end testing
- UI/functional testing
- Summary
- Performance Testing of Microservices
- Technical Requirements
- JMeter
- Installing JMeter
- Performance testing microservices with JMeter
- Creating a performance test plan
- Gatling
- Installing Gatling
- Performance testing with Gatling
- Maven plugin configuration
- Gradle plugin configuration
- Running a Gatling test suite using the Gatling GUI
- The ReadyAPI
- Summary
- Performance Monitoring of Microservices
- Identifying performance counters to test microservices
- Performance monitoring tools
- AppDynamics
- Dynatrace
- AWS CloudWatch
- Nagios
- New Relic
- Datadog (for Docker performance monitoring)
- Component-level monitoring
- Domain-specific monitoring
- Dashboards and identifying issues by going through logs
- Grafana
- Summary
- Other Books You May Enjoy
- Leave a review - let other readers know what you think 更新時間:2021-06-24 18:24:50
推薦閱讀
- Web安全防護指南:基礎篇
- 物聯網網絡安全及應用
- Twilio Cookbook
- Django 2 by Example
- 計算機網絡工程實用教程(第2版)
- 區塊鏈輕松上手:原理、源碼、搭建與應用
- Learning Swift(Second Edition)
- 網絡安全應急響應技術實戰
- Microsoft Dynamics CRM 2011 Applications(MB2-868) Certification Guide
- C/C++串口通信:典型應用實例編程實踐
- The Kubernetes Workshop
- 網絡設計與應用(第2版)
- Hands-On Bitcoin Programming with Python
- 5G時代的大數據技術架構和關鍵技術詳解
- 一本書讀懂TCP/IP
- 中國互聯網發展報告2021
- 數字王國里的虛擬人:技術、商業與法律解讀
- 智能物聯網:區塊鏈與霧計算融合應用詳解
- 物聯網技術與實踐
- INSTANT Social Media Marketing with HootSuite
- 無線傳感器網絡定位方法及應用
- 現場總線與工業以太網及其應用技術(第2版)
- CCNP TSHOOT(642-832)學習指南
- iOS 12 Programming for Beginners
- Hands-On Full Stack Web Development with Angular 6 and Laravel 5
- Building Applications with Spring 5 and Kotlin
- Advanced Penetration Testing for Highly-Secured Environments:The Ultimate Security Guide
- 跬步千里:通信監管的探索歷程
- 網絡信息安全實訓
- 物聯網概論 第2版