首頁 > 計(jì)算機(jī)網(wǎng)絡(luò) > 操作系統(tǒng) > Implementing Cloud Design Patterns for AWS(Second Edition)
舉報(bào)

會(huì)員
Implementing Cloud Design Patterns for AWS(Second Edition)
Whetheryou'rejustgettingyourfeetwetincloudinfrastructureoralreadycreatingcomplexsystems,thisbookwillguideyouthroughusingthepatternstofityoursystemneeds.Startingwithpatternsthatcoverbasicprocessessuchassourcecontrolandinfrastructure-as-code,thebookgoesontointroducecloudsecuritypractices.You'llthencoverpatternsofavailabilityandscalabilityandgetacquaintedwiththeephemeralnatureofcloudenvironments.You'llalsoexploreadvancedDevOpspatternsinoperationsandmaintenance,beforefocusingonvirtualizationpatternssuchascontainerizationandserverlesscomputing.Inthefinallegofyourjourney,thisbookwilldelveintodatapersistenceandvisualizationpatterns.You'llgettogripswitharchitecturesforprocessingstaticanddynamicdata,aswellaspracticesformanagingstreamingdata.Bytheendofthisbook,youwillbeabletodesignapplicationsthataretolerantofunderlyinghardwarefailures,resilientagainstanunexpectedinfluxofdata,andeasytomanageandreplicate.
最新章節(jié)
- Leave a review - let other readers know what you think
- Other Books You May Enjoy
- Further reading
- Summary
- Summarized metrics
- Logging
品牌:中圖公司
上架時(shí)間:2021-06-24 12:23:16
出版社:Packt Publishing
本書數(shù)字版權(quán)由中圖公司提供,并由其授權(quán)上海閱文信息技術(shù)有限公司制作發(fā)行
- Leave a review - let other readers know what you think 更新時(shí)間:2021-06-24 15:12:47
- Other Books You May Enjoy
- Further reading
- Summary
- Summarized metrics
- Logging
- Redshift
- ElastiCache
- DynamoDB
- DocumentDB
- Amazon Simple Queue Service (SQS)
- Athena
- Polyglot persistence
- Different patterns
- Everything is a nail
- Lock-in
- Tight coupling
- Best practices
- Trash
- Analysis paralysis
- Building processes
- Anti-Patterns - Bypassing Inferior Options
- Further reading
- Exercises
- Summary
- Concepts
- Events
- How the alarm state is evaluated when data is missing
- Alarm states
- Alarms
- X-Ray
- Tracing
- Changing the time range or time zone format
- Adding a dashboard to your favorites list
- Linking and unlinking graphs
- Monitoring resources in multiple regions
- Adding or removing an alarm
- Adding or removing a text widget
- Graphing metrics manually on a CloudWatch dashboard
- Editing a graph
- Moving or resizing a graph
- Adding or removing a graph
- Creating a dashboard
- AWS dashboards
- Capacity management
- Performance optimization
- Using metric math
- Publishing custom metrics
- Graphing metrics
- Getting statistics for a metric
- Searching for available metrics
- Viewing available metrics
- Creating metric alarms
- CloudWatch
- Metrics
- Logging
- Analyzing your products
- Technical requirements
- Observability - Understanding How Your Products Are Behaving
- Further reading
- Exercises
- Summary
- Pattern recognition
- Image recognition
- Interpolate missing data (sparsity)
- Classification
- Trees
- Feature or dimensionality reduction
- Clustering
- Forecasting
- Prediction
- Anomaly detection
- AI
- Amazon Comprehend – NLP
- Jupyter Notebook
- Amazon SageMaker
- Machine learning
- CloudTrail
- Kinesis
- Elastic Transcoder
- Audio/video (mp4 to mp3)
- Transforms
- Athena (querying S3)
- Event stream processing
- ElastiCache
- Caching
- Batching
- MSK
- Queuing
- Data Processing - Handling Your Data Transformation
- Further reading
- Summary
- Timestream
- Time series
- Neptune
- Graph databases
- EMR
- S3 – binary files
- Elemental MediaStore—dedicated services for video
- CloudTrail
- ElasticSearch
- Text
- Polyglot persistence
- DynamoDB
- Unstructured data
- Setting up Aurora and MySQL
- Partition tolerance
- High availability
- High consistency
- CAP Theorem
- Transactional data
- RDS
- Slowly changing data
- Sparse data
- Compressed
- Streamed
- Sizing your storage
- Access frequency—do I ever need this again? Archival for compliance
- Rate of change—static versus dynamic
- Latency
- Read versus write
- Reliability
- Dimensions
- Durability—surviving system failure
- Vertical versus horizontal scaling
- Workflow
- General considerations
- Databases - Identifying Which Type Fits Your Needs
- Section 3: Persistence Patterns
- Further reading
- Summary
- Resilience
- Scaling
- Networking
- Single points of failure
- Monoliths
- Anti-patterns that you might come across
- Version control
- Lock in
- Silos
- Practices to avoid in general
- Can't fail attitude to system uptime
- Firefighting
- Non-reproducibility
- Change control boards
- Lift and shift
- Exploring counterproductive processes
- Antipatterns - Avoiding Counterproductive Solutions
- Further reading
- Summary
- Service discovery
- Serverless
- Managed Kubernetes service
- Elastic Container Service
- Registry services
- Containers
- Technical requirements
- Application Virtualization - Using Cloud Native Patterns for Your Workloads
- Further reading
- Summary
- Local development
- Reduction
- Postmortems
- Incident response
- Disaster recovery
- Restore
- Snapshots
- Business continuity
- Embrace risk
- Reliability testing
- Fault injection
- Agreements
- Objectives
- Indicators
- Measurement
- Self-service
- User-centered design
- Balanced team
- Product mindset
- Desilofication
- Technical requirements
- Operation and Maintenance - Keeping Things Running at Peak Performance
- Exercises
- Summary
- Managing cost
- Testing your environment
- Using multiple environments
- Templates
- Facilitating self-service
- Exploring deployment strategies
- Developer productivity
- Ephemeral Environments - Sandboxes for Experiments
- Further reading
- Summary
- Testing your code
- Build servers
- Event-driven architecture
- Projects
- CodeBuild
- Source control
- Technical requirements
- Continuous Deployment - Introducing New Features with Minimal Risk
- Section 2: DevOps Patterns
- Further reading
- Summary
- Cloud environment
- Network
- Buckets
- Code and functions
- Containers
- Instance-level scanning
- Vulnerability scanning
- GuardDuty
- Flow logs
- CloudWatch events
- CloudTrail
- Logging
- Identity pools
- User pools
- Cognito
- Instance profiles
- Users
- More IAM
- Directory service
- RBAC
- CloudHSM
- Keys
- Certificates
- Credentials
- At rest
- Application
- Obscurity
- Network ACLs – subnet
- Security groups – port filtering
- VPC
- In transit
- Users
- Least privilege
- Defense in depth
- Inheritance
- Compliance
- Risk
- Governance
- Cloud specific
- Shared responsibilities
- Technical requirements
- Security - Ensuring the Integrity of Your Systems
- Further reading
- Exercises
- Summary
- Hierarchical storage management
- Placement groups
- Auto scaling
- Fault tolerance
- Health checks
- Local Traffic Management
- Availability Zones
- Global Traffic Manager
- Load balancing
- Regions
- Top-level domain
- High availability
- Technical requirements
- Availability Patterns - Understanding Your Needs
- Further reading
- Summary
- Security Token Service
- IAM
- Amazon Machine Images
- Elastic File System
- CloudFront
- Glacier
- Simple Storage Solution
- Ephemeral
- Elastic Block Storage
- Storage
- Web Application Firewall
- Shield
- Intrusion detection and prevention services
- Local traffic manager
- Application Load Balancer
- Elastic Load Balancer
- Load balancers
- Gateways
- Peering
- Routing
- Dynamic Host Configuration Protocol
- Subnets
- Virtual Private Cloud
- Global traffic manager
- DNS
- Route 53
- IPv6
- Elastic IP
- Internet Protocol
- Networking
- Functions
- Containers
- Raw
- Spot or ephemeral
- Dedicated
- Shared
- Usage
- Types
- Instances
- Compute
- CodeCommit
- Cloud9
- Code
- Technical requirements
- Core Services - Building Blocks for Your Product
- Further reading
- Summary
- Product owner
- Operations engineer
- Software engineer
- Benefits of moving to the cloud
- Software defined API driven
- Huge catalog
- Free trials
- Crazy new services
- Microservices
- Cloud continuum
- Software as a Service
- Platform as a Service
- Infrastructure as a Service
- Anything as a Service
- Utility computing
- Code
- Data
- Product
- The future
- History
- Introduction to AWS
- Introduction to Amazon Web Services
- Section 1: The Basics
- Reviews
- Get in touch
- Conventions used
- Download the example code files
- To get the most out of this book
- What this book covers
- Who this book is for
- Preface
- Packt is searching for authors like you
- About the reviewers
- About the authors
- Contributors
- Packt.com
- Why subscribe?
- About Packt
- Dedication
- Implementing Cloud Design Patterns for AWS Second Edition
- Copyright and Credits
- Title Page
- coverpage
- coverpage
- Title Page
- Copyright and Credits
- Implementing Cloud Design Patterns for AWS Second Edition
- Dedication
- About Packt
- Why subscribe?
- Packt.com
- Contributors
- About the authors
- About the reviewers
- Packt is searching for authors like you
- Preface
- Who this book is for
- What this book covers
- To get the most out of this book
- Download the example code files
- Conventions used
- Get in touch
- Reviews
- Section 1: The Basics
- Introduction to Amazon Web Services
- Introduction to AWS
- History
- The future
- Product
- Data
- Code
- Utility computing
- Anything as a Service
- Infrastructure as a Service
- Platform as a Service
- Software as a Service
- Cloud continuum
- Microservices
- Crazy new services
- Free trials
- Huge catalog
- Software defined API driven
- Benefits of moving to the cloud
- Software engineer
- Operations engineer
- Product owner
- Summary
- Further reading
- Core Services - Building Blocks for Your Product
- Technical requirements
- Code
- Cloud9
- CodeCommit
- Compute
- Instances
- Types
- Usage
- Shared
- Dedicated
- Spot or ephemeral
- Raw
- Containers
- Functions
- Networking
- Internet Protocol
- Elastic IP
- IPv6
- Route 53
- DNS
- Global traffic manager
- Virtual Private Cloud
- Subnets
- Dynamic Host Configuration Protocol
- Routing
- Peering
- Gateways
- Load balancers
- Elastic Load Balancer
- Application Load Balancer
- Local traffic manager
- Intrusion detection and prevention services
- Shield
- Web Application Firewall
- Storage
- Elastic Block Storage
- Ephemeral
- Simple Storage Solution
- Glacier
- CloudFront
- Elastic File System
- Amazon Machine Images
- IAM
- Security Token Service
- Summary
- Further reading
- Availability Patterns - Understanding Your Needs
- Technical requirements
- High availability
- Top-level domain
- Regions
- Load balancing
- Global Traffic Manager
- Availability Zones
- Local Traffic Management
- Health checks
- Fault tolerance
- Auto scaling
- Placement groups
- Hierarchical storage management
- Summary
- Exercises
- Further reading
- Security - Ensuring the Integrity of Your Systems
- Technical requirements
- Shared responsibilities
- Cloud specific
- Governance
- Risk
- Compliance
- Inheritance
- Defense in depth
- Least privilege
- Users
- In transit
- VPC
- Security groups – port filtering
- Network ACLs – subnet
- Obscurity
- Application
- At rest
- Credentials
- Certificates
- Keys
- CloudHSM
- RBAC
- Directory service
- More IAM
- Users
- Instance profiles
- Cognito
- User pools
- Identity pools
- Logging
- CloudTrail
- CloudWatch events
- Flow logs
- GuardDuty
- Vulnerability scanning
- Instance-level scanning
- Containers
- Code and functions
- Buckets
- Network
- Cloud environment
- Summary
- Further reading
- Section 2: DevOps Patterns
- Continuous Deployment - Introducing New Features with Minimal Risk
- Technical requirements
- Source control
- CodeBuild
- Projects
- Event-driven architecture
- Build servers
- Testing your code
- Summary
- Further reading
- Ephemeral Environments - Sandboxes for Experiments
- Developer productivity
- Exploring deployment strategies
- Facilitating self-service
- Templates
- Using multiple environments
- Testing your environment
- Managing cost
- Summary
- Exercises
- Operation and Maintenance - Keeping Things Running at Peak Performance
- Technical requirements
- Desilofication
- Product mindset
- Balanced team
- User-centered design
- Self-service
- Measurement
- Indicators
- Objectives
- Agreements
- Fault injection
- Reliability testing
- Embrace risk
- Business continuity
- Snapshots
- Restore
- Disaster recovery
- Incident response
- Postmortems
- Reduction
- Local development
- Summary
- Further reading
- Application Virtualization - Using Cloud Native Patterns for Your Workloads
- Technical requirements
- Containers
- Registry services
- Elastic Container Service
- Managed Kubernetes service
- Serverless
- Service discovery
- Summary
- Further reading
- Antipatterns - Avoiding Counterproductive Solutions
- Exploring counterproductive processes
- Lift and shift
- Change control boards
- Non-reproducibility
- Firefighting
- Can't fail attitude to system uptime
- Practices to avoid in general
- Silos
- Lock in
- Version control
- Anti-patterns that you might come across
- Monoliths
- Single points of failure
- Networking
- Scaling
- Resilience
- Summary
- Further reading
- Section 3: Persistence Patterns
- Databases - Identifying Which Type Fits Your Needs
- General considerations
- Workflow
- Vertical versus horizontal scaling
- Durability—surviving system failure
- Dimensions
- Reliability
- Read versus write
- Latency
- Rate of change—static versus dynamic
- Access frequency—do I ever need this again? Archival for compliance
- Sizing your storage
- Streamed
- Compressed
- Sparse data
- Slowly changing data
- RDS
- Transactional data
- CAP Theorem
- High consistency
- High availability
- Partition tolerance
- Setting up Aurora and MySQL
- Unstructured data
- DynamoDB
- Polyglot persistence
- Text
- ElasticSearch
- CloudTrail
- Elemental MediaStore—dedicated services for video
- S3 – binary files
- EMR
- Graph databases
- Neptune
- Time series
- Timestream
- Summary
- Further reading
- Data Processing - Handling Your Data Transformation
- Queuing
- MSK
- Batching
- Caching
- ElastiCache
- Event stream processing
- Athena (querying S3)
- Transforms
- Audio/video (mp4 to mp3)
- Elastic Transcoder
- Kinesis
- CloudTrail
- Machine learning
- Amazon SageMaker
- Jupyter Notebook
- Amazon Comprehend – NLP
- AI
- Anomaly detection
- Prediction
- Forecasting
- Clustering
- Feature or dimensionality reduction
- Trees
- Classification
- Interpolate missing data (sparsity)
- Image recognition
- Pattern recognition
- Summary
- Exercises
- Further reading
- Observability - Understanding How Your Products Are Behaving
- Technical requirements
- Analyzing your products
- Logging
- Metrics
- CloudWatch
- Creating metric alarms
- Viewing available metrics
- Searching for available metrics
- Getting statistics for a metric
- Graphing metrics
- Publishing custom metrics
- Using metric math
- Performance optimization
- Capacity management
- AWS dashboards
- Creating a dashboard
- Adding or removing a graph
- Moving or resizing a graph
- Editing a graph
- Graphing metrics manually on a CloudWatch dashboard
- Adding or removing a text widget
- Adding or removing an alarm
- Monitoring resources in multiple regions
- Linking and unlinking graphs
- Adding a dashboard to your favorites list
- Changing the time range or time zone format
- Tracing
- X-Ray
- Alarms
- Alarm states
- How the alarm state is evaluated when data is missing
- Events
- Concepts
- Summary
- Exercises
- Further reading
- Anti-Patterns - Bypassing Inferior Options
- Building processes
- Analysis paralysis
- Trash
- Best practices
- Tight coupling
- Lock-in
- Everything is a nail
- Different patterns
- Polyglot persistence
- Athena
- Amazon Simple Queue Service (SQS)
- DocumentDB
- DynamoDB
- ElastiCache
- Redshift
- Logging
- Summarized metrics
- Summary
- Further reading
- Other Books You May Enjoy
- Leave a review - let other readers know what you think 更新時(shí)間:2021-06-24 15:12:47