舉報

會員
Hands-On Kubernetes on Azure
MicrosoftisnowoneofthemostsignificantcontributorstoKubernetesopensourceprojects.Kuberneteshelpstocreate,configure,andmanageaclusterofvirtualmachinesthatarepreconfiguredtoruncontainerizedapplications.ThisbookwillbeyourresourceforachievingsuccessfulcontainerorchestrationanddeploymentofKubernetesclustersonAzure.Youwilllearnhowtodeployandmanagehighlyscalableapplications,alongwithhowtosetupaproduction-readyKubernetesclusteronAzure.Withthisbook,youwillbeabletoreducethecomplexityandoperationaloverheadsofmanagingaKubernetesclusteronAzure.Bytheendofthisbook,youwillnotonlybecapableofdeployingandmanagingKubernetesclustersonAzurewithease,butalsohavetheknowledgeofindustrybestpracticestoworkwithadvancedAzureKubernetesServices(AKS)conceptsforcomplexsystems.
最新章節
- Leave a review - let other readers know what you think
- Other Books You May Enjoy
- Summary
- Integrating Kubeless with Azure Event Hubs via Azure Functions
- Creating and configuring Azure Functions
- Events and serverless functions
品牌:中圖公司
上架時間:2021-06-24 12:26:26
出版社:Packt Publishing
本書數字版權由中圖公司提供,并由其授權上海閱文信息技術有限公司制作發行
- Leave a review - let other readers know what you think 更新時間:2021-06-24 15:39:54
- Other Books You May Enjoy
- Summary
- Integrating Kubeless with Azure Event Hubs via Azure Functions
- Creating and configuring Azure Functions
- Events and serverless functions
- The hello world serverless function
- Install Kubeless binary
- Installing Kubeless
- Kubeless services
- Technical requirements
- Serverless Functions
- Summary
- Globally enabling mutual TLS
- Deploying sample services
- Enforcing mutual TLS
- Injecting Istio as a sidecar automatically
- Installing Istio
- The Istio service mesh at your service
- Secrets as files
- Secrets as environment variables
- Using your secrets
- Creating the tls secret
- Creating the Docker registry key
- Creating generic secrets using literals
- Creating secrets manually using files
- Creating secrets from files
- Creating your own secrets
- Setting up secrets management
- Technical requirements
- Securing AKS Network Connections
- Summary
- Updating the Helm files
- Creating the Azure Event Hub
- Using Azure Event Hubs
- Deploying Helm
- Deploying a set of microservices
- Kubernetes and microservices
- Microservices are no free lunch
- Introducing to microservices
- Technical requirements
- Connecting to Other Azure Services (Event Hub)
- Summary
- Azure SQL HADR options
- DR options
- Azure Database audits
- Reviewing audit logs
- Modifying the host setting in WordPress deployment
- Connecting WordPress to the restored database
- Performing a restore
- Restoring from backup
- Running the WordPress sample with MySQL Database
- Securing MySQL
- Deploying WordPress
- Deploying Open Service Broker for Azure
- Deploying the service catalog on the cluster
- Helm with RBAC
- Prerequisites
- WordPress backed by Azure MySQL
- Extending an app to connect to an Azure Database
- Technical requirements
- Connecting an App to an Azure Database - Authorization
- Section 3: Leveraging Advanced Azure PaaS Services in Combination with AKS
- Summary
- The access test
- Binding the role to the AAD group
- Creating the cluster-wide read-only role
- Creating the read-only user role
- Verifying RBAC
- Creating a read-only group and adding the user to it
- Creating users in your Active Directory
- Attaching service roles to AAD users
- Deploying the cluster
- Getting the AAD tenant ID
- Creating the client application
- Granting the permissions and noting the application ID
- Setting the permissions for the application to access user info
- Creating the Azure AD server application
- Creating an AKS cluster with the Azure AD RBAC support
- Deleting any AKS cluster without RBAC
- Service roles in Kubernetes
- Technical requirements
- Operation and Maintenance of AKS Applications
- Summary
- Logs
- Container metrics logs and environmental variables
- Cluster metrics
- AKS Insights
- Metrics reported from OMS
- Node status and consumption
- Metrics reported by Kubernetes
- Logs
- Introducing an app "error"
- Scaling down the frontend
- Application errors
- Image Pull errors
- Debugging applications
- kubectl describe command
- kubectl get command
- Commands for monitoring applications
- Technical requirements
- Monitoring the AKS Cluster and the Application
- Summary
- Deploying the oauth2_proxy side car
- Authentication and common authN providers
- Authentication versus authorization
- Securing the frontend service connection
- Creating the SSL certificate
- Installing the certificate issuer
- Mapping the Azure FQDN to the nginx ingress public IP
- Installing the certificate manager
- Adding LetsEncrypt
- Adding Lets Ingress
- Launching the Guestbook application
- Installing Ingress
- HTTPS support
- Technical requirements
- Single Sign-On with Azure AD
- Summary
- Helm upgrade
- kubectl edit
- Upgrading your application
- Handling node failure with PVC involvement
- Persistent volumes
- Starting the WordPress install
- Fixing storage mount issues
- Cleanup of the guestbook deployment
- Reducing CPU requirements
- Reducing the number of replicas to the bare minimum
- Diagnosing out-of-resource errors
- Node failures
- Handling failure in AKS
- Scaling the guestbook frontend component
- Implementing independent scaling
- Scaling your application
- Technical requirements
- Scaling Your Application to Thousands of Deployments
- Summary
- Your own WordPress site
- Persistent Volume Claims
- Installing WordPress
- The helm init command
- The helm way of installing complex applications
- The guestbook application in action
- Exposing the frontend service
- Deploying and exposing the frontend
- Deploying the Redis slaves
- Exposing the Redis master service
- Fully deploying of the sample guestbook application
- Redis master
- Examining the deployment
- Deploying the first master
- Introducing the application
- Deploying the sample guestbook application
- Technical requirements
- Application Deployment on AKS
- Section 2: Deploying on AKS
- Summary
- Using Azure Cloud Shell
- Creating your first AKS
- Navigating the Azure portal
- Creating an Azure portal account
- Entering the Azure portal
- Technical requirements
- Kubernetes on Azure (AKS)
- Summary
- Orchestration
- Everything is a file
- You build it you run it
- The foundational technologies that enable AKS
- Technical requirements
- Introduction to Docker and Kubernetes
- Section 1: The Basics
- Reviews
- Get in touch
- Conventions used
- Download the example code files
- To get the most out of this book
- What this book covers
- Who this book is for
- Preface
- Packt is searching for authors like you
- About the reviewer
- About the authors
- Contributors
- Packt.com
- Why subscribe?
- About Packt
- Dedication
- Hands-On Kubernetes on Azure
- Copyright and Credits
- Title Page
- coverpage
- coverpage
- Title Page
- Copyright and Credits
- Hands-On Kubernetes on Azure
- Dedication
- About Packt
- Why subscribe?
- Packt.com
- Contributors
- About the authors
- About the reviewer
- Packt is searching for authors like you
- Preface
- Who this book is for
- What this book covers
- To get the most out of this book
- Download the example code files
- Conventions used
- Get in touch
- Reviews
- Section 1: The Basics
- Introduction to Docker and Kubernetes
- Technical requirements
- The foundational technologies that enable AKS
- You build it you run it
- Everything is a file
- Orchestration
- Summary
- Kubernetes on Azure (AKS)
- Technical requirements
- Entering the Azure portal
- Creating an Azure portal account
- Navigating the Azure portal
- Creating your first AKS
- Using Azure Cloud Shell
- Summary
- Section 2: Deploying on AKS
- Application Deployment on AKS
- Technical requirements
- Deploying the sample guestbook application
- Introducing the application
- Deploying the first master
- Examining the deployment
- Redis master
- Fully deploying of the sample guestbook application
- Exposing the Redis master service
- Deploying the Redis slaves
- Deploying and exposing the frontend
- Exposing the frontend service
- The guestbook application in action
- The helm way of installing complex applications
- The helm init command
- Installing WordPress
- Persistent Volume Claims
- Your own WordPress site
- Summary
- Scaling Your Application to Thousands of Deployments
- Technical requirements
- Scaling your application
- Implementing independent scaling
- Scaling the guestbook frontend component
- Handling failure in AKS
- Node failures
- Diagnosing out-of-resource errors
- Reducing the number of replicas to the bare minimum
- Reducing CPU requirements
- Cleanup of the guestbook deployment
- Fixing storage mount issues
- Starting the WordPress install
- Persistent volumes
- Handling node failure with PVC involvement
- Upgrading your application
- kubectl edit
- Helm upgrade
- Summary
- Single Sign-On with Azure AD
- Technical requirements
- HTTPS support
- Installing Ingress
- Launching the Guestbook application
- Adding Lets Ingress
- Adding LetsEncrypt
- Installing the certificate manager
- Mapping the Azure FQDN to the nginx ingress public IP
- Installing the certificate issuer
- Creating the SSL certificate
- Securing the frontend service connection
- Authentication versus authorization
- Authentication and common authN providers
- Deploying the oauth2_proxy side car
- Summary
- Monitoring the AKS Cluster and the Application
- Technical requirements
- Commands for monitoring applications
- kubectl get command
- kubectl describe command
- Debugging applications
- Image Pull errors
- Application errors
- Scaling down the frontend
- Introducing an app "error"
- Logs
- Metrics reported by Kubernetes
- Node status and consumption
- Metrics reported from OMS
- AKS Insights
- Cluster metrics
- Container metrics logs and environmental variables
- Logs
- Summary
- Operation and Maintenance of AKS Applications
- Technical requirements
- Service roles in Kubernetes
- Deleting any AKS cluster without RBAC
- Creating an AKS cluster with the Azure AD RBAC support
- Creating the Azure AD server application
- Setting the permissions for the application to access user info
- Granting the permissions and noting the application ID
- Creating the client application
- Getting the AAD tenant ID
- Deploying the cluster
- Attaching service roles to AAD users
- Creating users in your Active Directory
- Creating a read-only group and adding the user to it
- Verifying RBAC
- Creating the read-only user role
- Creating the cluster-wide read-only role
- Binding the role to the AAD group
- The access test
- Summary
- Section 3: Leveraging Advanced Azure PaaS Services in Combination with AKS
- Connecting an App to an Azure Database - Authorization
- Technical requirements
- Extending an app to connect to an Azure Database
- WordPress backed by Azure MySQL
- Prerequisites
- Helm with RBAC
- Deploying the service catalog on the cluster
- Deploying Open Service Broker for Azure
- Deploying WordPress
- Securing MySQL
- Running the WordPress sample with MySQL Database
- Restoring from backup
- Performing a restore
- Connecting WordPress to the restored database
- Modifying the host setting in WordPress deployment
- Reviewing audit logs
- Azure Database audits
- DR options
- Azure SQL HADR options
- Summary
- Connecting to Other Azure Services (Event Hub)
- Technical requirements
- Introducing to microservices
- Microservices are no free lunch
- Kubernetes and microservices
- Deploying a set of microservices
- Deploying Helm
- Using Azure Event Hubs
- Creating the Azure Event Hub
- Updating the Helm files
- Summary
- Securing AKS Network Connections
- Technical requirements
- Setting up secrets management
- Creating your own secrets
- Creating secrets from files
- Creating secrets manually using files
- Creating generic secrets using literals
- Creating the Docker registry key
- Creating the tls secret
- Using your secrets
- Secrets as environment variables
- Secrets as files
- The Istio service mesh at your service
- Installing Istio
- Injecting Istio as a sidecar automatically
- Enforcing mutual TLS
- Deploying sample services
- Globally enabling mutual TLS
- Summary
- Serverless Functions
- Technical requirements
- Kubeless services
- Installing Kubeless
- Install Kubeless binary
- The hello world serverless function
- Events and serverless functions
- Creating and configuring Azure Functions
- Integrating Kubeless with Azure Event Hubs via Azure Functions
- Summary
- Other Books You May Enjoy
- Leave a review - let other readers know what you think 更新時間:2021-06-24 15:39:54