- Learn OpenShift
- Denis Zuev Artemii Kropachev Aleksey Usov
- 316字
- 2021-08-13 16:03:40
Containers overview
Traditionally, software applications were developed following a monolithic architecture approach, meaning all the services or components were locked to each other. You could not take out a part and replace it with something else. That approach changed over time and became the N-tier approach. The N-tier application approach is one step forward in container and microservices architecture.
The major drawbacks of the monolith architecture were its lack of reliability, scalability, and high availability. It was really hard to scale monolith applications due to their nature. The reliability of these applications was also questionable because you could rarely easily operate and upgrade these applications without any downtime. There was no way you could efficiently scale out monolith applications, meaning you could not just add another one, five, or ten applications back to back and let them coexist with each other.
We had monolith applications in the past, but then people and companies started thinking about application scalability, security, reliability, and high availability (HA). And that is what created N-tier design. The N-tier design is a standard application design like 3-tier web applications where we have a web tier, application tier, and database backend. It's pretty standard. Now it is all evolving into microservices. Why do we need them? The short answer is for better numbers. It's cheaper, much more scalable, and secure. Containerized applications bring you to a whole new level and this is where you can benefit from automation and DevOps.
Containers are a new generation of virtual machines. That brings software development to a whole new level. Containers are an isolated set of different rules and resources inside a single operating system. This means that containers can provide the same benefits as virtual machines but use far less CPU, memory, and storage. There are several popular container providers including LXC, Rockt, and Docker, which we are going to focus on this book.
- Cybersecurity:Attack and Defense Strategies
- Designing Purpose:Built Drones for Ardupilot Pixhawk 2.1
- Windows Server 2012 Hyper-V:Deploying the Hyper-V Enterprise Server Virtualization Platform
- Linux Mint Essentials
- 從零開始寫Linux內核:一書學透核心原理與實現
- Learn Helm
- Moodle 3.x Teaching Techniques(Third Edition)
- 8051軟核處理器設計實戰
- Learning Magento 2 Administration
- 從實踐中學習Kali Linux無線網絡滲透測試
- Hands-On UX Design for Developers
- Windows 7使用詳解(修訂版)
- Learning BeagleBone
- Web Penetration Testing with Kali Linux(Third Edition)
- Docker容器技術與應用