|
Showing 1 - 2 of
2 matches in All Departments
Selling your CTO on the merits of OpenShift and Kubernetes is only
the beginning. When it comes to operating and scaling OpenShift,
you need to understand how to manage and expose resources to
application teams and how to continuously deliver changes to
applications running in these environments. With this practical
book, new and experienced developers and operators will learn
specific techniques and examples for operationalizing OpenShift and
Kubernetes in the enterprise. Industry experts Michael Elder, Jake
Kitchener, and Brad Topol show you how to run OpenShift and
Kubernetes in production and deliver your applications to a highly
available, secure, and scalable platform. You'll learn how to build
a strong foundation in advanced cluster operational topics, such as
tenancy management, scheduling and capacity management, cost
management, continuous delivery, and more. This book shows you how
to: Manage multiple teams in their use of OpenShift and Kubernetes
Promote the efficient use of data center resources Deliver highly
available applications and services Manage application tenancy
throughout the enterprise Provide multicluster management and high
availability Apply continuous updates to OpenShift and Kubernetes
Devise and deliver disaster recovery strategies
Keystone-OpenStack's Identity service-provides secure controlled
access to a cloud's resources. In OpenStack environments, Keystone
performs many vital functions, such as authenticating users and
determining what resources users are authorized to access. Whether
the cloud is private, public, or dedicated, access to cloud
resources and security is essential. This practical guide to using
Keystone provides detailed, step-by-step guidance to creating a
secure cloud environment at the Infrastructure-as-a-Service
layer-as well as key practices for safeguarding your cloud's
ongoing security. Learn about Keystone's fundamental capabilities
for providing Identity, Authentication, and Access Management
Perform basic Keystone operations, using concrete examples and the
latest version (v3) of Keystone's Identity API Understand
Keystone's unique support for multiple token formats, including how
it has evolved over time Get an in-depth explanation of Keystone's
LDAP support and how to configure Keystone to integrate with LDAP
Learn about one of Keystone's most sought-after features-support
for federated identity
|
You may like...
Widows
Viola Davis, Michelle Rodriguez, …
Blu-ray disc
R22
R19
Discovery Miles 190
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
Holy Fvck
Demi Lovato
CD
R435
Discovery Miles 4 350
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.