Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 2 of 2 matches in All Departments
Selling your CTO on the merits of OpenShift and Kubernetes is only the beginning. When it comes to operating and scaling OpenShift, you need to understand how to manage and expose resources to application teams and how to continuously deliver changes to applications running in these environments. With this practical book, new and experienced developers and operators will learn specific techniques and examples for operationalizing OpenShift and Kubernetes in the enterprise. Industry experts Michael Elder, Jake Kitchener, and Brad Topol show you how to run OpenShift and Kubernetes in production and deliver your applications to a highly available, secure, and scalable platform. You'll learn how to build a strong foundation in advanced cluster operational topics, such as tenancy management, scheduling and capacity management, cost management, continuous delivery, and more. This book shows you how to: Manage multiple teams in their use of OpenShift and Kubernetes Promote the efficient use of data center resources Deliver highly available applications and services Manage application tenancy throughout the enterprise Provide multicluster management and high availability Apply continuous updates to OpenShift and Kubernetes Devise and deliver disaster recovery strategies
Keystone-OpenStack's Identity service-provides secure controlled access to a cloud's resources. In OpenStack environments, Keystone performs many vital functions, such as authenticating users and determining what resources users are authorized to access. Whether the cloud is private, public, or dedicated, access to cloud resources and security is essential. This practical guide to using Keystone provides detailed, step-by-step guidance to creating a secure cloud environment at the Infrastructure-as-a-Service layer-as well as key practices for safeguarding your cloud's ongoing security. Learn about Keystone's fundamental capabilities for providing Identity, Authentication, and Access Management Perform basic Keystone operations, using concrete examples and the latest version (v3) of Keystone's Identity API Understand Keystone's unique support for multiple token formats, including how it has evolved over time Get an in-depth explanation of Keystone's LDAP support and how to configure Keystone to integrate with LDAP Learn about one of Keystone's most sought-after features-support for federated identity
|
You may like...
|