Learning HelmGet up to speed with Helm, the preeminent package manager for the Kubernetes container orchestration system. This practical guide shows you how to efficiently create, install, and manage the applications running inside your containers. Helm maintainers Matt Butcher, Matt Farina, and Josh Dolitsky explain how this package manager fits into the Kubernetes ecosystem and provide an inside look at Helm's design and best practices.
More than 70% of the organizations that work with Kubernetes use Helm today. While the Helm community provides thousands of packages, or charts, to help you get started, this book walks developers and DevOps engineers through the process of creating custom charts to package applications. If you have a working understanding of Kubernetes, you're ready to go.
Explore primary features including frequently used Helm commands; Learn how to build and deploy Helm charts from scratch; Use Helm to manage complexity and achieve repeatable deployments; Package an appli ...
Modern Data ProtectionGive your organization the data protection it deserves without the uncertainty and cost overruns experienced by your predecessors or other companies. System and network administrators have their work cut out for them to protect physical and virtual machines in the data center and the cloud; mobile devices including laptops and tablets; SaaS services like Microsoft 365, Google Workspace, and Salesforce; and persistent data created by Kubernetes and container workloads.
To help you navigate the breadth and depth of this challenge, this book presents several solutions so you can determine which is right for your company. You'll learn the unique requirements that each workload presents, then explore various categories of commercial backup hardware, software, and services available to protect these data sources, including the advantages and disadvantages of each approach.
- Learn the workload types that your organization should be backing up;
- Explore the hardware, software, and ser ...
Agile Model-Based Systems Engineering CookbookModel-based systems engineering provides an integrated approach to creating verifiable models of engineering data, rather than relying on traditional and vague natural language descriptions that are difficult to verify. This enables you to work on accurate specifications and rapidly design reliable and effective products for the marketplace. Agile MBSE integrates the value proposition of agile methods in systems development, most notably, for managing constant change and uncertainty while continuously ensuring system correctness and meeting customers' needs.
Written by Dr. Bruce Powel Douglass, a world-renowned expert in MBSE, this book will take you through important systems engineering workflows and show you how they can be performed effectively with an agile and model-based approach. You'll start by covering the key concepts of agile methods for systems engineering. The book then takes you through initiating a project, defining stakeholder needs, defining and analyzing system req ...
Adversarial Tradecraft in CybersecurityLittle has been written about what to do when live hackers are on your system and running amok. Even experienced hackers tend to choke up when they realize the network defender has caught them and is zoning in on their implants in real time. This book will provide tips and tricks all along the kill chain of an attack, showing where hackers can have the upper hand in a live conflict and how defenders can outsmart them in this adversarial game of computer cat and mouse.
This book contains two subsections in each chapter, specifically focusing on the offensive and defensive teams. It begins by introducing you to adversarial operations and principles of computer conflict where you will explore the core principles of deception, humanity, economy, and more about human-on-human conflicts. Additionally, you will understand everything from planning to setting up infrastructure and tooling that both sides should have in place.
Throughout this book, you will learn how to gain an advantage ove ...
Software TelemetrySoftware Telemetry teaches you best practices for operating and updating telemetry systems. These vital systems trace, log, and monitor infrastructure by observing and analyzing the events generated by the system. This practical guide is filled with techniques you can apply to any size of organization, with troubleshooting techniques for every eventuality, and methods to ensure your compliance with standards like GDPR.
Take advantage of the data generated by your IT infrastructure! Telemetry systems provide feedback on what's happening inside your data center and applications, so you can efficiently monitor, maintain, and audit them. This practical book guides you through instrumenting your systems, setting up centralized logging, doing distributed tracing, and other invaluable telemetry techniques.
Software Telemetry shows you how to efficiently collect, store, and analyze system and application log data so you can monitor and improve your systems. Manage the pillars of observab ...
Building Applications with Azure Resource Manager (ARM)Learn how to leverage infrastructure as code with Azure Resource Manager (ARM) and the best practices to build, test, debug, and deploy your applications in Microsoft Azure using ARM templates and the new domain-specific language Bicep.
As organizations consider moving partially or fully to the cloud, infrastructure as code (IaC) has become a key component to improving time to market for their applications. However, it is critical that enterprise infrastructure professionals use the right resources and strategies to build the infrastructure required to run applications in the cloud. Azure cloud-native components and capabilities automate the build and deployment process, offering a myriad of compelling reasons to leverage IaC to build your applications in Azure.
Starting with the evolution of the software-defined approach and building on the basic concepts of infrastructure as code, this book provides you with comprehensive guidance to learn Azure Resource Manager from the ground u ...
The Real-Time APIsApplication Programming Interfaces (APIs) are seemingly everywhere. Thanks to the popularity of web-based products, cloud-based X-as-a-service offerings, and IoT, it is becoming increasingly important for engineers to understand all aspects of APIs, from design, to building, to operation.
Research shows that there is increasing demand for near real-time APIs, in which speed and flexibility of response is vitally important. This emag explores this emerging trend in more detail.
We hope you enjoy this collection of articles focused on real-time APIs. ...
Windows Internals, Part 2, 7th EditionThe definitive guide to modern Windows internals: new coverage of virtualization, file systems, boot, security, and more.
For advanced computing professionals, this is the definitive up-to-date guide to how Windows core components behave under the hood. Using it, experienced developers can build more powerful and scalable software, administrators can debug complex system and performance problems, and security researchers can harden their systems. This Seventh Edition is fully updated through the May 2021 (21H1/2104) updates to Windows 10 and Windows Server (2022, 2019, and 2016). It adds extensive content on Hyper-V, plus fully rewritten chapters on the boot process, new storage technologies, and Windows system and management mechanisms. As always, it delivers unparalleled insight based on insider access to Microsoft source code, with hands-on experiments using the latest debugging tools to show you Windows internal behaviors firsthand. With Windows 11 introducing new user interface ...
SQL Server Source Control BasicsFew software developers would build an application without using source control, but its adoption for databases has been slower. Yet without source control to maintain the scripts necessary to create our database objects, load lookup data, and take other actions, we cannot guarantee a reliable and repeatable database deployment process, let alone coordinate database upgrades with changes to the application. We also run the risk that our "ad hoc" database patching will cause inconsistencies and data loss. Source control can and should play a key role in the database development and deployment process, and this book will show you exactly how to get started. It provides 'just enough' detail about the core components of a source control system and how to incorporate that system into the database development and deployment processes, covering: Database Source Control architecture - what to include, how to structure the components Collaborative editing - teamwork on a database project, while ...
Confessions of an IT ManagerFrom IT projects that have trampled all over the guiding principles of successful development, to tips on training your manager to the required standard, each of Phil's tales is shot through with a wild seam of anarchic humour. And yet, in each case, the humor is just a sugar coating for a pill of sage advice, wrought from years of rough-and-tumble in the IT industry.
In his more reflective moments, he gives vent to his inner poet, penning romantic elegies to the SQL Server index, or quietly condemning recruitment agencies to Dante's inferno for crimes against innocent contractors.
Phil Factor is a legend in his own runtime. Scurrilous, absurd, confessional and scathing by turns, Confessions of an IT Manager targets the idiocy, incompetence and overreach of the IT management industry from vantage point all the way up and down the greasy pole. ...