DevSecOps in Practice with VMware Tanzu


Book Description

Modernize your apps, run them in containers on Kubernetes, and understand the business value and the nitty-gritty of the VMware Tanzu portfolio with hands-on instructions Purchase of the print or kindle book includes a free eBook in the PDF format Key FeaturesGain insights into the key features and capabilities of distinct VMWare Tanzu productsLearn how and when to use the different Tanzu products for common day-1 and day-2 operationsModernize applications deployed on multi-cloud platforms using DevSecOps best practicesBook Description As Kubernetes (or K8s) becomes more prolific, managing large clusters at scale in a multi-cloud environment becomes more challenging – especially from a developer productivity and operational efficiency point of view. DevSecOps in Practice with VMware Tanzu addresses these challenges by automating the delivery of containerized workloads and controlling multi-cloud Kubernetes operations using Tanzu tools. This comprehensive guide begins with an overview of the VMWare Tanzu platform and discusses its tools for building useful and secure applications using the App Accelerator, Build Service, Catalog service, and API portal. Next, you'll delve into running those applications efficiently at scale with Tanzu Kubernetes Grid and Tanzu Application Platform. As you advance, you'll find out how to manage these applications, and control, observe, and connect them using Tanzu Mission Control, Tanzu Observability, and Tanzu Service Mesh. Finally, you'll explore the architecture, capabilities, features, installation, configuration, implementation, and benefits of these services with the help of examples. By the end of this VMware book, you'll have gained a thorough understanding of the VMWare Tanzu platform and be able to efficiently articulate and solve real-world business problems. What you will learnBuild apps to run as containers using predefined templatesGenerate secure container images from application source codeBuild secure open source backend services container imagesDeploy and manage a Kubernetes-based private container registryManage a multi-cloud deployable Kubernetes platformDefine a secure path to production for Kubernetes-based applicationsStreamline multi-cloud Kubernetes operations and observabilityConnect containerized apps securely using service meshWho this book is for This book is for cloud platform engineers and DevOps engineers who want to learn about the operations of tools under the VMware Tanzu umbrella. The book also serves as a useful reference for application developers and solutions architects as well as IT leaders who want to understand how business and security outcomes can be achieved using the tools covered in this book. Prior knowledge of containers and Kubernetes will help you get the most out of this book.




VMware Cloud on AWS Blueprint


Book Description

Explore use cases and best practices to seamlessly migrate and scale legacy enterprise-grade applications running on on-premises vSphere environments to VMware Cloud SDDCs running on AWS infrastructure Key Features Understand data center extension, migration, disaster recovery, and app modernization through a variety of use cases Become an expert at configuring, automating, and troubleshooting VMC on AWS SDDC Implement design considerations, best practices, and onboarding preflight checklist for optimal performance on VMC on AWS Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionIf you’re looking to effortlessly transition from on-premises VMware vSphere environments or capital expenditure (CAPEX) to an agile operational expenditure (OPEX) model, trust the VMware Cloud (VMC) on AWS platform for swift re-platforming of legacy applications into cloud-native framework. This comprehensive guide addresses hybrid cloud challenges, offering detailed solutions within the VMware Cloud on AWS ecosystem. Covering the foundational architecture, software-defined data center (SDDC) components of VMware Cloud on AWS, network and security configurations, and AWS service integrations, this book lays the foundation for you to advance to vCenter management, vSAN storage policies, NSX architecture, compute policies, SDDC console management, and the EDRS mechanism for cluster scaling. You’ll also explore integrated services such as VMware HCX for migration, VMware Aria suite, Tanzu Managed Kubernetes, and disaster recovery. Further, the book takes you through VMware Cloud APIs and guides you in managing workloads with VMware Cloud on AWS Outposts. With the help of practical insights, configuration tips, and best practices, you’ll unlock the full potential of VMC on AWS. By the end of this book, you’ll be equipped to successfully architect and manage VMware Cloud on AWS SDDCs, handling day-to-day operations expertly.What you will learn Examine the foundational architecture components of VMware Cloud on AWS, including vSphere, vSAN, and NSX Explore the various integrated services available within VMware Cloud on AWS Delve into VMware Cloud on AWS SDDC, vCenter, and vSAN optimizations Build applications and apply best practices within the VMware Cloud on AWS to manage day-to-day operations Streamline infrastructure management for VMware Cloud on AWS with Infrastructure as Code (IaC) Extend cloud capabilities to on-premises environments using VMware Cloud on AWS Outposts Who this book is for The book is intended for cloud and solutions architects, DevOps engineers, site reliability engineers (SREs), system and network admins, and cloud engineers with experience in on-premises VMware or AWS administration, facilitating the seamless integration of VMware cloud technologies. Prior understanding of cloud computing, virtualization principles, VMware vSphere administration, vSAN, and NSX along with AWS cloud basics will be helpful.




Cloud Native Software Security Handbook


Book Description

Master widely used cloud native platforms like Kubernetes, Calico, Kibana, Grafana, Anchor, and more to ensure secure infrastructure and software development Purchase of the print or Kindle book includes a free PDF eBook Key Features Learn how to select cloud-native platforms and integrate security solutions into the system Leverage cutting-edge tools and platforms securely on a global scale in production environments Understand the laws and regulations necessary to prevent federal prosecution Book DescriptionFor cloud security engineers, it’s crucial to look beyond the limited managed services provided by cloud vendors and make use of the wide array of cloud native tools available to developers and security professionals, which enable the implementation of security solutions at scale. This book covers technologies that secure infrastructure, containers, and runtime environments using vendor-agnostic cloud native tools under the Cloud Native Computing Foundation (CNCF). The book begins with an introduction to the whats and whys of the cloud native environment, providing a primer on the platforms that you’ll explore throughout. You’ll then progress through the book, following the phases of application development. Starting with system design choices, security trade-offs, and secure application coding techniques that every developer should be mindful of, you’ll delve into more advanced topics such as system security architecture and threat modelling practices. The book concludes by explaining the legal and regulatory frameworks governing security practices in the cloud native space and highlights real-world repercussions that companies have faced as a result of immature security practices. By the end of this book, you'll be better equipped to create secure code and system designs.What you will learn Understand security concerns and challenges related to cloud-based app development Explore the different tools for securing configurations, networks, and runtime Implement threat modeling for risk mitigation strategies Deploy various security solutions for the CI/CD pipeline Discover best practices for logging, monitoring, and alerting Understand regulatory compliance product impact on cloud security Who this book is forThis book is for developers, security professionals, and DevOps teams involved in designing, developing, and deploying cloud native applications. It benefits those with a technical background seeking a deeper understanding of cloud-native security and the latest tools and technologies for securing cloud native infrastructure and runtime environments. Prior experience with cloud vendors and their managed services is advantageous for leveraging the tools and platforms covered in this book.




Implementing Enterprise Observability for Success


Book Description

Unlock your organizational potential and scale your business using observability with this information packed guide Purchase of the print or Kindle book includes a free PDF eBook Key Features Learn the principles of identifying stakeholders, tools, and processes necessary for implementing observability Develop strategies to self-sustain the observability journey in the long run Learn with real-life case studies to set up observability for your enterprise Book Description Observability can be implemented in multiple ways within an organization based on the organization's needs. So, it's crucial for organizations to decide whether they need observability and to what extent, what skills and tools will suit them, and how long will it take to implement it. Implementing Enterprise Observability for Success provides a step-by-step approach to help you create an observability strategy, understand the principles behind the creation of the strategy, and logical steps to plan and execute the implementation. You'll learn about observability fundamentals and challenges, the importance of data and analytics along with different tools. Further, you'll discover the various layers from which data should be collected for setting up observability. Through real- life examples distilled from the author's experience in implementing observability at an enterprise level, you'll uncover some of the non-technical & technical drivers of observability like the culture of the organization, the hierarchy of stakeholders, tools at disposal and the willingness to invest. By the end of this book, you'll be well-equipped to plan the observability journey, identify different stakeholders, spot the technology stack required, and lay out an effective plan for organization-wide adoption. What you will learn Understand observability fundamentals from scratch Get to grips with common challenges in implementing observability Segregate organizations according to their size for implementing observability Leverage analytics to better understand the value of collected data Explore best practices from case studies to smoothen your observability journey Understand the Observability Maturity Model and the essential people skills necessary to attain each maturity level Who this book is for This book is for technology leaders, architects, and initiative leads looking to enhance monitoring and/or implementing observability. Engineers, developers, and professionals already working on monitoring and analytics or are responsible for scaling the observability implementation across multiple teams or at an organizational level can also benefit from this book. A deep understanding of monitoring concepts, general knowledge of IT systems and processes along with familiarity with working across various stakeholders is required.




Container Security


Book Description

To facilitate scalability and resilience, many organizations now run applications in cloud native environments using containers and orchestration. But how do you know if the deployment is secure? This practical book examines key underlying technologies to help developers, operators, and security professionals assess security risks and determine appropriate solutions. Author Liz Rice, Chief Open Source Officer at Isovalent, looks at how the building blocks commonly used in container-based systems are constructed in Linux. You'll understand what's happening when you deploy containers and learn how to assess potential security risks that could affect your deployments. If you run container applications with kubectl or docker and use Linux command-line tools such as ps and grep, you're ready to get started. Explore attack vectors that affect container deployments Dive into the Linux constructs that underpin containers Examine measures for hardening containers Understand how misconfigurations can compromise container isolation Learn best practices for building container images Identify container images that have known software vulnerabilities Leverage secure connections between containers Use security tooling to prevent attacks on your deployment




Knative in Action


Book Description

Take the pain out of managing serverless applications. Knative, a collection of Kubernetes extensions curated by Google, simplifies building and running serverless systems. Knative in Action guides you through the Knative toolkit, showing you how to launch, modify, and monitor event-based apps built using cloud-hosted functions like AWS Lambda. You''ll learn how to use Knative Serving to develop software that is easily deployed and autoscaled, how to use Knative Eventing to wire together disparate systems into a consistent whole, and how to integrate Knative into your shipping pipeline. about the technology With Knative, managing a serverless application''s full lifecycle is a snap. Knative builds on Kubernetes orchestration features, making it easy to deploy and run serverless apps. It handles low-level chores--such as starting and stopping instances--so you can concentrate on features and behavior. about the book Knative in Action teaches you to build complex and efficient serverless applications. You''ll dive into Knative''s unique design principles and grasp cloud native concepts like handling latency-sensitive workloads. You''ll deliver updates with Knative Serving and interlink apps, services, and systems with Knative Eventing. To keep you moving forward, every example includes deployment advice and tips for debugging. what''s inside Deploy a service with Knative Serving Connect systems with Knative Eventing Autoscale responses for different traffic surges Develop, ship, and operate software about the reader For software developers comfortable with CLI tools and an OO language like Java or Go. about the author Jacques Chester has worked in Pivotal and VMWare R&D since 2014, contributing to Knative and other projects.




Cloud Native Microservices with Spring and Kubernetes


Book Description

Build and deploy scalable cloud native microservices using the Spring framework and Kubernetes. KEY FEATURES ● Complete coverage on how to design, build, run, and deploy modern cloud native microservices. ● Includes numerous sample code exercises on microservices, Spring and Kubernetes. ● Develop a stronghold on Kubernetes, Spring, and the microservices architecture. ● Complete guide of application containerization on Kubernetes containers. ● Coverage on managing modern applications and infrastructure using observability tools. DESCRIPTION The main objective of this book is to give an overview of cloud native microservices, their architecture, design patterns, best practices, real use cases and practical coverage of modern applications. This book covers a strong understanding of the fundamentals of microservices, API first approach, Testing, observability, API Gateway, Service Mesh and Kubernetes alternatives of Spring Cloud. This book covers the implementation of various design patterns of developing cloud native microservices using Spring framework docker and Kubernetes libraries. It covers containerization concepts and hands-on lab exercises like how to build, run and manage microservices applications using Kubernetes. After reading this book, the readers will have a holistic understanding of building, running, and managing cloud native microservices applications on Kubernetes containers. WHAT YOU WILL LEARN ● Learn fundamentals of microservice and design patterns. ● Learn microservices development using Spring Boot and Kubernetes. ● Learn to develop reactive, event-driven, and batch microservices. ● Perform end-to-end microservices testing using Cucumber. ● Implement API gateway,authentication & authorization,load balancing, caching, rate limiting. ● Learn observability and monitoring techniques of microservices. WHO THIS BOOK IS FOR This book is for the Spring Developers, Microservice Developers, Cloud Engineers, DevOps Consultants, Technical Architect and Solution Architects, who have some familiarity with application development, Docker and Kubernetes containers. TABLE OF CONTENTS 1. Overview of Cloud Native microservices 2. Microservice design patterns 3. API first approach 4. Build microservices using the Spring Framework 5. Batch microservices 6. Build reactive and event-driven microservices 7. The API gateway, security, and distributed caching with Redis 8. Microservices testing and API mocking 9. Microservices observability 10. Containers and Kubernetes overview and architecture 11. Run microservices on Kubernetes 12. Service Mesh and Kubernetes alternatives of Spring Cloud




Presentation Patterns


Book Description

Presentation Patterns is the first book on presentations that categorizes and organizes the building blocks (or patterns) that you’ll need to communicate effectively using presentation tools like Keynote and PowerPoint. Patterns are like the lower-level steps found inside recipes; they are the techniques you must master to be considered a master chef or master presenter. You can use the patterns in this book to construct your own recipes for different contexts, such as business meetings, technical demonstrations, scientific expositions, and keynotes, just to name a few. Although there are no such things as antirecipes, this book shows you lots of antipatterns—things you should avoid doing in presentations. Modern presentation tools often encourage ineffective presentation techniques, but this book shows you how to avoid them. Each pattern is introduced with a memorable name, a definition, and a brief explanation of motivation. Readers learn where the pattern applies, the consequences of applying it, and how to apply it. The authors also identify critical antipatterns: clichés, fallacies, and design mistakes that cause presentations to disappoint. These problems are easy to avoid—once you know how. Presentation Patterns will help you Plan what you’ll say, who you’ll say it to, how long you’ll talk, and where you’ll present Perfectly calibrate your presentation to your audience Use the storyteller’s “narrative arc” to full advantage Strengthen your credibility—and avoid mistakes that hurt it Hone your message before you ever touch presentation software Incorporate visuals that support your message instead of hindering it Create highly effective “infodecks” that work when you’re not able to deliver a talk in person Construct slides that really communicate and avoid “Ant Fonts,” “Floodmarks,” “Alienating Artifacts,” and other errors Master 13 powerful techniques for delivering your presentation with power, authority, and clarity Whether you use this book as a handy reference or read it from start to finish, it will be a revelation: an entirely new language for systematically planning, creating, and delivering more powerful presentations. You’ll quickly find it indispensable—no matter what you’re presenting, who your audiences are, or what message you’re driving home.




The Unicorn Project


Book Description

The Phoenix Project wowed over a half-million readers. Now comes the Wall Street Journal Bestselling Wall Street Journal bestselling The Unicorn Project! “The Unicorn Project is amazing, and I loved it 100 times more than The Phoenix Project…”—FERNANDO CORNAGO, Senior Director Platform Engineering, Adidas “Gene Kim does a masterful job of showing how … the efforts of many create lasting business advantages for all.”—DR. STEVEN SPEAR, author of The High-Velocity Edge, Sr. Lecturer at MIT, and principal of HVE LLC. “The Unicorn Project is so clever, so good, so crazy enlightening!”––CORNELIA DAVIS, Vice President Of Technology at Pivotal Software, Inc., Author of Cloud Native Patterns This highly anticipated follow-up to the bestselling title The Phoenix Project takes another look at Parts Unlimited, this time from the perspective of software development. In The Unicorn Project, we follow Maxine, a senior lead developer and architect, as she is exiled to the Phoenix Project, to the horror of her friends and colleagues, as punishment for contributing to a payroll outage. She tries to survive in what feels like a heartless and uncaring bureaucracy and to work within a system where no one can get anything done without endless committees, paperwork, and approvals. One day, she is approached by a ragtag bunch of misfits who say they want to overthrow the existing order, to liberate developers, to bring joy back to technology work, and to enable the business to win in a time of digital disruption. To her surprise, she finds herself drawn ever further into this movement, eventually becoming one of the leaders of the Rebellion, which puts her in the crosshairs of some familiar and very dangerous enemies. The Age of Software is here, and another mass extinction event looms—this is a story about rebel developers and business leaders working together, racing against time to innovate, survive, and thrive in a time of unprecedented uncertainty...and opportunity. “The Unicorn Project provides insanely useful insights on how to improve your technology business.”—DOMINICA DEGRANDIS, author of Making Work Visible and Director of Digital Transformation at Tasktop ——— “My goal in writing The Unicorn Project was to explore and reveal the necessary but invisible structures required to make developers (and all engineers) productive, and reveal the devastating effects of technical debt and complexity. I hope this book can create common ground for technology and business leaders to leave the past behind, and co-create a better future together.”—Gene Kim, November 2019




ITIL 4 Managing Professional


Book Description

Discussing concepts, principles, methods, and techniques, this book covers all types of engagement and interaction between a service provider and its customers, users, suppliers, and partners. --