Practical GitOps: Infrastructure Management Using Terraform, AWS, and GitHub Actions

دانلود کتاب Practical GitOps: Infrastructure Management Using Terraform, AWS, and GitHub Actions

30000 تومان موجود

کتاب GitOps عملی: مدیریت زیرساخت با استفاده از Terraform، AWS و GitHub Actions نسخه زبان اصلی

دانلود کتاب GitOps عملی: مدیریت زیرساخت با استفاده از Terraform، AWS و GitHub Actions بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 6


توضیحاتی در مورد کتاب Practical GitOps: Infrastructure Management Using Terraform, AWS, and GitHub Actions

نام کتاب : Practical GitOps: Infrastructure Management Using Terraform, AWS, and GitHub Actions
ویرایش : 1st ed.
عنوان ترجمه شده به فارسی : GitOps عملی: مدیریت زیرساخت با استفاده از Terraform، AWS و GitHub Actions
سری :
نویسندگان :
ناشر : Apress
سال نشر : 2022
تعداد صفحات : 538
ISBN (شابک) : 9781484286722 , 1484286723
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 22 مگابایت



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.


فهرست مطالب :


Table of Contents\nAbout the Author\nAbout the Technical Reviewers\nPreface\nChapter 1: What Is GitOps?\n 1.1 The Era of DevOps\n 1.1.1 What Problems Is DevOps Addressing?\n 1.2 Introduction to DevOps\n 1.2.1 Continuous Integration\n 1.2.2 Continuous Delivery/Deployment\n 1.2.3 Continuous Monitoring\n 1.3 Infrastructure As Code (IaC)\n 1.3.1 Evolution of Server Infrastructure\n 1.3.2 Tools of Trade – IaC\n 1.3.3 Mutable vs. Immutable Infrastructure\n 1.3.4 State in IaC\n 1.4 Problems with Continuous Delivery\n 1.5 Introduction to GitOps\n 1.6 Conclusion\nChapter 2: Introduction to AWS\n 2.1 Prerequisites\n 2.2 Introduction to AWS\n 2.2.1 Create an AWS Account\n 2.2.2 Log in into the AWS Account\n 2.3 Creating an EC2 Machine – GUI\n 2.3.1 Default Region Selection\n 2.3.2 Instance Type Selection\n 2.3.3 Instance Configuration\n 2.3.4 Instance Storage\n 2.3.5 Tags\n 2.3.6 Security Groups\n 2.3.7 SSH Key-Pair Generation\n 2.3.8 Launching EC2 Instance\n 2.3.9 Terminating EC2 Instance\n 2.4 Creating an EC2 Machine – CLI\n 2.4.1 Configuring CLI Environment\n 2.4.2 Fetching Security Group ID\n 2.4.3 Fetching Subnet ID\n 2.4.4 Launching EC2 Instance\n 2.4.5 Accessing EC2 Instance\n 2.4.6 Terminating EC2 Instance\n 2.5 Clean-Up\n 2.6 Conclusion\nChapter 3: Introduction to Terraform\n 3.1 Prerequisites\n 3.2 Introduction to Terraform\n 3.3 Getting Started with Terraform\n 3.4 Iteration #1\n 3.4.1 Terraform Working Directory\n 3.4.2 Terraform init\n 3.4.3 Terraform Plan\n 3.4.4 Terraform Apply\n 3.4.5 Terraform State File\n 3.4.6 Terraform Destroy\n 3.5 Iteration #2\n 3.5.1 Terraform Variables\n 3.5.2 Terraform Data Source\n 3.5.3 Terraform Resource\n 3.5.4 Terraform Output\n 3.6 Iteration #3\n 3.6.1 Terraform Modules\n 3.7 Selective Destroy\n 3.7.1 Terraform Destroy Protection\n 3.8 Terraform Drift\n 3.9 Clean-Up\n 3.10 Terraform Commands Reference\n 3.11 Conclusion\nChapter 4: Introduction to Terraform Cloud and Workspaces\n 4.1 Prerequisites\n 4.2 Terraform State Management\n 4.3 Introduction to Terraform Cloud\n 4.4 Terraform Cloud – Getting Started\n 4.4.1 Creating a Workspace\n 4.4.2 Configure Workspace\n 4.4.3 Workspace Variables\n 4.4.4 Terraform Login\n 4.4.5 Running Terraform in Terraform Cloud\n 4.4.6 Terraform Cloud Run and States\n 4.5 Multi-environment with DRY\n 4.5.1 Adding Production Environment\n 4.5.2 TF Variables Overriding\n 4.6 Clean-Up\n 4.6.1 Destroying Terraform Cloud Workspaces\n 4.7 Terraform Cloud Security Best Practices\n 4.8 Conclusion\nChapter 5: Terraform Automation with Git\n 5.1 Prerequisites\n 5.2 Terraform Automation with GitHub\n 5.2.1 Setting Up the GitHub Repository\n 5.2.2 Connecting GitHub with Terraform Cloud\n 5.2.3 Creating VCS-Driven Workspace\n 5.2.4 Configuring Environment Variables\n 5.2.5 Executing Plan in Cloud\n 5.2.6 Triggering the VCS\n 5.2.7 Destroying in Terraform Cloud\n 5.2.8 Drawbacks of Terraform Cloud with VCS\n 5.3 Introduction to GitHub Actions\n 5.3.1 CI/CD General Workflow\n 5.3.2 Introduction to GitHub Actions\n 5.3.3 Sample GitHub Actions YAML\n 5.3.4 Docker Build Automation with GitHub Actions\n 5.3.5 Triggering GitHub Actions\n 5.4 Terraform Automation with GitHub Actions\n 5.4.1 Code Walkthrough\n 5.4.2 Terraform Login Token\n 5.4.3 Creating an API-Driven Terraform Workspace\n 5.4.4 Executing API-Driven Workflow\n 5.5 Clean-Up\n 5.6 Conclusion\nChapter 6: Practical GitOps\n 6.1 Prerequisites\n 6.2 Staging Environment Workflow\n 6.2.1 High-Level Plan\n 6.2.2 Code Walkthrough\n 6.2.3 Set Up Terraform Staging Workspace\n 6.2.4 Set Up a GitHub Repository\n 6.2.5 Executing Staging Workflow\n 6.3 Prod Environment Workflow\n 6.3.1 SSH Key-Pair Generation\n 6.4 Complete Workflow\n 6.4.1 New Feature Request\n 6.4.2 Developer Testing\n 6.4.3 Create Pull Request – Dev\n 6.4.4 Create Pull Request – Prod\n 6.5 Clean-Up\n 6.6 Conclusion\nChapter 7: Spring Boot App on AWS EKS\n 7.1 Prerequisites\n 7.1.1 GitHub Repository\n Terraform Cloud Workspace\n 7.1.2 DNS Configuration\n Top-Level Domain\n Subdomain\n Delete Route53 Records\n 7.2 Solution Architecture\n 7.3 Networking\n 7.3.1 Network Module\n 7.3.2 Network Tags\n 7.3.3 Security Groups\n 7.4 Database\n 7.4.1 Database Module\n 7.4.2 Database Configuration and Secrets\n 7.5 Kubernetes\n 7.5.1 EKS\n 7.5.2 EKS Module\n 7.5.3 EKS Worker Nodes\n 7.5.4 EKS Security Groups\n 7.5.5 EKS Ingress Controller\n 7.6 DNS\n 7.6.1 Route53 Record Creation\n 7.6.2 Multi-environment DNS\n 7.6.3 ACM\n 7.7 Application\n 7.7.1 Namespace\n 7.7.2 Deployment\n 7.7.3 NodePort Service\n 7.7.4 Ingress\n 7.7.5 Kubernetes Provider\n 7.7.6 Variables\n 7.7.7 Default Environment\n 7.8 Execution\n 7.8.1 Setting Up the EKS Cluster\n 7.8.2 Accessing the EKS Cluster\n 7.9 Clean-Up\n 7.10 Conclusion\nChapter 8: Authentication and  Authorization\n 8.1 Prerequisites\n 8.1.1 Code Update\n 8.2 AWS Organizations\n 8.2.1 Root Account\n 8.2.2 Member Accounts and OUs\n 8.2.3 AWS Provider\n 8.3 AWS IAM\n 8.3.1 IAM Users\n 8.3.2 IAM Groups\n 8.3.3 IAM Roles\n 8.4 AWS Route53\n 8.5 Executing Global\n 8.5.1 Generate GNU PG Keys\n 8.5.2 Configure Variables\n 8.5.3 Terraform Cloud Workspace\n 8.5.4 Terraform Apply\n 8.5.5 Terraform Output\n Account IDs\n Links\n Name Servers\n Users\n 8.5.6 Possible Issues\n Email Already Exists\n AWS Subscription Not Found\n 8.6 EKS Authz\n 8.6.1 EKS Client Authentication\n 8.6.2 EKS Node Authentication\n 8.6.3 Provider Configuration\n 8.7 Executing Infra\n 8.7.1 AWS Profiles\n 8.7.2 Development\n 8.7.3 Staging\n 8.7.4 Prod\n 8.8 EKS Access Control\n 8.9 Clean-Up\n 8.9.1 Dev\n 8.9.2 Staging/Prod\n 8.10 Conclusion\nChapter 9: Security and Secrets Management\n 9.1 Code Update\n 9.1.1 Committing only Global\n 9.1.2 Committing Infra\n 9.2 Enhancing EKS Security\n 9.2.1 Encrypting K8s Secrets\n 9.2.2 Encrypting EKS EBS\n 9.2.3 Enhancing EC2 Metadata Security\n 9.3 Enhancing AWS ALB Security\n 9.4 Restricting RDS Exposure\n 9.5 Secrets Exposure\n 9.5.1 Terraform State\n 9.5.2 Kubernetes Deployment Descriptions\n 9.6 AWS Secrets Manager\n 9.6.1 Secrets Management Design\n Current Solution\n New Solution\n 9.6.2 Secrets Store CSI Driver\n 9.7 IRSA\n 9.7.1 Background\n 9.7.2 Internal Working\n 9.7.3 IAM Permissions Policy\n 9.8 Checkov Scanning\n 9.8.1 Checkov in Action\n 9.9 Service Control Policies\n 9.9.1 SCP in Action\n 9.10 Clean-Up\n 9.11 Conclusion\nChapter 10: Observability\n 10.1 Code Update\n 10.1.1 Committing Only Global\n 10.1.2 Committing Infra\n 10.2 Executing Infra\n 10.3 Organization Trail\n 10.4 CloudWatch Alarm\n 10.4.1 Configuring AWS SNS\n 10.4.2 Configuring CloudWatch Alarm\n 10.4.3 Root Login Alarm in Action\n 10.5 Master Account Login\n 10.6 ALB Access Logs\n 10.7 Logging\n 10.7.1 Exploring OpenSearch\n 10.8 Monitoring\n 10.8.1 Exploring Grafana\n 10.9 Karpenter Autoscaler\n 10.9.1 Karpenter in Action\n 10.10 Upgrading Kubernetes\n 10.11 Clean-Up\n 10.12 Conclusion\nAnnexure A: Manually Delete Resources\nAnnexure B: Terraform Cloud Destroy Problem\nAnnexure C: Code Compatibility on OS\n C.1 Mac M1\n C.2 Windows Native (cmd.exe)\n C.3 WSL2 (Ubuntu)\nIndex




پست ها تصادفی