Book Image

Cloud Native Python

By : Manish Sethi
Book Image

Cloud Native Python

By: Manish Sethi

Overview of this book

Businesses today are evolving so rapidly that having their own infrastructure to support their expansion is not feasible. As a result, they have been resorting to the elasticity of the cloud to provide a platform to build and deploy their highly scalable applications. This book will be the one stop for you to learn all about building cloud-native architectures in Python. It will begin by introducing you to cloud-native architecture and will help break it down for you. Then you’ll learn how to build microservices in Python using REST APIs in an event driven approach and you will build the web layer. Next, you’ll learn about Interacting data services and building Web views with React, after which we will take a detailed look at application security and performance. Then, you’ll also learn how to Dockerize your services. And finally, you’ll learn how to deploy the application on the AWS and Azure platforms. We will end the book by discussing some concepts and techniques around troubleshooting problems that might occur with your applications after you’ve deployed them. This book will teach you how to craft applications that are built as small standard units, using all the proven best practices and avoiding the usual traps. It's a practical book: we're going to build everything using Python 3 and its amazing tooling ecosystem. The book will take you on a journey, the destination of which, is the creation of a complete Python application based on microservices over the cloud platform
Table of Contents (14 chapters)
Creating UIs to Scale with Flux

A word on developing security-enabled web applications

With an increase in web applications on the World Wide Web (WWW), the concerns over application security have increased as well. Now, the first question that arises in our mind is why we need security-enabled applications--the answer to this is quite obvious. But what are its essential principles? Following are the principles that we should keep in mind:

  • A hacker can easily exploit your application if he gets familiar with the language in which the application got created. That's why, we enable techniques such as CORS to secure our code.
  • Access to the application and its data should be given to very limited people in your organization.
  • A way of authentication, authorization secures your application from both, the WWW as well as within your private network.

All these factors, or as I would say, principles, drive us to...