Book Image

Achieving Digital Transformation Using Hybrid Cloud

By : Vikas Grover, Ishu Verma, Praveen Rajagopalan
Book Image

Achieving Digital Transformation Using Hybrid Cloud

By: Vikas Grover, Ishu Verma, Praveen Rajagopalan

Overview of this book

Hybrid cloud technology can be leveraged by organizations aiming to build next-gen applications while safeguarding prior technological investments. This book will help you explore different hybrid cloud architectural patterns, whether designing new projects or migrating legacy applications to the cloud. You'll learn about the key building blocks of hybrid cloud enabling you to deploy, manage, and secure applications and data while porting the workloads between environments without rebuilding. Further, you’ll explore Kubernetes, GitOps, and Layer 3/7 services to reduce operational complexity. You'll also learn about nuances of security and compliance in hybrid cloud followed by the economics of hybrid cloud. You’ll gain a deep understanding of the concepts with use cases from telecom 5G and industrial manufacturing, giving you a glimpse into real industry problems resolved by hybrid cloud, and unlocking millions of dollars of opportunities for enterprises. By the end of this book, you'll be well-equipped to design and develop efficient hybrid cloud strategies, lead conversations with senior IT and business executives, and succeed in hybrid cloud implementation or transformation opportunities.
Table of Contents (12 chapters)
1
Part 1: Containers, Kubernetes, and DevOps for Hybrid Cloud
6
Part 2: Design Patterns, DevOps, and GitOps

How to publish services

Kubernetes employs Services to enable access to a set of pods that share a common label selector. This allows communication between applications within the cluster and makes it possible to expose applications running in the cluster to external entities, as depicted in the following figure:

Figure 4.16 – K8s service exposure types

Figure 4.16 – K8s service exposure types

Kubernetes offers different service types that allow you to specify how a service should be exposed. Here are the three main types:

  • ClusterIP: ClusterIP is the default service type that restricts access to a Service to within the cluster only. This is useful for applications that need to communicate with each other within the cluster but do not need to be accessed from outside the cluster.
  • NodePort: By using this configuration, the Service becomes accessible from external sources outside of the cluster. To achieve this, a specific port is opened on all nodes to forward traffic to the...