Book Image

Hands-On Microservices with Kubernetes

By : Gigi Sayfan
Book Image

Hands-On Microservices with Kubernetes

By: Gigi Sayfan

Overview of this book

Kubernetes is among the most popular open source platforms for automating the deployment, scaling, and operations of application containers across clusters of hosts, providing a container-centric infrastructure. Hands-On Microservices with Kubernetes starts by providing you with in-depth insights into the synergy between Kubernetes and microservices. You will learn how to use Delinkcious, which will serve as a live lab throughout the book to help you understand microservices and Kubernetes concepts in the context of a real-world application. Next, you will get up to speed with setting up a CI/CD pipeline and configuring microservices using Kubernetes ConfigMaps. As you cover later chapters, you will gain hands-on experience in securing microservices and implementing REST, gRPC APIs, and a Delinkcious data store. In addition to this, you’ll explore the Nuclio project, run a serverless task on Kubernetes, and manage and implement data-intensive tests. Toward the concluding chapters, you’ll deploy microservices on Kubernetes and learn to maintain a well-monitored system. Finally, you’ll discover the importance of service meshes and how to incorporate Istio into the Delinkcious cluster. By the end of this book, you’ll have gained the skills you need to implement microservices on Kubernetes with the help of effective tools and best practices.
Table of Contents (16 chapters)

What is configuration all about?

Configuration is a very overloaded term. Let's define it clearly for our purpose here: configuration mostly refers to operational data that's needed for computation. The configuration may be different between environments. Here are some typical configuration items:

  • Service discovery
  • Support testing
  • Environment-specific metadata
  • Secrets
  • Third-party configuration
  • Feature flags
  • Timeouts
  • Rate limits
  • Various defaults

In general, the code that processes the input data utilizes configuration data to control operational aspects of the computation, but not algorithmic aspects. There are special cases where, via configuration, you can switch between different algorithms at runtime, but that's crossing into gray areas. Let's keep it simple for our purposes.

When considering configuration, it's important to think about who is supposed...