Hands-On Cloud Development with WildFly

Author: Tomasz Adamski  

Publisher: Packt Publishing‎

Publication year: 2018

E-ISBN: 9781787283800

P-ISBN(Paperback): 89543100831180

Subject: TP301.6 algorithm theory

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Hands-On Cloud Development with WildFly

Chapter

Implementation of Java EE standard

Current development trends

Cloud computing

Microservices

Advantages of implementing microservices

Challenges of implementing microservices

When to adopt the microservice architecture

Microservices and the cloud

Java EE microservices

The goal of the book

The pet store application

The technologies used

Summary

Further reading

Chapter 2: Getting Familiar with WildFly Swarm

Introducing WildFly

Performance

Extensible nature

Deployment model

Meet WildFly Swarm

Java EE application

Adapting to WildFly Swarm

Does it really work?

What has just happened here?

Summary

Further reading

Chapter 3: Right-Sizing Your Services

Catalog service

Draft version

Fractions

Fraction detection

Fraction detection mode

Thin and hollow JARs

Using hollow JARs

Using thin JARs

Summary

Chapter 4: Tuning the Configuration of Your Services

Modifying Swarm configuration

System properties

Implementing your own main class

The Swarm class

Providing the configuration

Using your own main along with properties

Java API

Modifying your archive

The ShrinkWrap API

Obtaining the default archive

Swarm ShrinkWrap extensions

JARArchive

WARArchive

JAXRSArchive

 XML configuration

YAML configuration

Project stages

YAML database configuration

Mixing the configurations

Summary

Further reading

Chapter 5: Testing Your Services with Arquillian

Introducing Arquillian

Testing Swarm microservices with Arquillian

The default deployment

Swarm configuration

Testing from a standalone client

Summary

Further reading

Chapter 6: Deploying Applications on the Cloud with OpenShift

Cloud computing

The cloud infrastructure deployment model

The public cloud

The private cloud

The hybrid cloud

The service model

Infrastructure as a Service

Platform as a Service

Software as a Service

The OpenShift architecture

Containerization

Virtualization

Containers

Kernel isolation tools

Namespaces

cgroups

The Docker implementation of containers

Images and containers

Docker registries

Docker wrap-up

Orchestrating Docker

Kubernetes

Nodes and master services

Volumes

Pods

Deployments

Services

Labels

Benefits

OpenShift

The build infrastructure

Management of projects and users

Minishift

Installation

Starting the cluster

Web console

YAML notation

CLI

Catalog-service on the OpenShift example

Summary

Further reading

Chapter 7: Configuring Storage for Your Applications

OpenShift storage concepts

Volumes

Empty directory

Host path

Remote filesystems

PersistentVolume and PersistentVolumeClaims

The catalog-service with database

Configuring PostgreSQL database

Inspecting the volumes

Updating catalog-service

Summary

Chapter 8: Scaling and Connecting Your Services

Deployments

Learning the basics of ReplicationController

Load balancing

Service discovery

New services

The pricing service

The customer gateway service

Environment variables

DNS discovery

Summary

Chapter 9: Configuring Continuous Integration Using Jenkins

Learning OpenShift builds

Learning about the source-to-image build

Configuring environment variables

The whole source-to-image algorithm

Source-to-image summary

The developer view

Pipeline build

Continuous integration

Continuous deployment

Deployment pipeline

Configuring Continuous Deployment in OpenShift environments

Introducing Jenkins

Our first pipeline

Pipeline syntax language

Core pipeline elements

Standard Maven operation

OpenShift Pipeline Plugin

Summary

Further reading

Chapter 10: Providing Security Using Keycloak

Token-based security

Rationale

A basic architecture

OpenID Connect

Authentication code flow

Introducing Keycloak

Cart-service

Installing Keycloak

Creating realm

Create a client

Users and roles

Scopes

Cart service

WildFly Swarm Keycloak adapter

SSL configuration

Secured cloud

Unsecured cloud

Summary

Further reading

Chapter 11: Adding Resilience Using Hystrix

Unreliable network

Dependent services

The circuit breaker pattern

The Hystrix circuit breaker

Bulkheading

Fallbacks

The whole algorithm

Using Hystrix

Summary

Further reading

Chapter 12: Future Direction

No more standards?

Eclipse MicroProfile

Jakarta EE

Summary

Further reading

Other Books You May Enjoy

Index

The users who browse this book also browse