Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
OpenStack in Action

Buy
OpenStack in Action, 9781617292163 (1617292168), Manning Publications, 2016

Summary

OpenStack in Action offers the real world use cases and step-by-step instructions you can take to develop your own cloud platform from from inception to deployment. This book guides you through the design of both the physical hardware cluster and the infrastructure services you'll need to create a custom cloud platform.

Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.

About the Technology

OpenStack is an open source framework that lets you create a private or public cloud platform on your own physical servers. You build custom infrastructure, platform, and software services without the expense and vendor lock-in associated with proprietary cloud platforms like Amazon Web Services and Microsoft Azure. With an OpenStack private cloud, you can get increased security, more control, improved reliability, and lower costs.

About the Book

OpenStack in Action offers real-world use cases and step-by-step instructions on how to develop your own cloud platform. This book guides you through the design of both the physical hardware cluster and the infrastructure services you'll need. You'll learn how to select and set up virtual and physical servers, how to implement software-defined networking, and technical details of designing, deploying, and operating an OpenStack cloud in your enterprise. You'll also discover how to best tailor your OpenStack deployment for your environment. Finally, you'll learn how your cloud can offer user-facing software and infrastructure services.

What's Inside

  • Develop and deploy an enterprise private cloud
  • Private cloud technologies from an IT perspective
  • Organizational impact of self-service cloud computing

About the Reader

No prior knowledge of OpenStack or cloud development is assumed.

About the Author

Cody Bumgardner is the Chief Technology Architect at a large university where he is responsible for the architecture, deployment, and long-term strategy of OpenStack private clouds and other cloud computing initiatives.

Table of Contents

PART 1 GETTING STARTED

PART 2 WALKING THROUGH A MANUAL DEPLOYMENT

PART 3 BUILDING A PRODUCTION ENVIRONMENT

  1. Introducing OpenStack
  2. Taking an OpenStack test-drive
  3. Learning basic OpenStack operations
  4. Understanding private cloud building blocks
  5. Walking through a Controller deployment
  6. Walking through a Networking deployment
  7. Walking through a Block Storage deployment
  8. Walking through a Compute deployment
  9. Architecting your OpenStack
  10. Deploying Ceph
  11. Automated HA OpenStack deployment with Fuel
  12. Cloud orchestration using OpenStack
(HTML tags aren't allowed.)

Building Maintainable Software, C# Edition: Ten Guidelines for Future-Proof Code
Building Maintainable Software, C# Edition: Ten Guidelines for Future-Proof Code

Have you ever felt frustrated working with someone else’s code? Difficult-to-maintain source code is a big problem in software development today, leading to costly delays and defects. Be part of the solution. With this practical book, you’ll learn 10 easy-to-follow guidelines for delivering C# software that’s easy...

Mastering Wireless Penetration Testing for Highly-Secured Environments
Mastering Wireless Penetration Testing for Highly-Secured Environments

Scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals

About This Book

  • Conduct a full wireless penetration test and implement defensive techniques that can be used to protect wireless systems
  • Crack WEP, WPA, and even WPA2 wireless...
Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)
Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)

Master Bayesian Inference through Practical Examples and Computation–Without Advanced Mathematical Analysis

 

Bayesian methods of inference are deeply natural and extremely powerful. However, most discussions of Bayesian inference rely...


Agile Application Security: Enabling Security in a Continuous Delivery Pipeline
Agile Application Security: Enabling Security in a Continuous Delivery Pipeline

Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally hasn't integrated well with traditional security management techniques. And most security professionals aren’t up to speed in their understanding and experience of agile development. To help bridge the...

Project Management Checklists For Dummies
Project Management Checklists For Dummies

Your must-have tool for perfect project management

Want to take your career to the next level and be a master of planning, organising, motivating and controlling resources to meet your goals? This easy-to-use guide has you covered! Project Management Checklists For Dummies takes the intimidation out of project...

Understanding Network Hacks: Attack and Defense with Python
Understanding Network Hacks: Attack and Defense with Python

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore...

©2018 LearnIT (support@pdfchm.net) - Privacy Policy