• Keine Ergebnisse gefunden

Cloud Computing

N/A
N/A
Protected

Academic year: 2021

Aktie "Cloud Computing"

Copied!
5
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Cloud Computing

Project Presentation

1

Containerization of a Web Application Using Docker and Container Orchestration using Kubernetes

Md Zahirul Islam

Kantish Roy Chowdhury Mansur Uddin Khan

High Integrity System (MSc.)

Frankfurt University of Applied Sciences

(2)

Goals and Objectives

2

Gather knowledge over Cloud Computing concepts and implement in a project specific task

Deploy the containerized web application to Kubernetes cluster in public cloud

Bridge the gap between development, and operational activities (build, test, and deployment)

Deployment process of container from local to public cloud Kubernetes cluster of both manual and automated approach

Accelerate portability and reproducibility of a simple web application integration to cloud

(3)

System Architecture and Tools

3

(4)

Practical Orientations

4

Hands on development process

Containerization of Local and Google Kubernetes Cluster

CI/CD with Jenkins

Reference: Project Reports for in details commands, and Results/Discussions

(5)

Questions and Answers

5

Q1: How did we create the system architecture as google cloud platform image looks different?

Ans1: The System Architecture is drawn using Lucidchart – Online Diagram Software & Visual Solutions (Ref. www.lucidchart.com)

Q2: What is your web application and how can we access it?

Ans2: The application is a simple web application of 3 books in the list.

The service of the application can be accessible from external IP what is already deployed in

cloud, and can accessible globally. For in details, see Project Report : Section 6.2 where the automation

with Jenkins help when any further updates of the application append by the developers, and user can get

the service at the same time using Docker, Kubernetes, Google Cloud.

Referenzen

ÄHNLICHE DOKUMENTE

The SkIDentity Identity Selector pops up to show the user which credentials are available for authentication at the cloud service (see Figure 3).. After the user has selected his

As Davis notes, mobile and pervasive computing can significantly increase the availability of information to knowledge workers and the level of detail of such information (due

 By clicking on the third icon, the user will be able to go to the main feed of the application (feed), where random photos uploaded by other users will be displayed

In the history of political and economic culture of the world, facts have suggested that, while considering the relevant issues, intellectual effect can very well prevent the

The input of the Univac consists of a number of magnetic tape units called Uniservos which will read the information recorded on tape into an input register,

In this paper we argue that embracing cloud computing is fundamental for the telecommunication industry, and focus on the privacy, trust and security challenges and requirements

During the reporting period of April 1 to September 30, 2012, the Coalition and our Afghan partners blunted the insurgent summer offensive, continued to transition the Afghan National

• Whether the researcher critically examined their own role, potential bias and influence during analysis and selection of data for presentation Can’t