Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Cloud Foundry for Developers

You're reading from   Cloud Foundry for Developers Deploy, manage, and orchestrate cloud-native applications with ease

Arrow left icon
Product type Paperback
Published in Nov 2017
Publisher Packt
ISBN-13 9781788391443
Length 306 pages
Edition 1st Edition
Languages
Arrow right icon
Authors (3):
Arrow left icon
David Wu David Wu
Author Profile Icon David Wu
David Wu
Rick Farmer Rick Farmer
Author Profile Icon Rick Farmer
Rick Farmer
Rahul Kumar Jain Rahul Kumar Jain
Author Profile Icon Rahul Kumar Jain
Rahul Kumar Jain
Arrow right icon
View More author details
Toc

Table of Contents (12) Chapters Close

Preface 1. Cloud Foundry Introduction FREE CHAPTER 2. Cloud Foundry CLI and Apps Manager 3. Getting Started with PCF Dev 4. Users, Orgs, Spaces, and Roles 5. Architecting and Building Apps for the Cloud 6. Deploying Apps to Cloud Foundry 7. Microservices and Worker Applications 8. Services and Service Brokers 9. Buildpacks 10. Troubleshooting Applications in Cloud Foundry 11. Continuous Integration and Continuous Deployment

Services


In Chapter 5, Architecting and Building Applications for the Cloud, one of the necessary requirements for achieving Cloud Ready applications were backing services. A backing service, or service for short, is quite simply any networked service that an application will consume. For example, MySQL, SQL Server, and S3 Blob stores for DataStores, RabbitMQ for messaging and emailing services. Note that when we say service, it corresponds to a blueprint of that service. In order for applications to use the service, we must create an instance of the service, or what we call a service instance. Once these service instances are created, an application instance can use these once they are bounded.

That is, these services are actually accessed by application code through some URL or some other form of a locator that potentially require credentials, that is, this could be some form of connection string. When this happens, we say that an application is now bounded to a service instance. For the...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime