2. DaShaun Carter
505 days as Spring Developer Advocate, VMware
Tanzu
411 days as Sr. Partner Solution Architect, Redis
845 days as Sr. Platform Architect,
Pivotal/VMware
985 days as VP of Engineering, Mobile Capital
Group/MedZero
1995 days as Tech Lead Engineer, Garmin Connect
16. Beyond the Twelve-Factor App
Title: Beyond the Twelve-Factor App
Author: Kevin Hoffman
Release date: April 2016
Publisher: O'Reilly Media, Inc.
ISBN: 9781491944035
https://www.oreilly.com/library/view/beyond-the-
twelve-factor/9781492042631/
37. 5. Configuration, credentials and code
Treat configuration, credentials, and code
as volatile substances that explode when combined.
38. TREAT YOUR APPS LIKE OPEN SOURCE
A litmus test
to see if you have properly externalized
your credentials and configuration
is to imagine the consequences
of your application’s source code
being pushed to GitHub.
39. Brute Force Method
1. Remove all configuration files from your artifact
2. Externalize configurations as needed until resolved
49. 8. Backing Services
data stores
messaging systems
caching systems
security
A backing service is any service
on which your application relies
for its functionality.
51. Small Print 1
An application should declare
its need for a given backing service
but allow the cloud environment
to perform the actual resource binding.
52. Small Print 2
The binding of an application
to its backing services
should be done via
external configuration.
53. Small Print 3
It should be possible to attach
and detach backing services
from an application at will,
without re-deploying the application.
72. Embrace continuous integration,
continuous delivery,
and the production of applications
designed to thrive in the cloud,
and you will reap rewards far and above
just what you get from a cloud-native world.
- Kevin Hoffman