ebook img

Hardening Azure Applications Techniques and Principles for Building Large-Scale, Mission-Critical Applications PDF

268 Pages·2019·32.7633 MB·english
Save to my drive
Quick download
Download

Download Hardening Azure Applications Techniques and Principles for Building Large-Scale, Mission-Critical Applications PDF Free - Full Version

About Hardening Azure Applications Techniques and Principles for Building Large-Scale, Mission-Critical Applications

<p>Table of Contents</p><p>Chapter 1: Introducing the Cloud Computing Platform ............................................. 1</p><p>Cloud and Platform ....................................................................................................................... 1</p><p>Relevance of the Cloud Platform ................................................................................................... 2</p><p>Cloud Platform Benefits ................................................................................................................ 3</p><p>Your Application and Cloud Platform Matchup .............................................................................. 3</p><p>Does Your Application Belong on the Cloud Platform? ............................................................ 3</p><p>Is the Cloud Platform Ready for Your Enterprise-Class Application? ....................................... 4</p><p>On-premises and Cloud Platform Integration ................................................................................ 5</p><p>Heterogeneity of the Cloud Platform ............................................................................................. 6</p><p>Trust and Security ......................................................................................................................... 6</p><p>Cloud Platform Services ................................................................................................................ 7</p><p>Compute Services ................................................................................................................... 9</p><p>Networking ............................................................................................................................ 18</p><p>Storage and Data Services .................................................................................................... 23</p><p>App Services .......................................................................................................................... 33</p><p>Summary .................................................................................................................................... 41</p><p>About the Authors .................................................................................................... xi</p><p>About the Technical Reviewer ............................................................................... xiii</p><p>Acknowledgments ...................................................................................................xv</p><p>Foreword ...............................................................................................................xvii</p><p>Additional Foreword ...............................................................................................xix</p><p>Introduction ............................................................................................................xxi</p><p>vi</p><p>Chapter 2: Cloud Applications ................................................................................ 43</p><p>Cloud Application Platforms ........................................................................................................ 43</p><p>What’s aaS? ........................................................................................................................... 43</p><p>Platform Types ....................................................................................................................... 45</p><p>Infrastructure as a Service (IaaS) .......................................................................................... 49</p><p>Platform as a Service (PaaS) ................................................................................................. 50</p><p>Software as a Service (SaaS) ................................................................................................ 53</p><p>Other Cloud Application Platforms .............................................................................................. 55</p><p>Cloud Web Services ............................................................................................................... 55</p><p>Cloud Managed Services ....................................................................................................... 56</p><p>Cloud Application Deployment Models ........................................................................................ 56</p><p>Public Cloud ........................................................................................................................... 56</p><p>Private Cloud ......................................................................................................................... 57</p><p>Hybrid Cloud .......................................................................................................................... 58</p><p>Summary .................................................................................................................................... 59</p><p>Chapter 3: Hardened Cloud Applications ................................................................ 61</p><p>Hardened Applications ................................................................................................................ 61</p><p>Hello World vs. Real-World? ........................................................................................................ 62</p><p>Real-World and Hardened Applications ...................................................................................... 63</p><p>Availability ............................................................................................................................. 64</p><p>Reliability ............................................................................................................................... 69</p><p>Scalability .............................................................................................................................. 71</p><p>Recoverability ........................................................................................................................ 73</p><p>Security ................................................................................................................................. 75</p><p>Low Latency .......................................................................................................................... 78</p><p>Modern Organization ................................................................................................................... 79</p><p>Engineering ........................................................................................................................... 79</p><p>Support .................................................................................................................................. 86</p><p>Summary .................................................................................................................................... 87</p><p>Table of Contents</p><p>vii</p><p>Chapter 4: Service Fundamentals: Instrumentation, Telemetry,</p><p>and Monitoring ....................................................................................................... 89</p><p>Instrumentation ........................................................................................................................... 90</p><p>Best Practices for Designing Instrumentation ....................................................................... 90</p><p>High-Value and High-Volume Data ........................................................................................ 92</p><p>Event Tracing ......................................................................................................................... 93</p><p>Azure Diagnostics .................................................................................................................. 95</p><p>Telemetry .................................................................................................................................... 96</p><p>Best Practices for Designing Telemetry ................................................................................. 96</p><p>Monitoring ................................................................................................................................... 98</p><p>Typical Monitoring Solutions (Azure Network Watcher) ......................................................... 99</p><p>Best Practices for Designing Monitoring ............................................................................. 102</p><p>Vendor and Third-Party Solutions ............................................................................................. 118</p><p>Summary .................................................................................................................................. 122</p><p>Chapter 5: Key Application Experiences: Latency, Scalability,</p><p>and Throughput .................................................................................................... 123</p><p>Latency ..................................................................................................................................... 123</p><p>Factors That Affect Latency ................................................................................................. 124</p><p>Best Practices ...................................................................................................................... 124</p><p>Scalability ................................................................................................................................. 130</p><p>Scaling Up ........................................................................................................................... 130</p><p>Scaling Out .......................................................................................................................... 131</p><p>Best Practices ...................................................................................................................... 132</p><p>Throughput ................................................................................................................................ 137</p><p>Best Practices ...................................................................................................................... 137</p><p>Summary .................................................................................................................................. 139</p><p>Table of Contents</p><p>viii</p><p>Chapter 6: Failures and Their Inevitability ........................................................... 141</p><p>Case Studies of Major Cloud Service Failures .......................................................................... 142</p><p>Azure Storage Server Failure ............................................................................................... 142</p><p>Amazon Web Services Failure ............................................................................................. 143</p><p>Measuring Failures ................................................................................................................... 143</p><p>Failure Categories ..................................................................................................................... 145</p><p>Hard Failure ......................................................................................................................... 145</p><p>Soft Failure .......................................................................................................................... 146</p><p>Gray Failure ......................................................................................................................... 146</p><p>Preparing for Failure ................................................................................................................. 148</p><p>Design for Failure and a Quick Recovery ............................................................................ 149</p><p>Minimizing Human Error ...................................................................................................... 150</p><p>Summary .................................................................................................................................. 153</p><p>Chapter 7: Failures and Recovery ......................................................................... 155</p><p>Design Best Practices ............................................................................................................... 156</p><p>Failure Domain .................................................................................................................... 156</p><p>Loose Coupling .................................................................................................................... 158</p><p>Scale Out to More for Less .................................................................................................. 158</p><p>Testing Best Practices ............................................................................................................... 160</p><p>Sandboxing .......................................................................................................................... 161</p><p>Scenario Testing .................................................................................................................. 164</p><p>Failure-Detection Strategies ..................................................................................................... 165</p><p>IaaS Virtual Infrastructure .................................................................................................... 165</p><p>PaaS Application .................................................................................................................. 167</p><p>Databases ............................................................................................................................ 167</p><p>Storage ................................................................................................................................ 168</p><p>Network ............................................................................................................................... 168</p><p>Strategies for Recovery ............................................................................................................ 168</p><p>Dev-Test-Ops Organization .................................................................................................. 169</p><p>Remote Script Execution ..................................................................................................... 171</p><p>Summary .................................................................................................................................. 172</p><p>Table of Contents</p><p>ix</p><p>Chapter 8: High Availability, Scalability, and Disaster Recovery .......................... 173</p><p>High Availability ......................................................................................................................... 173</p><p>Asynchronous Messaging .................................................................................................... 175</p><p>Atomic and Idempotent Services ......................................................................................... 175</p><p>Graceful Degradation ........................................................................................................... 175</p><p>Offline Access ...................................................................................................................... 176</p><p>Scalability ................................................................................................................................. 176</p><p>Implementation Patterns ..................................................................................................... 178</p><p>Disaster Recovery ..................................................................................................................... 183</p><p>PaaS—SQL Offering ............................................................................................................ 183</p><p>PaaS—Storage .................................................................................................................... 189</p><p>IaaS—SQL Server as a Virtual Machine Offering ................................................................ 192</p><p>Summary .................................................................................................................................. 195</p><p>Chapter 9: Availability and Economics of 9s ........................................................ 197</p><p>Economics of 9s ........................................................................................................................ 198</p><p>Economics of (Non)-Availability ................................................................................................ 198</p><p>Computing Availability ............................................................................................................... 199</p><p>Monitoring Availability ............................................................................................................... 201</p><p>Enforcing Availability via SLA .................................................................................................... 204</p><p>Designing for SLA ..................................................................................................................... 205</p><p>Redundant System .............................................................................................................. 206</p><p>Cold Standby System ........................................................................................................... 206</p><p>Warm Standby System ........................................................................................................ 206</p><p>Automatic Failover System .................................................................................................. 207</p><p>Always Available System ..................................................................................................... 208</p><p>Economics of Downtime and Availability .................................................................................. 209</p><p>Downtime Costs .................................................................................................................. 210</p><p>Availability Costs ................................................................................................................. 210</p><p>Summary .................................................................................................................................. 210</p><p>Table of Contents</p><p>x</p>

Detailed Information

Author:Suren Machiraju Suraj Gaurav Foreword by Scott Guthrie and Steven Smith
Publication Year:2019
Pages:268
Language:english
File Size:32.7633
Format:PDF
Price:FREE
Download Free PDF

Safe & Secure Download - No registration required

Why Choose PDFdrive for Your Free Hardening Azure Applications Techniques and Principles for Building Large-Scale, Mission-Critical Applications Download?

  • 100% Free: No hidden fees or subscriptions required for one book every day.
  • No Registration: Immediate access is available without creating accounts for one book every day.
  • Safe and Secure: Clean downloads without malware or viruses
  • Multiple Formats: PDF, MOBI, Mpub,... optimized for all devices
  • Educational Resource: Supporting knowledge sharing and learning

Frequently Asked Questions

Is it really free to download Hardening Azure Applications Techniques and Principles for Building Large-Scale, Mission-Critical Applications PDF?

Yes, on https://PDFdrive.to you can download Hardening Azure Applications Techniques and Principles for Building Large-Scale, Mission-Critical Applications by Suren Machiraju Suraj Gaurav Foreword by Scott Guthrie and Steven Smith completely free. We don't require any payment, subscription, or registration to access this PDF file. For 3 books every day.

How can I read Hardening Azure Applications Techniques and Principles for Building Large-Scale, Mission-Critical Applications on my mobile device?

After downloading Hardening Azure Applications Techniques and Principles for Building Large-Scale, Mission-Critical Applications PDF, you can open it with any PDF reader app on your phone or tablet. We recommend using Adobe Acrobat Reader, Apple Books, or Google Play Books for the best reading experience.

Is this the full version of Hardening Azure Applications Techniques and Principles for Building Large-Scale, Mission-Critical Applications?

Yes, this is the complete PDF version of Hardening Azure Applications Techniques and Principles for Building Large-Scale, Mission-Critical Applications by Suren Machiraju Suraj Gaurav Foreword by Scott Guthrie and Steven Smith. You will be able to read the entire content as in the printed version without missing any pages.

Is it legal to download Hardening Azure Applications Techniques and Principles for Building Large-Scale, Mission-Critical Applications PDF for free?

https://PDFdrive.to provides links to free educational resources available online. We do not store any files on our servers. Please be aware of copyright laws in your country before downloading.

The materials shared are intended for research, educational, and personal use in accordance with fair use principles.