Technology Operating Models for Cloud and Edge by Ahilan Ponnusamy & Andreas Spanner

Technology Operating Models for Cloud and Edge by Ahilan Ponnusamy & Andreas Spanner

Author:Ahilan Ponnusamy & Andreas Spanner
Language: eng
Format: epub
Publisher: Packt
Published: 2023-01-15T00:00:00+00:00


Figure 5.9 – Traffic originating in Germany destined for a German website travels to the US and through US-owned infrastructure

Does your business benefit from cloud reversibility? That is, is your data, operations, and infrastructure layer abstracted so that it is possible to rebuild your entire application stack, including data, compute, and networking, in a different location via automation? This must include your engineering and release and deployment processes. Hence, your tooling needs to support hybrid multicloud and edge locations, independent of the technology provider. Some customers of ours regularly rebuild their tech stack every 60 to 90 days. This approach can also be reutilized if cybersecurity breaches occur or intrusions are detected as it allows for rebuilding, and increasing monitoring efforts while investigating what happened.

If confidential computing is part of your workloads, your operating model will have provision for that, too.

If you build your platform on managed services and even if those managed services are “borrowed” from the open source community, do you know what the additional operational source code, processes, and data look like? Can that managed search service still be regarded as open source?

All in all, there are many different viewpoints that organizations can look at within your platform dimension.

To conclude, this dimension’s concerns should cover disconnected platform operations, isolation requirements and the available multi- and single-tenancy models, environments across virtualized, bare-metal, on-premises, and third-party managed implementations, workload requirements for HPC, low latency, GPU, TPU, and other specialized workloads, environment specifications (ideally as code), operations only environments to test emerging procedures (in an SRE context, for example), build quality control for environments, including necessary verification testing, environment profiles supporting workload categorization, and associated requirements, control plane endpoints, cost management, and the control plane.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Kubernetes in Production Best Practices by Aly Saleh & Murat Karslioglu(6710)
Optimizing Microsoft Azure Workloads by Rithin Skaria(6249)
Kubernetes in Production Best Practices by Aly Saleh and Murat Karslioglu(5977)
Cloud Computing Demystified for Aspiring Professionals by David Santana(5088)
Zed Attack Proxy Cookbook by Ryan Soper & Nestor N Torres & Ahmed Almoailu(4509)
Google Cloud for Developers: Write, migrate, and extend your code by leveraging Google Cloud by Hector Parra Martinez(3536)
Mastering Cyber Intelligence by Jean Nestor M. Dahj;(3275)
AWS Observability Handbook by Phani Kumar Lingamallu & Fabio Braga de Oliveira(3159)
The Road to Azure Cost Governance by Paola E. Annis Giuliano Caglio(2808)
Microsoft 365 Fundamentals Guide by Gustavo Moraes and Douglas Romão(2252)
Agile Security Operations: Engineering for Agility in Cyber Defense, Detection, and Response by Hinne Hettema(1745)
Cloud Identity Patterns and Strategies: Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory by Giuseppe Di Federico Fabrizio Barcaroli(1734)
Bootstrapping Service Mesh Implementations with Istio by Anand Rai(1624)
The Road to Azure Cost Governance: Techniques to tame your monthly Azure bill with a continuous optimization journey for your apps by Paola E. Annis Giuliano Caglio(1262)
Agile Security Operations: Engineering for agility in cyber defense, detection, and response by Hinne Hettema(1197)
Zed Attack Proxy Cookbook: Hacking tactics, techniques, and procedures for testing web applications and APIs by Ryan Soper Nestor N Torres Ahmed Almoailu(1187)
Linux Administration Best Practices: Practical Solutions to Approaching the Design and Management of Linux Systems by Scott Alan Miller(1134)
DevSecOps in Practice with VMware Tanzu: Build, run, and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio by Parth Pandit Robert Hardt(1080)
Terraform for Google Cloud Essential Guide by Bernd Nordhausen(886)
Becoming KCNA Certified by Dmitry Galkin(871)