About the Authors |
|
xi | |
About the Technical Reviewer |
|
xiii | |
Acknowledgments |
|
xv | |
Foreword |
|
xvii | |
Additional Foreword |
|
xix | |
Introduction |
|
xxi | |
|
Chapter 1 Introducing the Cloud Computing Platform |
|
|
1 | (42) |
|
|
1 | (1) |
|
Relevance of the Cloud Platform |
|
|
2 | (1) |
|
|
3 | (1) |
|
Your Application and Cloud Platform Matchup |
|
|
3 | (2) |
|
Does Your Application Belong on the Cloud Platform? |
|
|
3 | (1) |
|
Is the Cloud Platform Ready for Your Enterprise-Class Application? |
|
|
4 | (1) |
|
On-premises and Cloud Platform Integration |
|
|
5 | (1) |
|
Heterogeneity of the Cloud Platform |
|
|
6 | (1) |
|
|
6 | (1) |
|
|
7 | (34) |
|
|
9 | (9) |
|
|
18 | (5) |
|
Storage and Data Services |
|
|
23 | (10) |
|
|
33 | (8) |
|
|
41 | (2) |
|
Chapter 2 Cloud Applications |
|
|
43 | (18) |
|
Cloud Application Platforms |
|
|
43 | (12) |
|
|
43 | (2) |
|
|
45 | (4) |
|
Infrastructure as a Service (laaS) |
|
|
49 | (1) |
|
Platform as a Service (PaaS) |
|
|
50 | (3) |
|
Software as a Service (SaaS) |
|
|
53 | (2) |
|
Other Cloud Application Platforms |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
56 | (1) |
|
Cloud Application Deployment Models |
|
|
56 | (3) |
|
|
56 | (1) |
|
|
57 | (1) |
|
|
58 | (1) |
|
|
59 | (2) |
|
Chapter 3 Hardened Cloud Applications |
|
|
61 | (28) |
|
|
61 | (1) |
|
Hello World vs. Real-World? |
|
|
62 | (1) |
|
Real-World and Hardened Applications |
|
|
63 | (16) |
|
|
64 | (5) |
|
|
69 | (2) |
|
|
71 | (2) |
|
|
73 | (2) |
|
|
75 | (3) |
|
|
78 | (1) |
|
|
79 | (8) |
|
|
79 | (7) |
|
|
86 | (1) |
|
|
87 | (2) |
|
Chapter 4 Service Fundamentals: Instrumentation, Telemetry, and Monitoring |
|
|
89 | (34) |
|
|
90 | (6) |
|
Best Practices for Designing Instrumentation |
|
|
90 | (2) |
|
High-Value and High-Volume Data |
|
|
92 | (1) |
|
|
93 | (2) |
|
|
95 | (1) |
|
|
96 | (2) |
|
Best Practices for Designing Telemetry |
|
|
96 | (2) |
|
|
98 | (20) |
|
Typical Monitoring Solutions (Azure Network Watcher) |
|
|
99 | (3) |
|
Best Practices for Designing Monitoring |
|
|
102 | (16) |
|
Vendor and Third-Party Solutions |
|
|
118 | (4) |
|
|
122 | (1) |
|
Chapter 5 Key Application Experiences: Latency, Scalability, and Throughput |
|
|
123 | (18) |
|
|
123 | (7) |
|
Factors That Affect Latency |
|
|
124 | (1) |
|
|
124 | (6) |
|
|
130 | (7) |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
132 | (5) |
|
|
137 | (2) |
|
|
137 | (2) |
|
|
139 | (2) |
|
Chapter 6 Failures and Their Inevitability |
|
|
141 | (14) |
|
Case Studies of Major Cloud Service Failures |
|
|
142 | (1) |
|
Azure Storage Server Failure |
|
|
142 | (1) |
|
Amazon Web Services Failure |
|
|
143 | (1) |
|
|
143 | (2) |
|
|
145 | (3) |
|
|
145 | (1) |
|
|
146 | (1) |
|
|
146 | (2) |
|
|
148 | (5) |
|
Design for Failure and a Quick Recovery |
|
|
149 | (1) |
|
|
150 | (3) |
|
|
153 | (2) |
|
Chapter 7 Failures and Recovery |
|
|
155 | (18) |
|
|
156 | (4) |
|
|
156 | (2) |
|
|
158 | (1) |
|
Scale Out to More for Less |
|
|
158 | (2) |
|
|
160 | (5) |
|
|
161 | (3) |
|
|
164 | (1) |
|
Failure-Detection Strategies |
|
|
165 | (3) |
|
IaaS Virtual Infrastructure |
|
|
165 | (2) |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
168 | (1) |
|
|
168 | (1) |
|
|
168 | (4) |
|
Dev-Test-Ops Organization |
|
|
169 | (2) |
|
|
171 | (1) |
|
|
172 | (1) |
|
Chapter 8 High Availability, Scalability, and Disaster Recovery |
|
|
173 | (24) |
|
|
173 | (3) |
|
|
175 | (1) |
|
Atomic and Idempotent Services |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
176 | (7) |
|
|
178 | (5) |
|
|
183 | (12) |
|
|
183 | (6) |
|
|
189 | (3) |
|
IaaS---SQL Server as a Virtual Machine Offering |
|
|
192 | (3) |
|
|
195 | (2) |
|
Chapter 9 Availability and Economics of 9s |
|
|
197 | (14) |
|
|
198 | (1) |
|
Economics of (Non)-Availability |
|
|
198 | (1) |
|
|
199 | (2) |
|
|
201 | (3) |
|
Enforcing Availability via SLA |
|
|
204 | (1) |
|
|
205 | (4) |
|
|
206 | (1) |
|
|
206 | (1) |
|
|
206 | (1) |
|
Automatic Failover System |
|
|
207 | (1) |
|
|
208 | (1) |
|
Economics of Downtime and Availability |
|
|
209 | (1) |
|
|
210 | (1) |
|
|
210 | (1) |
|
|
210 | (1) |
|
Chapter 10 Securing Your Application |
|
|
211 | (18) |
|
|
212 | (3) |
|
|
213 | (1) |
|
|
214 | (1) |
|
|
214 | (1) |
|
|
215 | (4) |
|
|
216 | (2) |
|
Compliance for Your Application |
|
|
218 | (1) |
|
Privacy and Data Security |
|
|
219 | (5) |
|
|
220 | (1) |
|
|
221 | (2) |
|
Roles and Responsibilities |
|
|
223 | (1) |
|
Cloud Application Security |
|
|
224 | (4) |
|
Application Vulnerabilities |
|
|
224 | (2) |
|
Building Secure Applications |
|
|
226 | (2) |
|
|
228 | (1) |
|
Chapter 11 The Modernization of Software Organizations |
|
|
229 | (18) |
|
|
229 | (1) |
|
|
230 | (2) |
|
|
232 | (13) |
|
|
232 | (4) |
|
|
236 | (5) |
|
|
241 | (3) |
|
|
244 | (1) |
|
|
245 | (2) |
Index |
|
247 | |