SlideShare ist ein Scribd-Unternehmen logo
1 von 45
blogs.karthikeyanvk.in
Pillars of a great Azure architecture
Karthikeyan VK
https://blogs.karthikeyanvk.in
@karthik3030
blogs.karthikeyanvk.in
Enter Text
Why Should I learn Pillars of a great Azure architecture ?
• Guides you to design, build, and continuously
improve a secure, reliable, and efficient application.
• One stop shop for designing non-functional
requirements for your cloud based project.
Green/Brown field projects.
• Building solution in cloud is hard.
blogs.karthikeyanvk.in
Enter Text
Why Should I learn Pillars of a great Azure architecture ?
• Role of a solution architect is not only to deliver
business value through the functional requirements
of the application, but to ensure the solution is
designed in ways that are scalable, resilient, efficient
and secure application(NFR’s).
blogs.karthikeyanvk.in
Enter Text
What are Pillars of a great Azure architecture ?
Four pillars of Great
Architecture
Security
Performance
and scalability
Availability
and
recoverability
Efficiency and
operations
blogs.karthikeyanvk.in
Enter Text Security
blogs.karthikeyanvk.in
Enter Text
Why Security?
• Data is the most valuable piece of your organization's
technical footprint.
• When a security breach occurs, there can be
substantial impacts to the finances and reputation of
both organizations and customers.
• Security must be throughout the entire lifecycle of
your application, from design and implementation to
deployment and operations
blogs.karthikeyanvk.in
Enter Text
Why Security?
• PCI(Payment Card Industry) for credit cards
• General Data Protection Regulation (GDPR) for
personal data.
• HIPAA for Healthcare.
• All Regulations are mandatory for running the
corresponding organization.
• Securing data is enforced by governments as law.
blogs.karthikeyanvk.in
Enter Text
What should I protect?
• Data could be sensitive data about customers,
financial information about your organization, or
critical line-of-business data supporting your
organization.
blogs.karthikeyanvk.in
Enter Text
What is Defence in Depth
 Multi-layered approach to securing your
environment will increase the security posture of
your environment.
Data
Applications
VM/compute
Networking
Perimeter
Policies &
access
Physical
security
blogs.karthikeyanvk.in
Enter Text
Defence in Depth – Data Layer
 Data layer: Exposing an encryption key or using
weak encryption or no encryption can leave your
data vulnerable, should unauthorized access occur.
 Enable encryption in sql with built in data
encryption, use SASS tokens for storage account.
 Don’t checkin production configuration in source
code. Use Keyvault to access any credentials.
blogs.karthikeyanvk.in
Enter Text
Defence in Depth – Application Layer
 Application layer: Malicious code injection and
execution are the hallmarks of application-layer
attacks.
 Common attacks include SQL injection(No.1 in
OWASP) and cross-site scripting (XSS).
 Use parameters for SQL Queries.
 Enable proper CORS.
blogs.karthikeyanvk.in
Enter Text
Defence in Depth - Compute Layer
 Malware is a common method of attacking an
environment, which involves executing malicious
code to compromise a system.
 Once malware is present on a system, further
attacks leading to credential exposure and lateral
movement throughout the environment can occur.
 Disable RDP at all times, until really neede.
blogs.karthikeyanvk.in
Enter Text
Defence in Depth – Network Layer
 Opening unnecessary ports to the Internet are a
common method of attack.
 These could include leaving SSH or RDP open to
virtual machines.
 Enable internet only when needed for VM’s.
 Strict policies on Egress and Ingress
blogs.karthikeyanvk.in
Enter Text
Defence in Depth – Perimeter Layer
 Denial-of-service (DoS) attacks are often seen at this
layer.
 These attacks attempt to overwhelm network
resources, forcing them to go offline or making them
incapable of responding to legitimate requests.
 Add firewall Rules based on IP.
 Enable V-Net.
blogs.karthikeyanvk.in
Enter Text
Defence in Depth – Policies & Access Layer
 Authentication occurs in this layer for your application.
 Exposed credentials are a risk here and it's important to
limit the permissions of identities.
 Enable monitoring to look for possible compromised
accounts, such as logins coming from unusual places.
 Make sure password has strong policies.
 Enable Just In Time(JIT) access control.
 Enable Multifactor Authentication.
blogs.karthikeyanvk.in
Enter Text
Defence in Depth – Physical layer
 Unauthorized access to facilities through methods
such as door drafting and theft of security badges
affects this layer.
 Transmitting virus through a pen drive by physically
present in the location.
 Access should be multiple level to access a resource
with multiple door and multiple authentication
process.
blogs.karthikeyanvk.in
Enter Text
Defence in Depth – Summary
Layer How To’s
Data Data encryption at rest in Azure blob storage
Application SSL/TLS encrypted sessions
Compute Regularly apply OS and layered software patches
Network Apply security rules Such as Control Egress and Ingress
Perimeter DDoS protection
Policies &
Access Azure Active Directory user authentication, B2B/B2C,MFA
Physical
Security Azure data centre biometric access controls
blogs.karthikeyanvk.in
Enter Text
Performance and scalability
blogs.karthikeyanvk.in
Enter Text
Why performance and scalability ?
• Meet Customer Demands
• Keeps the business Alive
• Not wake up @ night to know solve a outage.
blogs.karthikeyanvk.in
Enter Text
What is Scaling?
• Scaling up is the action of adding more resources to
a single instance.
• Scaling out is the addition of instances.
blogs.karthikeyanvk.in
Enter Text
What is performance Optimization?
• Scaling and performance optimization are about
matching the resources available to an application
with the demand it is receiving.
• Performance optimization includes scaling resources,
identifying and optimizing potential bottlenecks, and
optimizing your application code for peak
performance.
blogs.karthikeyanvk.in
Enter Text
How to design performance and scalability ?
• When optimizing for performance, you'll look at
network and storage to ensure performance is
acceptable.
• Selecting the right networking and storage
technologies for your architecture will help you
ensure you're providing the best experience for your
consumers.
blogs.karthikeyanvk.in
Enter Text
How to design performance and scalability ?
Data partitioning
• In many large-scale solutions, data is divided into
separate partitions that can be managed and
accessed separately.
• Partitioning can help improve scalability, reduce
contention, and optimize performance.
• Think about Database Sharding or elastic pools or
multitenant databases or Polyglot databases.
blogs.karthikeyanvk.in
Enter Text
How to design performance and scalability ?
Caching
• Mechanism to store frequently used data or assets
(web pages, images) for faster retrieval
• Caching can be used at different (DB/Business/UI)
layers of your application.
• Secondary effect is offloading requests from your
database or web servers, increasing the performance
for other requests.
blogs.karthikeyanvk.in
Enter Text
How to design performance and scalability ?
Autoscaling
• Reduces the need for an operator to continually
monitor the performance of a system and make
decisions about adding or removing resources
• Autoscaling is the process of dynamically allocating
resources to match performance requirements
• You can enable autoscaling in Web App, Database,
Kubernetes workloads etc.
blogs.karthikeyanvk.in
Enter Text
How to design performance and scalability ?
Background jobs for Intensive workload
• Minimize the load on the application UI, which can
improve availability and reduce interactive response
times.
• Background jobs can be executed without requiring
user interaction
• For Background jobs use Azure functions, Kubernetes
Cron Job, Keda etc.
blogs.karthikeyanvk.in
Enter Text
How to design performance and scalability ?
Implement scale units
• Scale as a unit.
• For example, adding x number of functions apps
might require y number of additional queues and z
number of storage accounts to handle the additional
workload generated by the function app.
• A scale unit could consist of x function apps, y
queues, and z storage accounts.
blogs.karthikeyanvk.in
Enter Text
How to design performance and scalability ?
Performance monitoring
• In a production environment, it's important to be able
to track the way in which users utilize your system,
trace resource utilization, and monitor the health and
performance of your system.
blogs.karthikeyanvk.in
Enter Text
How to design performance and scalability ?
Performance monitoring – Contd…
• Look across all layers of your application. Identify and
fix performance bottlenecks in your application
• Bottlenecks could be poor memory handling in your
app, or process of adding indexes into your database.
• Look It may be an iterative process as you relieve one
bottleneck and then uncover another.
• Use Appinsights in all your web app and function app.
• SQL also provides great and easy monitoring tools.
blogs.karthikeyanvk.in
Enter Text
Performance and Scalability– Summary
How To’s
Data
Partitioning Database Sharding, Elastic Pool for multitenant database, Polyglot databases
Caching Use HTTP Cache, Redis Cache
Autoscaling Use Auto Scale Up/Out available in WebApp, SQL, Kubernetes
Background
Jobs Use web Jobs, Azure functions and Keda
Scale as units Think scaling as units rather than single entity.
Performance
Monitoring Use App Insights and also log analytics to detect anomaly.
blogs.karthikeyanvk.in
Enter TextAvailability and recoverability
blogs.karthikeyanvk.in
Enter Text
Why availability and recoverability ?
• Any number of things can go wrong at any scale.
Individual servers and hard drives can fail
• Whole datacentre may become unreachable.
• Including high availability and recoverability in the
design of your architecture protects your business
from financial losses resulting from downtime and
lost data.
blogs.karthikeyanvk.in
Enter Text
What is availability and recoverability Design ?
• Designing for availability focuses on maintaining
uptime through small-scale incidents and temporary
conditions like partial network outages.
• Designing for recoverability focuses on recovery from
data loss and from larger scale disasters..
blogs.karthikeyanvk.in
Enter Text
How to design availability and recoverability ?
• For availability, identify the service-level agreement
(SLA) you're committing to.
• Talk to your business about downtime rather than
assuming things
• The goal is to add redundancy to components of the
architecture based on research, not on assumption .
• Design application, so that you are less likely to
experience an outage.
blogs.karthikeyanvk.in
Enter Text
How to design availability and recoverability ?
• For recoverability, perform an analysis that examines
possible data loss and major downtime scenarios.
• The analysis should include an exploration of recovery
strategies and the cost-benefit trade-off for each.
blogs.karthikeyanvk.in
Enter Text
How to design availability and recoverability ?
• Recovery Point Objective: The maximum duration of
acceptable data loss.
• RPO is measured in units of time, not volume: "30
minutes of data", "four hours of data", and so on.
• RPO is about limiting and recovering from data loss, not
data theft.
blogs.karthikeyanvk.in
Enter Text
How to design availability and recoverability ?
• Recovery Time Objective: The maximum duration of
acceptable downtime, where "downtime" needs to be
defined by your specification.
• For example, if the acceptable downtime duration is
eight hours in the event of a disaster, then your RTO is
eight hours.
blogs.karthikeyanvk.in
Enter Text
Efficiency and Operations– Summary
How To’s
Analyse Talk to your stakeholders about acceptable downtime details
RTO Recovery Time Objective, identify how long your application can be down
RPO Recovery Point Objective, max duration of data loss.
blogs.karthikeyanvk.in
Enter Text
Efficiency and operations
blogs.karthikeyanvk.in
Enter Text
How to design efficiency and operations ?
• A great place to start is to look at cost optimization
steps like sizing virtual machines properly and
deallocating virtual machines that aren't in use.
• Where possible, you want to move from IaaS to PaaS
services.
• Automate as much as possible. The human element is
costly, injecting time and error into operational
activities.
blogs.karthikeyanvk.in
Enter Text
How to design efficiency and operations ?
• Automate as much as possible.
• The human element is costly, injecting time and error
into operational activities.
• Use automation to build, deploy, and administer
resources.
• Throughout your architecture implement monitoring,
logging, and instrumentation system. Gives you the
capability to see what’s going on
blogs.karthikeyanvk.in
Enter Text
How to design efficiency and operations ?
• Modern architectures should be designed with
DevOps and continuous integration in mind.
• DevOps is as much cultural as it is technical, but can
bring many benefits to organizations that embrace it.
• With cloud computing, you're paying for what you
use, so you want to make sure you aren't wasting
resources.
blogs.karthikeyanvk.in
Enter Text
Efficiency and Operations– Summary
How To’s
DevOps Remove the line between Development and Operations.
Automation Find where manual intervention can be automated.
IAAS to PAAS Move you VM to PAAS based solution or serverless to reduce huge cost.
blogs.karthikeyanvk.in
Enter Text
References
@karthik3030
• https://docs.microsoft.com/en-us/learn/modules/pillars-of-a-great-azure-architecture/1-
introduction
blogs.karthikeyanvk.in
Enter Text
@karthik3030
Thank you
/Q&A

Weitere ähnliche Inhalte

Was ist angesagt?

Startup application trends spring 2013
Startup application trends spring 2013Startup application trends spring 2013
Startup application trends spring 2013Mukund Mohan
 
Introduction to Active Directory
Introduction to Active DirectoryIntroduction to Active Directory
Introduction to Active DirectoryJalpesh Vadgama
 
SaaS Architecture Past and Present
SaaS Architecture Past and PresentSaaS Architecture Past and Present
SaaS Architecture Past and PresentTechcello
 
Azure AD B2C Webinar Series: Custom Policies Part 1
Azure AD B2C Webinar Series: Custom Policies Part 1Azure AD B2C Webinar Series: Custom Policies Part 1
Azure AD B2C Webinar Series: Custom Policies Part 1Vinu Gunasekaran
 
Gib 2021 - Intro to BizTalk Migrator
Gib 2021 - Intro to BizTalk MigratorGib 2021 - Intro to BizTalk Migrator
Gib 2021 - Intro to BizTalk MigratorDaniel Toomey
 
Convert monolithic .Net Applications to microservices
Convert monolithic .Net Applications to microservicesConvert monolithic .Net Applications to microservices
Convert monolithic .Net Applications to microservicesKarthikeyan VK
 
Azure AD B2C Webinar Series: Custom Policies Part 2 Policy Walkthrough
Azure AD B2C Webinar Series: Custom Policies Part 2 Policy WalkthroughAzure AD B2C Webinar Series: Custom Policies Part 2 Policy Walkthrough
Azure AD B2C Webinar Series: Custom Policies Part 2 Policy WalkthroughVinu Gunasekaran
 
التقنيات المستخدمة لتطوير المكتبات
التقنيات المستخدمة لتطوير المكتباتالتقنيات المستخدمة لتطوير المكتبات
التقنيات المستخدمة لتطوير المكتباتMohammed El Rafie Tarabay
 
Cloud design patterns - Federated Identity & Gatekeeper
Cloud design patterns - Federated Identity & GatekeeperCloud design patterns - Federated Identity & Gatekeeper
Cloud design patterns - Federated Identity & GatekeeperRoger Chien
 
Application architecture jumpstart
Application architecture jumpstartApplication architecture jumpstart
Application architecture jumpstartClint Edmonson
 
The java enterprise edition (Servlet Basic)
The java enterprise edition (Servlet Basic)The java enterprise edition (Servlet Basic)
The java enterprise edition (Servlet Basic)Atul Saurabh
 
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...Digital Transformation EXPO Event Series
 
Top Ten Reasons Why Developers Don't Adopt ABAC
Top Ten Reasons Why Developers Don't Adopt ABACTop Ten Reasons Why Developers Don't Adopt ABAC
Top Ten Reasons Why Developers Don't Adopt ABACForgeRock
 
SQL Server 2008 Security Overview
SQL Server 2008 Security OverviewSQL Server 2008 Security Overview
SQL Server 2008 Security Overviewukdpe
 
Azure Service Bus for Loosely-Coupled Enterprise Software.
Azure Service Bus for Loosely-Coupled Enterprise Software.Azure Service Bus for Loosely-Coupled Enterprise Software.
Azure Service Bus for Loosely-Coupled Enterprise Software.Chase Aucoin
 
Introducing Power BI Embedded
Introducing Power BI EmbeddedIntroducing Power BI Embedded
Introducing Power BI EmbeddedMostafa
 
Azure AD B2C Webinar Series: Identity Protocols OIDC and OAuth2 part 1
Azure AD B2C Webinar Series: Identity Protocols OIDC and OAuth2 part 1Azure AD B2C Webinar Series: Identity Protocols OIDC and OAuth2 part 1
Azure AD B2C Webinar Series: Identity Protocols OIDC and OAuth2 part 1Vinu Gunasekaran
 
Spira: BI And Custom Reporting
Spira: BI And Custom ReportingSpira: BI And Custom Reporting
Spira: BI And Custom ReportingInflectra
 

Was ist angesagt? (20)

Startup application trends spring 2013
Startup application trends spring 2013Startup application trends spring 2013
Startup application trends spring 2013
 
Introduction to Active Directory
Introduction to Active DirectoryIntroduction to Active Directory
Introduction to Active Directory
 
SaaS Architecture Past and Present
SaaS Architecture Past and PresentSaaS Architecture Past and Present
SaaS Architecture Past and Present
 
Azure AD B2C Webinar Series: Custom Policies Part 1
Azure AD B2C Webinar Series: Custom Policies Part 1Azure AD B2C Webinar Series: Custom Policies Part 1
Azure AD B2C Webinar Series: Custom Policies Part 1
 
Gib 2021 - Intro to BizTalk Migrator
Gib 2021 - Intro to BizTalk MigratorGib 2021 - Intro to BizTalk Migrator
Gib 2021 - Intro to BizTalk Migrator
 
Convert monolithic .Net Applications to microservices
Convert monolithic .Net Applications to microservicesConvert monolithic .Net Applications to microservices
Convert monolithic .Net Applications to microservices
 
Azure AD B2C Webinar Series: Custom Policies Part 2 Policy Walkthrough
Azure AD B2C Webinar Series: Custom Policies Part 2 Policy WalkthroughAzure AD B2C Webinar Series: Custom Policies Part 2 Policy Walkthrough
Azure AD B2C Webinar Series: Custom Policies Part 2 Policy Walkthrough
 
Interview questions
Interview questionsInterview questions
Interview questions
 
التقنيات المستخدمة لتطوير المكتبات
التقنيات المستخدمة لتطوير المكتباتالتقنيات المستخدمة لتطوير المكتبات
التقنيات المستخدمة لتطوير المكتبات
 
J2EE pattern 5
J2EE pattern 5J2EE pattern 5
J2EE pattern 5
 
Cloud design patterns - Federated Identity & Gatekeeper
Cloud design patterns - Federated Identity & GatekeeperCloud design patterns - Federated Identity & Gatekeeper
Cloud design patterns - Federated Identity & Gatekeeper
 
Application architecture jumpstart
Application architecture jumpstartApplication architecture jumpstart
Application architecture jumpstart
 
The java enterprise edition (Servlet Basic)
The java enterprise edition (Servlet Basic)The java enterprise edition (Servlet Basic)
The java enterprise edition (Servlet Basic)
 
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...
 
Top Ten Reasons Why Developers Don't Adopt ABAC
Top Ten Reasons Why Developers Don't Adopt ABACTop Ten Reasons Why Developers Don't Adopt ABAC
Top Ten Reasons Why Developers Don't Adopt ABAC
 
SQL Server 2008 Security Overview
SQL Server 2008 Security OverviewSQL Server 2008 Security Overview
SQL Server 2008 Security Overview
 
Azure Service Bus for Loosely-Coupled Enterprise Software.
Azure Service Bus for Loosely-Coupled Enterprise Software.Azure Service Bus for Loosely-Coupled Enterprise Software.
Azure Service Bus for Loosely-Coupled Enterprise Software.
 
Introducing Power BI Embedded
Introducing Power BI EmbeddedIntroducing Power BI Embedded
Introducing Power BI Embedded
 
Azure AD B2C Webinar Series: Identity Protocols OIDC and OAuth2 part 1
Azure AD B2C Webinar Series: Identity Protocols OIDC and OAuth2 part 1Azure AD B2C Webinar Series: Identity Protocols OIDC and OAuth2 part 1
Azure AD B2C Webinar Series: Identity Protocols OIDC and OAuth2 part 1
 
Spira: BI And Custom Reporting
Spira: BI And Custom ReportingSpira: BI And Custom Reporting
Spira: BI And Custom Reporting
 

Ähnlich wie Pillars of great Azure Architecture

(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014
(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014
(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014Amazon Web Services
 
Community Resource Portal for the Healthcare Sector
Community Resource Portal for the Healthcare SectorCommunity Resource Portal for the Healthcare Sector
Community Resource Portal for the Healthcare SectorMike Taylor
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...IRJET Journal
 
Acunetix Training and ScanAssist
Acunetix Training and ScanAssistAcunetix Training and ScanAssist
Acunetix Training and ScanAssistBryan Ferrario
 
Estimating the Total Costs of Your Cloud Analytics Platform
Estimating the Total Costs of Your Cloud Analytics PlatformEstimating the Total Costs of Your Cloud Analytics Platform
Estimating the Total Costs of Your Cloud Analytics PlatformDATAVERSITY
 
Cloud design pattern using azure
Cloud design pattern using azureCloud design pattern using azure
Cloud design pattern using azureKarthikeyan VK
 
J2EE Performance And Scalability Bp
J2EE Performance And Scalability BpJ2EE Performance And Scalability Bp
J2EE Performance And Scalability BpChris Adkin
 
Top 20 azure interview questions
Top 20 azure interview questionsTop 20 azure interview questions
Top 20 azure interview questionsShivamSharma909
 
Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...kanimozhin
 
Techcello hp-arch workshop
Techcello hp-arch workshopTechcello hp-arch workshop
Techcello hp-arch workshopkanimozhin
 
Over view of software artitecture
Over view of software artitectureOver view of software artitecture
Over view of software artitectureABDEL RAHMAN KARIM
 
Platform Security IRL: Busting Buzzwords & Building Better
Platform Security IRL:  Busting Buzzwords & Building BetterPlatform Security IRL:  Busting Buzzwords & Building Better
Platform Security IRL: Busting Buzzwords & Building BetterEqual Experts
 
Regulated Reactive - Security Considerations for Building Reactive Systems in...
Regulated Reactive - Security Considerations for Building Reactive Systems in...Regulated Reactive - Security Considerations for Building Reactive Systems in...
Regulated Reactive - Security Considerations for Building Reactive Systems in...Ryan Hodgin
 
Injection techniques conversys
Injection techniques conversysInjection techniques conversys
Injection techniques conversysKrishnendu Paul
 
Představení Oracle SPARC Miniclusteru
Představení Oracle SPARC MiniclusteruPředstavení Oracle SPARC Miniclusteru
Představení Oracle SPARC MiniclusteruMarketingArrowECS_CZ
 
Community platform for job seekers | web application for job seekers | case s...
Community platform for job seekers | web application for job seekers | case s...Community platform for job seekers | web application for job seekers | case s...
Community platform for job seekers | web application for job seekers | case s...Mike Taylor
 
Devesh_VMW_Cloud Architect
Devesh_VMW_Cloud ArchitectDevesh_VMW_Cloud Architect
Devesh_VMW_Cloud ArchitectDevesh Mahajan
 
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...Jayesh Naik
 

Ähnlich wie Pillars of great Azure Architecture (20)

oracle
oracleoracle
oracle
 
(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014
(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014
(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014
 
Community Resource Portal for the Healthcare Sector
Community Resource Portal for the Healthcare SectorCommunity Resource Portal for the Healthcare Sector
Community Resource Portal for the Healthcare Sector
 
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
THE SURVEY ON REFERENCE MODEL FOR OPEN STORAGE SYSTEMS INTERCONNECTION MASS S...
 
Acunetix Training and ScanAssist
Acunetix Training and ScanAssistAcunetix Training and ScanAssist
Acunetix Training and ScanAssist
 
Estimating the Total Costs of Your Cloud Analytics Platform
Estimating the Total Costs of Your Cloud Analytics PlatformEstimating the Total Costs of Your Cloud Analytics Platform
Estimating the Total Costs of Your Cloud Analytics Platform
 
Cloud design pattern using azure
Cloud design pattern using azureCloud design pattern using azure
Cloud design pattern using azure
 
J2EE Performance And Scalability Bp
J2EE Performance And Scalability BpJ2EE Performance And Scalability Bp
J2EE Performance And Scalability Bp
 
Top 20 azure interview questions
Top 20 azure interview questionsTop 20 azure interview questions
Top 20 azure interview questions
 
Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...
 
Techcello hp-arch workshop
Techcello hp-arch workshopTechcello hp-arch workshop
Techcello hp-arch workshop
 
Over view of software artitecture
Over view of software artitectureOver view of software artitecture
Over view of software artitecture
 
Profile_Ahmad2
Profile_Ahmad2Profile_Ahmad2
Profile_Ahmad2
 
Platform Security IRL: Busting Buzzwords & Building Better
Platform Security IRL:  Busting Buzzwords & Building BetterPlatform Security IRL:  Busting Buzzwords & Building Better
Platform Security IRL: Busting Buzzwords & Building Better
 
Regulated Reactive - Security Considerations for Building Reactive Systems in...
Regulated Reactive - Security Considerations for Building Reactive Systems in...Regulated Reactive - Security Considerations for Building Reactive Systems in...
Regulated Reactive - Security Considerations for Building Reactive Systems in...
 
Injection techniques conversys
Injection techniques conversysInjection techniques conversys
Injection techniques conversys
 
Představení Oracle SPARC Miniclusteru
Představení Oracle SPARC MiniclusteruPředstavení Oracle SPARC Miniclusteru
Představení Oracle SPARC Miniclusteru
 
Community platform for job seekers | web application for job seekers | case s...
Community platform for job seekers | web application for job seekers | case s...Community platform for job seekers | web application for job seekers | case s...
Community platform for job seekers | web application for job seekers | case s...
 
Devesh_VMW_Cloud Architect
Devesh_VMW_Cloud ArchitectDevesh_VMW_Cloud Architect
Devesh_VMW_Cloud Architect
 
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
 

Mehr von Karthikeyan VK

How to become a Software Architect.pptx
How to become a Software Architect.pptxHow to become a Software Architect.pptx
How to become a Software Architect.pptxKarthikeyan VK
 
Blockchain workshop 101
Blockchain workshop 101Blockchain workshop 101
Blockchain workshop 101Karthikeyan VK
 
How to double your productivity as a developer
How to double your productivity as a developerHow to double your productivity as a developer
How to double your productivity as a developerKarthikeyan VK
 
How to be an expert in Debugging .Net Applications
How to be an expert in Debugging .Net ApplicationsHow to be an expert in Debugging .Net Applications
How to be an expert in Debugging .Net ApplicationsKarthikeyan VK
 
Enterprise security kubernetes
Enterprise security kubernetesEnterprise security kubernetes
Enterprise security kubernetesKarthikeyan VK
 
Machine Learning Basics using Azure ML
Machine Learning Basics using Azure MLMachine Learning Basics using Azure ML
Machine Learning Basics using Azure MLKarthikeyan VK
 
Convert monolithic .Net Applications to microservices With Principles
Convert monolithic .Net Applications to microservices With PrinciplesConvert monolithic .Net Applications to microservices With Principles
Convert monolithic .Net Applications to microservices With PrinciplesKarthikeyan VK
 
Cognitive Intelligence using azure search
Cognitive Intelligence using azure searchCognitive Intelligence using azure search
Cognitive Intelligence using azure searchKarthikeyan VK
 
Azure container instances
Azure container instancesAzure container instances
Azure container instancesKarthikeyan VK
 
Azure Durable Functions
Azure Durable FunctionsAzure Durable Functions
Azure Durable FunctionsKarthikeyan VK
 
Mobile Devops Using VSTS
Mobile Devops Using VSTSMobile Devops Using VSTS
Mobile Devops Using VSTSKarthikeyan VK
 

Mehr von Karthikeyan VK (19)

GCD ChatGPT.pptx
GCD ChatGPT.pptxGCD ChatGPT.pptx
GCD ChatGPT.pptx
 
DataScience-101
DataScience-101DataScience-101
DataScience-101
 
How to become a Software Architect.pptx
How to become a Software Architect.pptxHow to become a Software Architect.pptx
How to become a Software Architect.pptx
 
Blockchain workshop 101
Blockchain workshop 101Blockchain workshop 101
Blockchain workshop 101
 
Anti patterns
Anti patternsAnti patterns
Anti patterns
 
How to double your productivity as a developer
How to double your productivity as a developerHow to double your productivity as a developer
How to double your productivity as a developer
 
How to be an expert in Debugging .Net Applications
How to be an expert in Debugging .Net ApplicationsHow to be an expert in Debugging .Net Applications
How to be an expert in Debugging .Net Applications
 
Chat bot LUIS
Chat bot LUISChat bot LUIS
Chat bot LUIS
 
Enterprise security kubernetes
Enterprise security kubernetesEnterprise security kubernetes
Enterprise security kubernetes
 
Save Azure Cost
Save Azure CostSave Azure Cost
Save Azure Cost
 
Learning graphql .Net
Learning graphql .NetLearning graphql .Net
Learning graphql .Net
 
Azure devspaces
Azure devspacesAzure devspaces
Azure devspaces
 
Azure Event Grid
Azure Event Grid Azure Event Grid
Azure Event Grid
 
Machine Learning Basics using Azure ML
Machine Learning Basics using Azure MLMachine Learning Basics using Azure ML
Machine Learning Basics using Azure ML
 
Convert monolithic .Net Applications to microservices With Principles
Convert monolithic .Net Applications to microservices With PrinciplesConvert monolithic .Net Applications to microservices With Principles
Convert monolithic .Net Applications to microservices With Principles
 
Cognitive Intelligence using azure search
Cognitive Intelligence using azure searchCognitive Intelligence using azure search
Cognitive Intelligence using azure search
 
Azure container instances
Azure container instancesAzure container instances
Azure container instances
 
Azure Durable Functions
Azure Durable FunctionsAzure Durable Functions
Azure Durable Functions
 
Mobile Devops Using VSTS
Mobile Devops Using VSTSMobile Devops Using VSTS
Mobile Devops Using VSTS
 

Kürzlich hochgeladen

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Kürzlich hochgeladen (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Pillars of great Azure Architecture

  • 1. blogs.karthikeyanvk.in Pillars of a great Azure architecture Karthikeyan VK https://blogs.karthikeyanvk.in @karthik3030
  • 2. blogs.karthikeyanvk.in Enter Text Why Should I learn Pillars of a great Azure architecture ? • Guides you to design, build, and continuously improve a secure, reliable, and efficient application. • One stop shop for designing non-functional requirements for your cloud based project. Green/Brown field projects. • Building solution in cloud is hard.
  • 3. blogs.karthikeyanvk.in Enter Text Why Should I learn Pillars of a great Azure architecture ? • Role of a solution architect is not only to deliver business value through the functional requirements of the application, but to ensure the solution is designed in ways that are scalable, resilient, efficient and secure application(NFR’s).
  • 4. blogs.karthikeyanvk.in Enter Text What are Pillars of a great Azure architecture ? Four pillars of Great Architecture Security Performance and scalability Availability and recoverability Efficiency and operations
  • 6. blogs.karthikeyanvk.in Enter Text Why Security? • Data is the most valuable piece of your organization's technical footprint. • When a security breach occurs, there can be substantial impacts to the finances and reputation of both organizations and customers. • Security must be throughout the entire lifecycle of your application, from design and implementation to deployment and operations
  • 7. blogs.karthikeyanvk.in Enter Text Why Security? • PCI(Payment Card Industry) for credit cards • General Data Protection Regulation (GDPR) for personal data. • HIPAA for Healthcare. • All Regulations are mandatory for running the corresponding organization. • Securing data is enforced by governments as law.
  • 8. blogs.karthikeyanvk.in Enter Text What should I protect? • Data could be sensitive data about customers, financial information about your organization, or critical line-of-business data supporting your organization.
  • 9. blogs.karthikeyanvk.in Enter Text What is Defence in Depth  Multi-layered approach to securing your environment will increase the security posture of your environment. Data Applications VM/compute Networking Perimeter Policies & access Physical security
  • 10. blogs.karthikeyanvk.in Enter Text Defence in Depth – Data Layer  Data layer: Exposing an encryption key or using weak encryption or no encryption can leave your data vulnerable, should unauthorized access occur.  Enable encryption in sql with built in data encryption, use SASS tokens for storage account.  Don’t checkin production configuration in source code. Use Keyvault to access any credentials.
  • 11. blogs.karthikeyanvk.in Enter Text Defence in Depth – Application Layer  Application layer: Malicious code injection and execution are the hallmarks of application-layer attacks.  Common attacks include SQL injection(No.1 in OWASP) and cross-site scripting (XSS).  Use parameters for SQL Queries.  Enable proper CORS.
  • 12. blogs.karthikeyanvk.in Enter Text Defence in Depth - Compute Layer  Malware is a common method of attacking an environment, which involves executing malicious code to compromise a system.  Once malware is present on a system, further attacks leading to credential exposure and lateral movement throughout the environment can occur.  Disable RDP at all times, until really neede.
  • 13. blogs.karthikeyanvk.in Enter Text Defence in Depth – Network Layer  Opening unnecessary ports to the Internet are a common method of attack.  These could include leaving SSH or RDP open to virtual machines.  Enable internet only when needed for VM’s.  Strict policies on Egress and Ingress
  • 14. blogs.karthikeyanvk.in Enter Text Defence in Depth – Perimeter Layer  Denial-of-service (DoS) attacks are often seen at this layer.  These attacks attempt to overwhelm network resources, forcing them to go offline or making them incapable of responding to legitimate requests.  Add firewall Rules based on IP.  Enable V-Net.
  • 15. blogs.karthikeyanvk.in Enter Text Defence in Depth – Policies & Access Layer  Authentication occurs in this layer for your application.  Exposed credentials are a risk here and it's important to limit the permissions of identities.  Enable monitoring to look for possible compromised accounts, such as logins coming from unusual places.  Make sure password has strong policies.  Enable Just In Time(JIT) access control.  Enable Multifactor Authentication.
  • 16. blogs.karthikeyanvk.in Enter Text Defence in Depth – Physical layer  Unauthorized access to facilities through methods such as door drafting and theft of security badges affects this layer.  Transmitting virus through a pen drive by physically present in the location.  Access should be multiple level to access a resource with multiple door and multiple authentication process.
  • 17. blogs.karthikeyanvk.in Enter Text Defence in Depth – Summary Layer How To’s Data Data encryption at rest in Azure blob storage Application SSL/TLS encrypted sessions Compute Regularly apply OS and layered software patches Network Apply security rules Such as Control Egress and Ingress Perimeter DDoS protection Policies & Access Azure Active Directory user authentication, B2B/B2C,MFA Physical Security Azure data centre biometric access controls
  • 19. blogs.karthikeyanvk.in Enter Text Why performance and scalability ? • Meet Customer Demands • Keeps the business Alive • Not wake up @ night to know solve a outage.
  • 20. blogs.karthikeyanvk.in Enter Text What is Scaling? • Scaling up is the action of adding more resources to a single instance. • Scaling out is the addition of instances.
  • 21. blogs.karthikeyanvk.in Enter Text What is performance Optimization? • Scaling and performance optimization are about matching the resources available to an application with the demand it is receiving. • Performance optimization includes scaling resources, identifying and optimizing potential bottlenecks, and optimizing your application code for peak performance.
  • 22. blogs.karthikeyanvk.in Enter Text How to design performance and scalability ? • When optimizing for performance, you'll look at network and storage to ensure performance is acceptable. • Selecting the right networking and storage technologies for your architecture will help you ensure you're providing the best experience for your consumers.
  • 23. blogs.karthikeyanvk.in Enter Text How to design performance and scalability ? Data partitioning • In many large-scale solutions, data is divided into separate partitions that can be managed and accessed separately. • Partitioning can help improve scalability, reduce contention, and optimize performance. • Think about Database Sharding or elastic pools or multitenant databases or Polyglot databases.
  • 24. blogs.karthikeyanvk.in Enter Text How to design performance and scalability ? Caching • Mechanism to store frequently used data or assets (web pages, images) for faster retrieval • Caching can be used at different (DB/Business/UI) layers of your application. • Secondary effect is offloading requests from your database or web servers, increasing the performance for other requests.
  • 25. blogs.karthikeyanvk.in Enter Text How to design performance and scalability ? Autoscaling • Reduces the need for an operator to continually monitor the performance of a system and make decisions about adding or removing resources • Autoscaling is the process of dynamically allocating resources to match performance requirements • You can enable autoscaling in Web App, Database, Kubernetes workloads etc.
  • 26. blogs.karthikeyanvk.in Enter Text How to design performance and scalability ? Background jobs for Intensive workload • Minimize the load on the application UI, which can improve availability and reduce interactive response times. • Background jobs can be executed without requiring user interaction • For Background jobs use Azure functions, Kubernetes Cron Job, Keda etc.
  • 27. blogs.karthikeyanvk.in Enter Text How to design performance and scalability ? Implement scale units • Scale as a unit. • For example, adding x number of functions apps might require y number of additional queues and z number of storage accounts to handle the additional workload generated by the function app. • A scale unit could consist of x function apps, y queues, and z storage accounts.
  • 28. blogs.karthikeyanvk.in Enter Text How to design performance and scalability ? Performance monitoring • In a production environment, it's important to be able to track the way in which users utilize your system, trace resource utilization, and monitor the health and performance of your system.
  • 29. blogs.karthikeyanvk.in Enter Text How to design performance and scalability ? Performance monitoring – Contd… • Look across all layers of your application. Identify and fix performance bottlenecks in your application • Bottlenecks could be poor memory handling in your app, or process of adding indexes into your database. • Look It may be an iterative process as you relieve one bottleneck and then uncover another. • Use Appinsights in all your web app and function app. • SQL also provides great and easy monitoring tools.
  • 30. blogs.karthikeyanvk.in Enter Text Performance and Scalability– Summary How To’s Data Partitioning Database Sharding, Elastic Pool for multitenant database, Polyglot databases Caching Use HTTP Cache, Redis Cache Autoscaling Use Auto Scale Up/Out available in WebApp, SQL, Kubernetes Background Jobs Use web Jobs, Azure functions and Keda Scale as units Think scaling as units rather than single entity. Performance Monitoring Use App Insights and also log analytics to detect anomaly.
  • 32. blogs.karthikeyanvk.in Enter Text Why availability and recoverability ? • Any number of things can go wrong at any scale. Individual servers and hard drives can fail • Whole datacentre may become unreachable. • Including high availability and recoverability in the design of your architecture protects your business from financial losses resulting from downtime and lost data.
  • 33. blogs.karthikeyanvk.in Enter Text What is availability and recoverability Design ? • Designing for availability focuses on maintaining uptime through small-scale incidents and temporary conditions like partial network outages. • Designing for recoverability focuses on recovery from data loss and from larger scale disasters..
  • 34. blogs.karthikeyanvk.in Enter Text How to design availability and recoverability ? • For availability, identify the service-level agreement (SLA) you're committing to. • Talk to your business about downtime rather than assuming things • The goal is to add redundancy to components of the architecture based on research, not on assumption . • Design application, so that you are less likely to experience an outage.
  • 35. blogs.karthikeyanvk.in Enter Text How to design availability and recoverability ? • For recoverability, perform an analysis that examines possible data loss and major downtime scenarios. • The analysis should include an exploration of recovery strategies and the cost-benefit trade-off for each.
  • 36. blogs.karthikeyanvk.in Enter Text How to design availability and recoverability ? • Recovery Point Objective: The maximum duration of acceptable data loss. • RPO is measured in units of time, not volume: "30 minutes of data", "four hours of data", and so on. • RPO is about limiting and recovering from data loss, not data theft.
  • 37. blogs.karthikeyanvk.in Enter Text How to design availability and recoverability ? • Recovery Time Objective: The maximum duration of acceptable downtime, where "downtime" needs to be defined by your specification. • For example, if the acceptable downtime duration is eight hours in the event of a disaster, then your RTO is eight hours.
  • 38. blogs.karthikeyanvk.in Enter Text Efficiency and Operations– Summary How To’s Analyse Talk to your stakeholders about acceptable downtime details RTO Recovery Time Objective, identify how long your application can be down RPO Recovery Point Objective, max duration of data loss.
  • 40. blogs.karthikeyanvk.in Enter Text How to design efficiency and operations ? • A great place to start is to look at cost optimization steps like sizing virtual machines properly and deallocating virtual machines that aren't in use. • Where possible, you want to move from IaaS to PaaS services. • Automate as much as possible. The human element is costly, injecting time and error into operational activities.
  • 41. blogs.karthikeyanvk.in Enter Text How to design efficiency and operations ? • Automate as much as possible. • The human element is costly, injecting time and error into operational activities. • Use automation to build, deploy, and administer resources. • Throughout your architecture implement monitoring, logging, and instrumentation system. Gives you the capability to see what’s going on
  • 42. blogs.karthikeyanvk.in Enter Text How to design efficiency and operations ? • Modern architectures should be designed with DevOps and continuous integration in mind. • DevOps is as much cultural as it is technical, but can bring many benefits to organizations that embrace it. • With cloud computing, you're paying for what you use, so you want to make sure you aren't wasting resources.
  • 43. blogs.karthikeyanvk.in Enter Text Efficiency and Operations– Summary How To’s DevOps Remove the line between Development and Operations. Automation Find where manual intervention can be automated. IAAS to PAAS Move you VM to PAAS based solution or serverless to reduce huge cost.