Cloud Application Architectures
Read it now on the O’Reilly learning platform with a 10-day free trial.
O’Reilly members get unlimited access to books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.
Book description
If you're involved in planning IT infrastructure as a network or system architect, system administrator, or developer, this book will help you adapt your skills to work with these highly scalable, highly redundant infrastructure services.
While analysts hotly debate the advantages and risks of cloud computing, IT staff and programmers are left to determine whether and how to put their applications into these virtualized services. Cloud Application Architectures provides answers -- and critical guidance -- on issues of cost, availability, performance, scaling, privacy, and security.
With Cloud Application Architectures, you will:
- Understand the differences between traditional deployment and cloud computing
- Determine whether moving existing applications to the cloud makes technical and business sense
- Analyze and compare the long-term costs of cloud services, traditional hosting, and owning dedicated servers
- Learn how to build a transactional web application for the cloud or migrate one to it
- Understand how the cloud helps you better prepare for disaster recovery
- Change your perspective on application scaling
To provide realistic examples of the book's principles in action, the author delves into some of the choices and operations available on Amazon Web Services, and includes high-level summaries of several of the other services available on the market today.
Cloud Application Architectures provides best practices that apply to every available cloud service. Learn how to make the transition to the cloud and prepare your web applications to succeed.
Show and hide more
Publisher resources
Table of contents Product information
Table of contents
- Preface
- Audience for This Book
- Organization of the Material
- Conventions Used in This Book
- Using Code Examples
- Safari® Books Online
- We’d Like Your Feedback!
- Acknowledgments
- The Cloud
- Software
- Hardware
- The advantages of a cloud infrastructure
- Hardware virtualization
- Cloud storage
- Grid Computing
- Transactional Computing
- Options for an IT Infrastructure
- The Economics
- Capital costs
- Cost comparison
- The bottom line
- Platform As a Service Vendor
- Infrastructure As a Service
- Private Clouds
- All of the Above
- Amazon Elastic Cloud Compute (EC2)
- Amazon Simple Storage Service (S3)
- Amazon Simple Queue Service (SQS)
- Amazon CloudFront
- Amazon SimpleDB
- Amazon S3
- Access to S3
- Web Services
- BitTorrent
- EC2 Concepts
- EC2 Access
- Instance Setup
- Access to an Instance
- Security Groups
- Availability Zones
- Static IP Addresses
- Data Storage in EC2
- EBS volume setup
- Volume management
- Snapshots
- Know Your Software Licenses
- The Shift to a Cloud Cost Model
- How to Approach Cost Comparisons
- A Sample Cloud ROI Analysis
- Where the Cloud Saves Money
- Availability
- How to estimate the availability of your system
- What constitutes availability?
- Cloud service availability
- Amazon Web Services service levels
- Expected availability in the cloud
- Reliability
- Clustering versus independent nodes
- EC2 performance constraints
- Legal, Regulatory, and Standards Implications
- There Is No Perimeter in the Cloud
- The Risk Profile for S3 and Other Cloud Storage Solutions Is Unproven
- Web Application Design
- System State and Protecting Transactions
- The problem with memory locks
- Transactional integrity through stored procedures
- Two alternatives to stored procedures
- Amazon Machine Image Data Security
- What Belongs in a Machine Image?
- A Sample MySQL Machine Image
- Amazon AMI Philosophies
- Privacy in the Cloud
- Managing the credit card encryption
- Processing a credit card transaction
- If the e-commerce application is compromised
- If the credit card processor is compromised
- Clustering or Replication?
- Using database clustering in the cloud
- Using database replication in the cloud
- Replication for performance
- How to generate globally unique primary keys
- Support for globally unique random keys
- Types of database backups
- Applying a backup strategy for the cloud
- Data Security
- Data Control
- When the cloud provider goes down
- When a subpoena compels your cloud provider to turn over your data
- When your cloud provider fails to adequately protect their network
- Encrypt your network traffic
- Encrypt your backups
- Encrypt your filesystems
- Firewall Rules
- Network Intrusion Detection
- The purpose of a network intrusion detection system
- Implementing network intrusion detection in the cloud
- System Hardening
- Antivirus Protection
- Host Intrusion Detection
- Data Segmentation
- Credential Management
- Disaster Recovery Planning
- The Recovery Point Objective
- The Recovery Time Objective
- Backup Management
- Fixed data strategy
- Configuration data strategy
- Persistent data strategy (aka database backups)
- Backup security
- Spanning availability zones
- Operating across regions
- Monitoring
- Load Balancer Recovery
- Application Server Recovery
- Database Recovery
- Capacity Planning
- Expected Demand
- Determining your expected demand
- Analyzing the unexpected
- Application architecture and database architecture revisited
- Points of scale
- A simple thought experiment
- How might the outcome have been different?
- Tools and Monitoring Systems
- The procurement process in the cloud
- Managing proactive scaling
- Managing reactive scaling
- A recommended approach
- Amazon EC2 Command-Line Reference
- Amazon EC2 Tips
- Filesystem Encryption
- Setting Up RAID for Multiple EBS Volumes
- Types of Clouds
- Cloudcenters in Detail
- Data Centers in the Clouds
- GoGrid Versus Traditional Data Centers
- Horizontal and vertical scaling
- GoGrid deployment architectures
- Side-by-Side Comparison
- Real-Life Usage
- Rackspace’s Cloud Services
- Cloud Servers
- Cloud Files
- Cloud Sites
Show and hide more
Product information
- Title: Cloud Application Architectures
- Author(s): George Reese
- Release date: April 2009
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9780596156367
You might also like
Check it out now on O’Reilly
Dive in for free with a 10-day trial of the O’Reilly learning platform—then explore all the other resources our members count on to build skills and solve problems every day.