Language:EN
Pages: 1
Words: 83
Rating : ⭐⭐⭐⭐⭐
Price: $10.99
Page 1 Preview
hybrid cloud administration and service level agre

Hybrid cloud administration and service level agreement: 

ITC561 Cloud Computing: Hybrid Cloud Architecture For Metasoft

Case:

MetaSoft Ltd is a software development company which works across Australia and New Zealand. The company is considering the following strategic proposal:

  • They plan to close down the Melbourne data centre rather than update or replace the older infrastructure. The existing data and services in that data centre would be moved to the Sydney data centre, which has the most up to date infrastructure, as well as capacity to expand.
  • They plan to move all their Web Services into the Cloud in order to provide an increased level of HA (High Availability) as well as a better degree of flexibility in supplying data to their customers and employees. This would entail changing their current web software architecture to take advantage of the flexibility and scalability that can be gained by moving to a Microservices model (this would entail the use of such services as AWS Lambda or Azure Functions, Containers, Data Services, and Cloud Edge capability and monitoring).
  • They also plan to use the Cloud Infrastructure to increase flexibility and availability for some of the LoB (Line of Business) applications that will continue to run on their own internal infrastructure. However, they are hoping to take advantage of the Cloud infrastructure to help manage and balance demand on internal resource use. 

The Board of MetaSoft is contemplating this strategy as a way to increase the company’s flexibility and responsiveness, particularly for its overseas operations. The Board also expects to achieve significant savings on the cost of maintaining their ICT infrastructure by closing the oldest existing data centre. This would entail retiring the infrastructure in that data centre rather than having to update it.

Tasks

.Proposed Architectures for a Hybrid Cloud
.Risk report for Hybrid Cloud and Microservices
.Proposed Information Security controls
.BCP Changes
.Hybrid Cloud Administration and SLA Management
.SharePoint Migration Planning

Answer:

Introduction:

Cloud computing is one of the most important and widely used computing techniques used in the world toddy in different organizations. It is also known as hybrid cloud computing because it is a hybridization technique that is used to integrate public as well as private cloud architectures to give a common solution to all the data storage related as well as other concerns within an organization. When or more public cloud architectural networks are merged with the traditional in house server and storage systems, it results in the formation of a hybrid cloud infrastructure.  Hybridization in cloud computing is extremely important in today’s world due to the different risk factors associated with the traditional computing and data storage techniques. It eliminates different risks associated to data storage and other risks. IN other words, cloud computing is the future of organizations when every business related tasks can be remotely and will ease the working operations of all organizations.

Proposed architecture for a hybrid cloud:

Architectures to be incorporated:

  1. Microsoft Azure: Metasoft Ltd, which is a software company, wants to update the entire infrastructure in its Melbourne site and wants to get it replaced with all the latest technologies and cloud infrastructures that are presently present in its Sydney office. They want to incorporate cloud architecture in order to achieve higher rate of availability (HA) within the organization using cloud architectures such as Microsoft Azure, which is widely used and comes with a number of  advantages. It should be incorporated due to its low cost and the other corporate benefits that are corporate friendly. Microsoft has come up with this technique for deploying services and their applications, managing and testing the applications through a global network, which is widespread. Microsoft consists the data centers storing the data. It provides features such as software as a service (SaaS), platform as a service (PaaS) as well as infrastructure as a service (IaaS). Different programing languages from third party vendors are also supported in Azure (Copeland et al., 2015).

Benefits of using Microsoft Azure:

  • It is extremely fast: The deployment speed is extremely fast, as well as its scope of scalability within operational tasks.
  • Improved business agility: The developmentcycle is obtained much faster without a very expensive outlay; thereby giving Metasoft limited a much advantageous position.
  • Excellent global reach: It can cater to the global needs of the organization since the company is also present in New Zealand. It has flexible guidelines to operate globally.

Disadvantages of Microsoft Azure:

  • Needs careful integration of application:The domains, which get mostly affected, are Third-party vendors, web services, External storage devices such as hard disk drives, SMTP servers as well as Payment gateway. These should be properly analyzed before Azure implementation. Data insecurity can also cause performance lags.
  • Staff management:Effective cloud management techniques have to be well explained to the employees since both cloud and in home servers need to be properly managed. The application developers should have adequate knowledge about the complexities involved in the implementation Microsoft Azure.

Amazon web services lambda:  Amazon Web Services (AWS) lambda is owned and managed by the popular ecommerce giant, which is Amazon.com. It provides cloud storage facility of data as well as other cloud computing operational assistance to the different companies on a paid subscription basis, which in turn allows remote management of servers. Metasoft can use this platform because of its cheap costs and corporate friendly features. Metasoft ltd also wants to implement technologies such as AWS lambda since data security is of utmost concern for the organization, which can effectively be produced by this cloud platform. AWS Lambda is a kind of a computing platform, which does not make use of a server. Amazon manages it as a part of Amazon web services. This service runs in response to different events and it automatically manages different computing resources, which that code requires.

Fig 3: AWS lambda architecture (Source: As used by the company)

  • Security: AWS lambda data centers have a very tight 24/7 guard system and a very effective disaster management system in case of any natural disasters as well as system failures. It also makes use of a very strict Identity & Access Management (IAM)as well as a cloud audit Trail feature to monitor what information has been accessed by which employee and at what time (Hendrickson et al., 2016).
  • Flexibility:Amazon machine images (AMIs) are used for self-managing and automatically scaling which can closely align with the particular needs of Metasoft limited. This is done by the systems by effective management of the traffic in the networks. Clones are circulated across different geographic locations in very less time, thereby saving time by preventing the same tasks to be performed repeatedly.
  • AWS lambda path of data flow and information in a data center is sometimes difficult for the companies to follow and understand because of its complexities.
  • National Products Inc (NPI) has recently declared that the billing structure is extremely complicated for the client organization to follow where AWS lambda is incorporated.
  • In addition, AWS servers have a bad image of outage, which happened in the recent past.
  • They provide a runtime environment, which is very consistent:they give the developers the provision to create environments that are predictable as well as isolated from any other applications. They also include dependencies of software’s that are application specific, example, specific programming language versions and their run times from different software libraries. From the perspective of the developer’s, these are all consistent irrespective of their area of deployment.
  • They can be run anywhere:The containers can be virtually run on windows, Mac as well as linux operating systems in the public cloud as well as the own systems of the developers.

Issues Associated with Containerization:

  • Consistent gap in training:  It is a very complex technique and needs proper education of the employees in order to work with them.
  • No scalability with applications and unpredictable performance:It consists of gateways as well as container systems that are distributed– therefore comes with performance issues as well as scalability challenges.

Risks report of hybrid cloud architecture and the micro services:

There are different risks that are associated to the implementation of Microsoft Azure, AWS lamb da as well as Containerization, which can be explained below in the following tabular format:

          Risks factors                               Description           Mitigation techniques

 

 

When a company uses Microsoft Azure, Microsoft reserves all rights to have a considerable amount of control over all the data as well as the accounts of the client company just to ensure data security in an optimum level. This is clearly stated in the initial agreement that Microsoft oft signs with the client company. There is also an issue of increased cost factors due to metadata integration in Microsoft Azure implementation in the companies (Dutta, Peng & Choudhary, 2013).

 

 

 

 

3. Risk of inadequate training to the employees of Metasoft limited due to the complexities of AWS lambda (Almorsy, Grundy & Müller, 2016).

            There was a recent news of a major AWS cloud outage all across the world, which resulted in huge employee as well as customer unrest, wherein many end users also had to suffer. This happened mainly because the employees were not efficient and trained enough to handle the situation on an urgent basis due to their lack of knowledge about the complexities of AWS servers. AWS lambda tools such as AWS cli, implementation of Python boto in desktop as a service technique (DaaS) is an extremely complex feature of AWS lambda to be understood by the professionals.

This should be considered by Metasoft limited before implementing AWS.


Proposed precautions for information security:

Some of the data security measures that can be incorporated within Metasoft limited can be described below as:

  • Strong passwords should be used in all devices: This is one of the most important steps that should be incorporated within the company. Strong passwords are characterized by usage of number and alpha bets that should typically be 8-12 characters long and making use of special characters and a mixture of upper and lower cases of alphabets.
  • Setting up a strong firewall: Again, this very important step can be taken by Metasoft limited in order to secure the data and the devices that are used by the employees for business operations. A firewall can be defined as a computer application that blocks harmful websites from opening up on the computer and other mobile devices that are used within an organization. Network address translation (NAT) is a networking technique often used by the system administrators within the organization, which does the work of a firewall. Pfsense and Fortigate are some of the most popular and widely used enterprise firewall and antivirus protection systems used in the companies today (Ali, Khan & Vasilakos, 2015).
  • Regular application updates to be timely installed in the servers and computers:Applications especially the security applications keep updating as and when  any new update package are released by the company and it should be ensures by the  system administrators that these updates are properly installed on the systems of the employees. If an outdated application is used in the cloud systems, it causes performance lags as well as data insecurity and other issues. Regular security patches and operating system updates should be made mandatory within the organization so that all employees do that as a routine task and it should be ensured from the administrators end.
  • Diligent back up and monitoring: Regular data backup should be ensured within the organization to ensure that in any case of a natural disaster or a system failure data loss can be prevented. Cycles of data backup should be scheduled such as a complete data backup on a weekly basis and an incremental backup procedure per night. There should also be a dedicated team that will calculate and analyze the different risks associated to the data and other aspects of the organization.
  • Employee education: All the employees should get adequate training on the working of the different hybrid cloud architectures within the organization. Without proper education, the designing will be a major issue because of the complexities of the architectures.  In order to prevent issues during system failures and natural disasters, employees should be enough prompt to make decisions in such emergencies, for which their proper knowledge about the cloud infrastructures being used in the company, is necessary.

Changes to Business Continuity Plan

Business Continuity Plan can be defined as  the regulatory papers and documents that contains the organisational plans that the organization has decided to implement in case of any natural disaster or system failures . On execution of the plan, the organization seeks to continue its normal business operations and ensure at the same time that the customers are unaffected and their normal business operation with the customers continue. Metasoft Ltd has come up with its own business continuity plan through which it expects to shift its working infrastructure to a cloud architectural network. This section will highlight the migration technique to be incorporated and the systematized back up plan of the data in order to prevent data loss within the organization. It will also consider a proper service level agreement with the third party organizations linked to Metasoft private limited, in order to keep them informed about an y data loss due to an y system failure or natural disasters. Making use of a cloud infrastructure can ensure optimum data security within the organization. It also helps the organization to come up with more flexible data backup scheduling cycles (Mill & Park, 2014).

Issues in Resilience 

Disaster Recovery System

Backup

Data backup is again a very important aspect of the business continuity plan in which, the company plans and takes a backup all the data stored in virtual computers in the cloud storage, into in-house physical hardware computers. This manual method of ensuring that all the data is well protected and backed up in physical devices ensures that the organization is in no trouble in cases of extreme emergence such as natural disasters as well as system failures and the data is retained. It is therefore extremely important that the company have a proper data backup plan in case of an emergency (Menzel et al., 2013).

Hybrid cloud administration and service level agreement: 

Metasoft private limited is a software company, which is looking forward to move its infrastructure to a cloud architecture. It has planned to update all its working Infrastructure in the Melbourne site, which still uses older techniques and get them replaced with all the latest technologies, which are presently there in its Sydney office. They want to be shifted to the usage of a micro service model such as containers in cloud computing, Microsoft Azure or Amazon web services lambda technologies. The cloud model should be capable of performing remote server administration, as well as servers systems and a service level agreement (SLA) management. Two of the most popular technologies namely: platform as a service (PaaS) and information as a service (IaaS) will be used in the organization.

Remote Server Administration and resource management

  • Load balancing
  • Execution of the server commands(Pahl, Xiong & Walshe, 2013).
  • Service level agreement execution (Wang et al., 2013).
  • Hybrid corporate friendly environment (Chang et al., 2015).

Service level agreement:

Fig 6: Hybrid cloud features (Source: As used by author).

Checklist to be performed

This is the Dalbhanjan and Morad’s Checklist, and it ensures a smooth implementation of all the important t asks to be taken in to consideration before the implementation of the cloud infrastructure within the company. The checklist is designed especially for the incorporation of IaaS and PaaS within the cloud architecture (Hashizume et al., 2013)

SharePoint migration to cloud architecture

Migration Plan

Step1 –Amazon workspace lambda configuration.

Step 2 –ServiceNow setup is to be installed in AWS lambda

Servicenow validator

A login should be created for al l the users on the servicenow portal for user authentication.

Fig 8: Service now validator of AWS lambda (Source: As used by the  author).

Issues in Migration Plan

Conclusion:

References:

Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information sciences, 305, 357-383.

Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.

Considine, J. F., Curtis, P. M., Dixit, S. G., Oliveira, F., Rousseau, J. R., & Whitney, J. (2013). U.S. Patent No. 8,417,938. Washington, DC: U.S. Patent and Trademark Office.

Copeland, M., Soh, J., Puca, A., Manning, M., & Gollob, D. (2015). Microsoft azure and cloud computing. In Microsoft Azure (pp. 3-26). Apress, Berkeley, CA.

Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing. Journal of internet services and applications, 4(1), 5.

Hendrickson, S., Sturdevant, S., Harter, T., Venkataramani, V., Arpaci-Dusseau, A. C., & Arpaci-Dusseau, R. H. (2016). Serverless computation with openlambda. Elastic, 60, 80.

Pearson, S. (2013). Privacy, security and trust in cloud computing. In Privacy and Security for Cloud Computing (pp. 3-42). Springer, London.

Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation, management, and security. CRC press.

Wallace, M., & Webber, L. (2017). The disaster recovery handbook: A step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets. Amacom.

Wang, W. J., Chang, Y. S., Lo, W. T., & Lee, Y. K. (2013). Adaptive scheduling for parallel tasks with QoS satisfaction for hybrid cloud environments. The Journal of Supercomputing, 66(2), 783-811.

You are viewing 1/3rd of the document.Purchase the document to get full access instantly

Immediately available after payment
Both online and downloadable
No strings attached
How It Works
Login account
Login Your Account
Place in cart
Add to Cart
send in the money
Make payment
Document download
Download File
img

Uploaded by : Mrs. Amanda Cruz PhD

PageId: DOCB6DABC5