CCF 4
CCF 4
2. CLOUD ARCHITECTURE
• Cloud computing architecture consists of many loosely coupled cloud
components. The architecture is mainly divides the cloud architecture into
two parts: Front End and Back End.
• Each end is connected to others through a network, generally to the
Internet.
• The cloud technology architecture also consists of front-end platforms
called the cloud client which comprises servers, thin & fat client, tablets
& mobile devices. The interaction is done through middleware or via web
browser or virtual sessions.
Front End
• The front end is the side of computer user or client. Eg web browser
• It involves the interfaces and the applications that are necessary to access
the Cloud Computing system.
Back End
• The back end is the cloud section of the system. It involves all the
resources which are necessary to give Cloud computing services. It
includes huge data storage, virtual machines, security mechanism ,
services and deployment models, servers etc.
• back-end to provide the security of data for cloud users along with the
traffic control mechanism. The server also provides the middleware
which helps to connect devices & communicate with each other.
Components of Cloud Computing Architecture
• Client Infrastructure – Client Infrastructure is a part of the frontend
component. It contains the applications and user interfaces which are
required to access the cloud platform
• Application : Application is a part of backend component that refers to a
software or platform to which client accesses. Means it provides the
service in backend as per the client requirement.
• Service: Service in backend refers to the major three types of cloud based
services like SaaS, PaaS and IaaS. Also manages which type of service
the user accesses.
• Runtime Cloud: Runtime cloud in backend provides the execution and
Runtime platform/environment to the Virtual machine.
• Storage: Storage in backend provides flexible and scalable storage service
and management of stored data.
• Infrastructure: Cloud Infrastructure in backend refers to the hardware and
software components of cloud like it includes servers, storage, network
devices, virtualization software etc.
• Management: Management in backend refers to management of backend
components like application, service, runtime cloud, storage,
infrastructure, and other security mechanisms etc.
• Security: Security in backend refers to implementation of different
security mechanisms in the backend for secure cloud resources, systems,
files, and infrastructure to end users.
Benefits of Cloud Computing Architecture
• Makes overall cloud computing system simpler.
• Improves data processing requirements.
• Helps in providing high security.
• Makes it more modularized.
• Results in better disaster recovery.
• Gives good user accessibility.
• Reduces IT operating costs.
• Provides high level reliability.
• Scalability.
Challenges in Cloud Architecture:
• Security and Privacy: Ensuring data protection and compliance with
• regulations.
• Latency: Managing delays in data transfer and processing.
• Interoperability: Ensuring compatibility between different cloud
• services and platforms.
• Vendor Lock In: Difficulty in switching providers due to proprietary
• technologies and services.
• During 1961, John MacCharty delivered his speech at MIT that “Computing
Can be sold as a Utility, like Water and Electricity.”
• According to John MacCharty it was a brilliant idea.
• But people at that time don’t want to adopt this technology.
• They thought the technology they are using efficient enough for them. So,
this concept of computing was not appreciated much so and very less will
research on it.
• But as the time fleet the technology caught the idea after few years this idea
is implemented. So, this is implemented by Salesforce.com in 1999.
• This company started delivering an enterprise application over the internet
and this way the boom of Cloud Computing was started.
• In 2002, Amazon started Amazon Web Services (AWS), Amazon will
provide storage, computation over the internet.
• In 2006 Amazon will launch Elastic Compute Cloud Commercial Service
which is open for Everybody to use.
• After that in 2009, Google Play also started providing Cloud Computing
Enterprise Application as other companies will see the emergence of cloud
Computing they also started providing their cloud services.
• Thus, in 2009, Microsoft launch Microsoft Azure and after that other
companies like Alibaba, IBM, Oracle, HP also introduces their Cloud
Services. In today the Cloud Computing become very popular and important
skill.
8. WRITE IN DETAIL ABOUT THE IMPORTANCE OF CLOUD
COMPUTING IN THE CURRENT ERA.
Types of Virtualization
1. Application Virtualization: Application virtualization helps a user to have
remote access to an application from a server. The server stores all personal
information and other characteristics of the application but can still run on a
local workstation through the internet. An example of this would be a user who
needs to run two different versions of the same software. Technologies that use
application virtualization are hosted applications and packaged applications.
2. Network Virtualization: The ability to run multiple virtual networks with
each having a separate control and data plan. It co-exists together on top of one
physical network. It can be managed by individual parties that are potentially
confidential to each other. Network virtualization provides a facility to create
and provision virtual networks, logical switches, routers, firewalls, load
balancers, Virtual Private Networks (VPN), and workload security within days
or even weeks.
Network Virtualization
3. Desktop Virtualization: Desktop virtualization allows the users’ OS to be
remotely stored on a server in the data center. It allows the user to access their
desktop virtually, from any location by a different machine. Users who want
specific operating systems other than Windows Server will need to have a
virtual desktop. The main benefits of desktop virtualization are user mobility,
portability, and easy management of software installation, updates, and patches.
4. Storage Virtualization: Storage virtualization is an array of servers that are
managed by a virtual storage system. The servers aren’t aware of exactly where
their data is stored and instead function more like worker bees in a hive. It
makes managing storage from multiple sources be managed and utilized as a
single repository. storage virtualization software maintains smooth operations,
consistent performance, and a continuous suite of advanced functions despite
changes, breaks down, and differences in the underlying equipment.
5. Server Virtualization: This is a kind of virtualization in which the masking
of server resources takes place. Here, the central server (physical server) is
divided into multiple different virtual servers by changing the identity number,
and processors. So, each system can operate its operating systems in an isolated
manner. Where each sub-server knows the identity of the central server. It
causes an increase in performance and reduces the operating cost by the
deployment of main server resources into a sub-server resource. It’s beneficial
in virtual migration, reducing energy consumption, reducing infrastructural
costs, etc.
Server Virtualization
6. Data Virtualization: This is the kind of virtualization in which the data is
collected from various sources and managed at a single place without knowing
more about the technical information like how data is collected, stored &
formatted then arranged that data logically so that its virtual view can be
accessed by its interested people and stakeholders, and users through the various
cloud services remotely. Many big giant companies are providing their services
like Oracle, IBM, At scale, Cdata, etc
13. CLOUD GOVERNANCE AND ITS NEED
Cloud Governance :
• It is the set of policies or principles that act as the guidance for the
adoption use, and management of cloud technology services.
• It is an ongoing process that must sit on top of existing governance
models.
• It is a set of rules you create to monitor and amend as necessary in order
to control costs, improve efficiency, and eliminate security risks.
Need for Cloud Governance :
By implementing cloud governance, organizations can avoid the following
issues as follows.
1. Security and privacy risks :
• This issue may arise due to unauthorized downloads/ installation of
software, storage of illegal data, and access to restricted sites by users.
• Cloud Governance solutions cover multiple cloud security components.
For example, Encryption, Security groups, Audit trails, Application
access rules, Access controls.
2. Vendor lock-in :
• Many vendors opt for this, as this clause causes organizations to depend
on the cloud service provider (or vendor) for products and services.
• This can be avoided by making changes to the SLA suitably and reduce
dependencies on a single vendor, thus ensuring freedom to the
organization.
3. Cloud Sprawl :
• This happens when employees of different departments use different
programs and cloud infrastructure from third-party providers without
involving the IT department and getting necessary approvals.
• If not detected and restricted, crowd sprawl may lead to fragmented,
redundant, inefficient, and unmanaged cloud programs sitting on the
enterprise cloud and unnecessarily creating trouble.
4. Shadow IT and unwarranted usage of cloud resources :
• This happens when employees in various departments do not follow the
rules and regulations as imposed by the IT department on cloud usage
resulting in security breaches and fragmented control throughout the
organization.
• This leads to not getting sufficient results from the cloud in the long run.
5. Lack of data portability and interoperability :
• This happens when the cloud service provider or the inbuilt cloud
infrastructure is incapable of connecting well with other software and
products outside the organization.
• This may also lead to modules not compatible with each other and hence
chaos in the cloud due to an inefficient system.
2. Core Services
a. Compute Services
AWS offers powerful compute services for various workloads:
• Amazon EC2 (Elastic Compute Cloud): Provides scalable virtual servers,
enabling users to launch instances with varying CPU, memory, and
storage configurations.
• AWS Lambda: A serverless compute service that runs code in response
to events and automatically manages the underlying compute resources.
• Amazon ECS/EKS: Supports containerized applications using Docker or
Kubernetes.
• Elastic Beanstalk: Simplifies deploying and managing applications by
automating resource provisioning.
b. Storage Services
AWS provides scalable and secure storage solutions:
• Amazon S3 (Simple Storage Service): Offers object storage with high
durability and availability for any type of data.
• Amazon EBS (Elastic Block Store): Provides block storage for EC2
instances, optimized for performance.
• Amazon Glacier: A cost-effective service for data archiving and long-term
backup.
• AWS Storage Gateway: Bridges on-premises data with cloud storage for
hybrid cloud architectures.
c. Database Services
AWS includes fully managed and scalable database services:
• Amazon RDS (Relational Database Service): Supports popular relational
database engines like MySQL, PostgreSQL, and SQL Server.
• Amazon DynamoDB: A NoSQL database designed for high-performance
applications.
• Amazon Redshift: A data warehousing solution for analytics at scale.
• Amazon Aurora: A relational database offering compatibility with MySQL
and PostgreSQL, designed for high performance.
4. Developer Tools
AWS supports developers through various tools:
• AWS CodePipeline: A CI/CD service for automating the release process.
• AWS CodeBuild: Compiles source code, runs tests, and produces
deployment-ready packages.
• AWS CodeDeploy: Automates application deployments to compute
services.
8. Benefits of AWS
• Scalability: Automatically adjusts resources to meet workload demands.
• Global Reach: Availability across multiple regions and edge locations.
• Cost Efficiency: Pay-as-you-go model with options to reserve resources
at discounted rates.
• Flexibility: Supports a wide range of operating systems, databases, and
programming languages.
• Reliability: Built-in redundancy and failover mechanisms ensure high
availability.
2. WHAT IS GOOGLE APP ENGINE (GAE)?
Pre-requisite:- Google Cloud Platform
A scalable runtime environment, Google App Engine is mostly used to run Web
applications. These dynamic scales as demand change over time because of
Google’s vast computing infrastructure. Because it offers a secure execution
environment in addition to a number of services, App Engine makes it easier to
develop scalable and high-performance Web apps. Google’s applications will
scale up and down in response to shifting demand. Croon tasks,
communications, scalable data stores, work queues, and in-memory caching
are some of these services.
The App Engine SDK facilitates the testing and professionalization of
applications by emulating the production runtime environment and allowing
developers to design and test applications on their own PCs. When an
application is finished being produced, developers can quickly migrate it to App
Engine, put in place quotas to control the cost that is generated, and make the
programmer available to everyone. Python, Java, and Go are among the
languages that are currently supported.
The development and hosting platform Google App Engine, which powers
anything from web programming for huge enterprises to mobile apps, uses the
same infrastructure as Google’s large-scale internet services. It is a fully
managed PaaS (platform as a service) cloud computing platform that uses in-
built services to run your apps. You can start creating almost immediately after
receiving the software development kit (SDK). You may immediately access the
Google app developer’s manual once you’ve chosen the language you wish to
use to build your app.
After creating a Cloud account, you may Start Building your App
• Using the Go template/HTML package
• Python-based webapp2 with Jinja2
• PHP and Cloud SQL
• using Java’s Maven
The app engine runs the programmers on various servers while “sandboxing”
them. The app engine allows the program to use more resources in order to
handle increased demands. The app engine powers programs like Snapchat,
Rovio, and Khan Academy. For an in-depth understanding of how GAE fits into
DevOps workflows, the DevOps Engineering – Planning to Production course
offers step-by-step instructions on using GAE in production environments
Features of App Engine
Runtimes and Languages
To create an application for an app engine, you can use Go, Java, PHP, or
Python. You can develop and test an app locally using the SDK’s deployment
toolkit. Each language’s SDK and nun time are unique. Your program is run in a:
• Java Run Time Environment version 7
• Python Run Time environment version 2.7
• PHP runtime’s PHP 5.4 environment
• Go runtime 1.2 environment
Generally Usable Features
These are protected by the service-level agreement and depreciation policy of
the app engine. The implementation of such a feature is often stable, and any
changes made to it are backward-compatible. These include communications,
process management, computing, data storage, retrieval, and search, as well as
app configuration and management. Features like the HRD migration tool,
Google Cloud SQL, logs, datastore, dedicated Memcached, blob store,
Memcached, and search are included in the categories of data storage,
retrieval, and search.
Features in Preview
In a later iteration of the app engine, these functions will undoubtedly be made
broadly accessible. However, because they are in the preview, their
implementation may change in ways that are backward-incompatible. Sockets,
MapReduce, and the Google Cloud Storage Client Library are a few of them.
Experimental Features
These might or might not be made broadly accessible in the next app engine
updates. They might be changed in ways that are irreconcilable with the past.
The “trusted tester” features, however, are only accessible to a limited user
base and require registration in order to utilize them. The experimental
features include Prospective Search, Page Speed, OpenID,
Restore/Backup/Datastore Admin, Task Queue Tagging, MapReduce, and Task
Queue REST API. App metrics analytics, datastore admin/backup/restore, task
queue tagging, MapReduce, task queue REST API, OAuth, prospective search,
OpenID, and Page Speed are some of the experimental features.
Third-Party Services
As Google provides documentation and helper libraries to expand the
capabilities of the app engine platform, your app can perform tasks that are not
built into the core product you are familiar with as app engine. To do this,
Google collaborates with other organizations. Along with the helper libraries,
the partners frequently provide exclusive deals to app engine users.
Advantages of Google App Engine
The Google App Engine has a lot of benefits that can help you advance your
app ideas. This comprises:
1. Infrastructure for Security: The Internet infrastructure that Google uses
is arguably the safest in the entire world. Since the application data and
code are hosted on extremely secure servers, there has rarely been any
kind of illegal access to date.
2. Faster Time to Market: For every organization, getting a product or
service to market quickly is crucial. When it comes to quickly releasing
the product, encouraging the development and maintenance of an app is
essential. A firm can grow swiftly with Google Cloud App Engine’s
assistance.
3. Quick to Start: You don’t need to spend a lot of time prototyping or
deploying the app to users because there is no hardware or product to
buy and maintain.
4. Easy to Use: The tools that you need to create, test, launch, and update
the applications are included in Google App Engine (GAE).
5. Rich set of APIs & Services: A number of built-in APIs and services in
Google App Engine enable developers to create strong, feature-rich
apps.
6. Scalability: This is one of the deciding variables for the success of any
software. When using the Google app engine to construct apps, you may
access technologies like GFS, Big Table, and others that Google uses to
build its own apps.
7. Performance and Reliability: Among international brands, Google ranks
among the top ones. Therefore, you must bear that in mind while talking
about performance and reliability.
8. Cost Savings: To administer your servers, you don’t need to employ
engineers or even do it yourself. The money you save might be put
toward developing other areas of your company.
9. Platform Independence: Since the app engine platform only has a few
dependencies, you can easily relocate all of your data to another
environment.
CHATGPT
Detailed Explanation of Google App Engine
1. Introduction Google App Engine (GAE) is a Platform as a Service (PaaS)
offering that enables developers to build and host scalable web applications in
Google's managed infrastructure. Launched by Google in 2008, it simplifies
application development by providing a pre-configured environment and tools
to handle application hosting, scaling, and maintenance.
5. Advantages
1. Rapid Development:
o Shortens development cycles with pre-configured environments
and easy deployment.
2. Focus on Application Logic:
o Eliminates the need for managing servers or infrastructure.
3. Scalability:
o Automatically adjusts resources to meet the user load.
4. Google Ecosystem Integration:
o Seamlessly integrates with other Google Cloud products like
BigQuery, Cloud Functions, and Pub/Sub.
6. Use Cases
1. Web Applications:
o Hosting of lightweight, user-facing applications.
2. Mobile Backends:
o Act as a backend for mobile applications with API support.
3. E-commerce Platforms:
o Build and host online stores with dynamic scaling.
4. IoT Applications:
o Process and manage IoT data with built-in analytics and storage.
3. MICROSOFT AZURE
Azure is Microsoft’s cloud platform, just like Google has its Google Cloud and
Amazon has its Amazon Web Service or AWS.000. Generally, it is a platform
through which we can use Microsoft’s resources. For example, to set up a huge
server, we will require huge investment, effort, physical space, and so on. In
such situations, Microsoft Azure comes to our rescue. It will provide us with
virtual machines, fast processing of data, analytical and monitoring tools, and
so on to make our work simpler. The pricing of Azure is also simpler and more
cost-effective. Popularly termed as “Pay As You Go”, which means how much
you use, pay only for that.
How does Microsoft Azure Work?
It is a private and public cloud platform that helps developers and IT
professionals build deploy and manage applications. It uses the technology
known as virtualization. Virtualization separates the tight coupling between the
hardware and the operating system using an abstraction layer called a
hypervisor. Hypervisor emulates all the functions of a computer in a virtual
machine, it can run multiple virtual machines at the same time and each virtual
machine can run any operating system, such as Windows or Linux.
Azure takes this virtualization technique and repeats it on a massive scale in
the data center owned by Microsoft. Each data center has many racks filled
with servers and each server includes a hypervisor to run multiple virtual
machines. The network switch provides connectivity to all those servers.
Types of Azure Services
Microsoft Azure is a cloud computing platform which offers the following types
of services:
• Infrastructure as a service ( IaaS )
• Platform as a service (PaaS)
• Software as a service (SaaS)
Infrastructure as a service (IaaS)
Virtual machines, storage, and networking will come under the category of
infrastructure as a service but the users have to do manually the build and
deploy of the applications. Azure will support a wide range of operating
systems because of its Hyper-hypervisor.
To know more about IaaS you can refer to this link What is IaaS?
Platform as a service (PaaS)
Azure app service, Azure functions, and logic apps are some services that are
offered by Azure under the platform as a service. This service will provide
autoscaling and load balancing and also there will be a pre-configured
environment for the application.
To know more about PaaS you can refer to this link What is PaaS?
Software as a service (SaaS)
Office 365, Dynamics 365, and Azure Active Directory are some of the services
provided by Microsoft Azure under Software as a Service (SaaS) the complete
application will be managed by the Microsoft azure including deploying, scaling
and load balancing.
What is a Public Cloud? Everything You Need to Know
Computing in which service provider makes all resources public over the
internet. It is connected to the public Internet. Service provider serves
resources such as virtual machines, applications, storage, etc to the general
public over the internet. It may be free of cost or with minimal pay-per-usage.
It is available for public display, Google uses the cloud to run some of its
applications like google docs, google drive or YouTube, etc.
It is the most common way of implementing cloud computing. The external
cloud service provider owns, operates, and delivers it over the public
network. It is best for the companies which need an infrastructure to
accommodate a large number of customers and work on projects which have
diverse organizations i.e. research institutions and NGOs etc.
Key Characteristics of Public Clouds
The following are the characteristics of Public Cloud:
• Accessibility: Public clouds are easily accessible over the internet from
anywhere, enabling convenient access to resources.
• Scalability: They offer scalability, allowing users to quickly adjust
resources based on demand, ensuring efficient resource utilization.
• Cost-effectiveness: Public clouds operate on a pay-as-you-go model,
reducing upfront costs and enabling cost-effective usage of resources.
• Security: Robust security measures such as encryption, access controls,
and compliance certifications are implemented to protect data and
infrastructure.
What is Microsoft Azure Used For?
Following are the some the use cases that Microsoft Azure Used.
• Deployment Of applications: You can develop and deploy the
application in the azure cloud by using the service called Azure App
Service and Azure Functions after deploying the applications end users
can access it.
• Identity and Access Management: The application and data which is
deployed and stored in the Microsoft Azure can be secured with the help
of Identity and Access Management. It’s commonly used for single sign-
on, multi-factor authentication, and identity governance.
• Data Storage and Databases: You can store the data in Microsoft azure in
service like blob storage for unstructured data, table storage for NoSQL
data, file storage, and Azure SQL Database for relational databases. The
service can be scaled depending on the amount of data we are getting.
• DevOps and Continuous Integration/Continuous Deployment
(CI/CD): Azure DevOps will provide some tools like including version
control, build automation, release management, and application
monitoring.
Azure for Disaster Recovery and Backup
A full range of disaster recovery (DR) and backup services are available from
Microsoft Azure to help shield your vital data and apps from interruptions.
With the help of these services, you may quickly restore your data and
applications in the event of a disaster by replicating them to a secondary cloud
site. Azure backup services also protect your data from ransomware attacks,
unintentional deletion, and corruption.
Key Azure DR and Backup Services
• Azure Site Recovery: Your on-premises virtual machines (VMs) can be
replicated to Azure more easily with the help of this solution. You may
easily failover your virtual machines (VMs) to Azure in the event of a
disaster and keep your business running. Azure VM replication to an
alternative Azure region is also supported by Azure Site Recovery.
• Azure Backup: If you want to protect the data which is present in the
cloud then you need to use the Azure Backup service. It offers a single
area to monitor backup jobs, manage backup policies, and recover data.
Azure pricing and costs.
Azure Competition
Following are the some of the competitors of Microsoft Azure:
• Amazon Web Services (AWS): Market leader offering a wide range of
cloud services with extensive global infrastructure.
• Google Cloud Platform (GCP): It known for its innovative services like Big
Query and TensorFlow, with a strong focus on data analytics and
machine learning.
• IBM Cloud: It offers a comprehensive suite of cloud services,
including AI, blockchain, and IoT solutions, with a focus on enterprise
clients.
• Oracle Cloud Infrastructure (OCI): IT focuses on enterprise-grade cloud
solutions, including databases, applications, and infrastructure services,
leveraging Oracle’s expertise in enterprise software.
Azure History
Microsoft unveiled Windows Azure in early October 2008 but it went to live
after February 2010. Later in 2014, Microsoft changed its name from Windows
Azure to Microsoft Azure. Azure provided a service platform for .NET
services, SQL Services, and many Live Services. Many people were still very
skeptical about “the cloud”. As an industry, we were entering a brave new
world with many possibilities. Microsoft Azure is getting bigger and better in
the coming days.
More tools and more functionalities are being added. It has two releases as of
now. It’s a famous version of Microsoft Azure v1 and later Microsoft Azure v2.
Microsoft Azure v1 was more JSON script-driven than the new version v2,
which has interactive UI for simplification and easy learning. Microsoft Azure v2
is still in the preview version.
How Azure can help in Business?
Azure can help our business in the following ways:
• Capital less: We don’t have to worry about the capital as Azure cuts out
the high cost of hardware. You simply pay as you go and enjoy a
subscription-based model that’s kind to your cash flow. Also, setting up
an Azure account is very easy. You simply register in Azure Portal and
select your required subscription and get going.
• Less Operational Cost: Azure has a low operational cost because it runs
on its servers whose only job is to make the cloud functional and bug-
free, it’s usually a whole lot more reliable than your own, on-location
server.
• Cost Effective: If we set up a server on our own, we need to hire a tech
support team to monitor them and make sure things are working fine.
Also, there might be a situation where the tech support team is taking
too much time to solve the issue incurred in the server. So, in this regard
is way too pocket-friendly.
• Easy Back-Up and Recovery options: Azure keeps backups of all your
valuable data. In disaster situations, you can recover all your data in a
single click without your business getting affected. Cloud-based backup
and recovery solutions save time, avoid large up-front investments and
roll up third-party expertise as part of the deal.
• Easy to implement: It is very easy to implement your business models in
Azure. With a couple of on-click activities, you are good to go. Even there
are several tutorials to make you learn and deploy faster.
• Better Security: Azure provides more security than local servers. Be
carefree about your critical data and business applications. As it stays
safe in the Azure Cloud. Even, in natural disasters, where the resources
can be harmed, Azure is a rescue. The cloud is always on.
• Work from anywhere: Azure gives you the freedom to work from
anywhere and everywhere. It just requires a network connection and
credentials. And with most serious Azure cloud services offering mobile
apps, you’re not restricted to which device you’ve got to hand.
• Increased collaboration: With Azure, teams can access, edit and share
documents anytime, from anywhere. They can work and achieve future
goals hand in hand. Another advantage of Azure is that it preserves
records of activity and data. Timestamps are one example of Azure’s
record-keeping. Timestamps improve team collaboration by establishing
transparency and increasing accountability.
What are the various Azure Services and How does Azure Work?
Following are some of the services Microsoft Azure offers:
• Compute: Includes Virtual Machines, Virtual Machine Scale Sets,
Functions for serverless computing, Batch for containerized batch
workloads, Service Fabric for microservices and container orchestration,
and Cloud Services for building cloud-based apps and APIs.
• Networking: With Azure, you can use a variety of networking tools, like
the Virtual Network, which can connect to on-premise data centers; Load
Balancer; Application Gateway; VPN Gateway; Azure DNS for domain
hosting, Content Delivery Network, Traffic Manager, ExpressRoute
dedicated private network fiber connections; and Network Watcher
monitoring and diagnostics
• Storage: Includes Blob, Queue, File, and Disk Storage, as well as a Data
Lake Store, Backup, and Site Recovery, among others.
• Web + Mobile: Creating Web + Mobile applications is very easy as it
includes several services for building and deploying applications.
• Containers: Azure has a property that includes Container Service, which
supports Kubernetes, DC/OS or Docker Swarm, and Container
Registry, as well as tools for microservices.
• Databases: Azure also included several SQL-based databases and related
tools.
• Data + Analytics: Azure has some big data tools like HDInsight
for Hadoop Spark, R Server, HBase, and Storm clusters
• AI + Cognitive Services: With Azure developing applications with artificial
intelligence capabilities, like the Computer Vision API, Face API, Bing
Web Search, Video Indexer, and Language Understanding Intelligent.
• Internet of Things: Includes IoT Hub and IoT Edge services that can be
combined with a variety of machine learning, analytics, and
communications services.
• Security + Identity: Includes Security Center, Azure Active Directory, Key
Vault, and Multi-Factor Authentication Services.
• Developer Tools: Includes cloud development services like Visual Studio
Team Services, Azure DevTest Labs, HockeyApp mobile app deployment
and monitoring, Xamarin cross-platform mobile development, and more.
What is Azure Cloud Shell?
Azure PowerShell is an extension of Windows PowerShell that allows users to
manage Azure’s vast features through the PowerShell interface. Developers use
cmdlets—pre-written scripts—to perform complex tasks like deploying virtual
machines (VMs) or creating cloud services from the command line. Azure
PowerShell (APS) can also automate processes through scripting. While some
users have noted that the interface feels somewhat incomplete and support
could be improved, advocates highlight the platform’s simplicity in handling
typically challenging operations.
With Azure Cloud Shell, you can:
• Execute commands and scripts on your Azure resources using a unified
command-line interface that offers features like tab completion and
command history.
• Manage your Azure subscription with a comprehensive set of commands
that allow you to create, list, and delete subscriptions, as well as control
user access keys.
• Begin interactive tutorials to learn how to use common features, such as
creating virtual machines or virtual networks.
How to Access Azure Shell?
Azure Cloud Shell provides a convenient way to manage and develop Azure
resources directly from your browser. You can easily access it via the Azure Web
Portal or by navigating to https://shell.azure.com, where you can choose
between Bash and PowerShell environments for your command-line tasks.
To know about How to access Azure Shell you can refer to this link How to
access Azure Shell?
What is Azure Security?
Azure Security encompasses the various tools and features provided by
Microsoft on its Azure cloud platform to ensure security. According to
Microsoft, these tools include a comprehensive range of physical,
infrastructure, and operational controls designed to protect its cloud services.
As a public cloud computing platform, Azure supports a diverse array of
programming languages, operating systems, frameworks, and devices. Users
can access Azure’s services and resources from anywhere as long as they have
an internet connection.
What is Azure Security Center?
Azure Security Center is a comprehensive security management platform
provided by Microsoft for Azure users. It offers several key benefits, including:
• Visibility and Control: It enables users to gain insight and manage the
security of various Azure resources, such as Virtual Machines, Cloud
Services, Azure Virtual Networks, and Blob Storage.
• Protection for Hybrid Workloads: It secures workloads that are deployed
both within Azure and in non-Azure environments, including on-
premises systems.
• Enhanced Security Posture: The Azure Security Center continuously
monitors the cloud environment, helping users understand the security
status of their resources and improve their security posture.
• Threat Detection and Mitigation: With a centralized dashboard, the
Azure Security Center provides alerts and recommendations, assisting
organizations in detecting and preventing cybersecurity threats. This also
aids in regulatory compliance by streamlining security policies across the
platform.
Additionally, Azure Security Center tackles several security challenges:
• Dynamic Workloads: As customers utilize a variety of cloud services that
frequently change, the Azure Security Center simplifies the
implementation of security standards and best practices.
• Evolving Threats: With more organizations shifting to the public cloud,
cyber threats have become increasingly sophisticated. Azure Security
Center helps customers secure their workloads and minimizes
vulnerabilities by promoting adherence to security best practices.
• Lack of Security Expertise: The high volume of security alerts can
overwhelm administrators, especially those with limited experience.
Azure Security Center equips administrators with tools to effectively
respond to and manage these threats.
How Azure Security Works?
According to Azure Security documentation, Microsoft Azure employs a shared
security responsibility model, indicating that security is a collaborative effort
between Azure and its customers. In on-premises environments, the entire
security burden lies with the customer. However, as customers transition to the
cloud, certain security responsibilities shift to Azure.
Here’s how the responsibilities vary across different cloud service models:
• Infrastructure as a Service (IaaS): Azure assumes responsibility for
physical security, including hosts, networks, and data centers.
• Platform as a Service (PaaS): Azure manages physical security and the
operating system, while responsibilities for identity and directory
infrastructure, network controls, and applications are shared with
customers.
• Software as a Service (SaaS): Azure takes on even more responsibilities,
including physical security, operating systems, network controls, and
applications, while still sharing identity and directory infrastructure with
the customer.
In summary, Azure secures the physical infrastructure, but the distribution of
responsibilities varies based on the cloud service model. Customers retain
more responsibilities in IaaS compared to PaaS or SaaS. Regardless of the
environment—on-premises, IaaS, PaaS, or SaaS—customers are consistently
accountable for data governance and rights management, account and access
management, and endpoint protection.
Azure Security Best Practices
The Azure Security documentation serves as a valuable resource for security
recommendations and best practices. Here are some key tips to help you
enhance your security posture:
• Implement Role-Based Access Control (RBAC): Use Azure Security
Center’s RBAC to manage permissions effectively. Familiarize yourself
with the five built-in roles (Subscription Owner, Resource Group Owner,
Subscription Contributor, Resource Group Contributor, and Reader) and
two specific security roles (Security Administrator and Security Reader),
each with different levels of access.
• Regularly Monitor the Azure Security Center Dashboard: Keep an eye
on the dashboard for a centralized view of your Azure resources, which
also provides actionable recommendations.
• Establish Security Policies: Implement security policies to prevent
misuse of resources. Azure can automatically generate a security policy
tailored to your subscription.
• Upgrade to Azure Security Center Standard: By upgrading your
subscription, you can access advanced features such as identifying and
resolving security vulnerabilities, leveraging analytics for threat
detection, and enabling quick responses to security incidents.
• Utilize Azure Key Vault: Store your keys securely in Azure Key Vault,
which is specifically designed to manage secrets like passwords and
database credentials.
• Implement a Web Application Firewall: Protect your applications from
common threats and vulnerabilities by installing a web application
firewall.
• Enable Azure Multi-Factor Authentication (MFA): Use MFA, particularly
for administrative accounts, to add an extra layer of security.
• Encrypt Virtual Hard Disks: Ensure the confidentiality of your data by
encrypting virtual hard disk files.
• Connect Azure Virtual Machines via Virtual Networks: Enhance security
by placing Azure VMs on virtual networks when connecting to other
networked devices.
• Leverage Azure DDoS Protection: Utilize Azure’s Distributed Denial of
Service (DDoS) services to safeguard against and mitigate DDoS attacks.
What is Microsoft Azure Architecture?
Microsoft Azure, a well-known cloud computing platform, provides users with
the tools to design, deploy and manage numerous applications and services.
Various products include machine learning, mobile application development,
and Internet of Things (IoT) solutions, making it venerable for almost all
application or service types. The Azure platform can work from PCs, laptops,
smartphones, and tablets, and supports many programming languages,
including HTML5, JavaScript, PHP, Python, and C#.
Along with application hosting, Microsoft Azure is also a safe place to store
information where users can store files online and access them from anywhere.
Commonly used to host applications including email and social media, it can
store any kind of data from documents to images to videos.
Microsoft also operates many physical data centers globally. IT infrastructure,
such as server racks and network connectivity, is necessary for enterprises and
organizations to run their IT requirements. The key technique in this
infrastructure is virtualization, which reduces excess physical hardware by
dynamically scaling resources required, depending on the demand. This is key
to cloud computing because it allows the software to run on any server within
a data center.
Azure’s foundation is envisioned by SDN principles. Due to the demand from
the users, Microsoft has been continually enhancing Azure’s network by
installing several new servers, hardware virtualization technologies, and new
applications. Continuous evolvement of such services calls for a constant
enhancement in the already deployed network hardware and software,
thereby affecting the configuration and performance of the overall system. This
implies that the management of such complex network topology is increasingly
important for effectual scaling and resource management.
After establishing the emphasis on technology and architecture, the
application’s technical design is a natural progression. Each application is self-
standing, but the following resources can help in the process of construction:
• Reference Architectures: All reference architectures are designed for
growth and changes which every vendor must have these days. You can
easily find one reference architecture that accommodates the number of
people in your team and the requirements that your project entails. One
if the remarkable goads of these architectures is that they enable the
user to start building from where they are comfortable, given the type of
client they are dealing with. Each reference architecture also includes
implementation details that are necessary for leveraging the
architecture. Recommended architectures undergo the sponsorship from
the vendors in order to actualize their usage.
• Design Principles: It is important to appreciate the principles of design
that are inherent in the various perspectives. For example, in the context
of the high level design processes, there are principles to policy
development that may be valuable, such as, constraints based design
principles. In contrast, alignment-based design principles may be
appropriate in low-level design processes. These principles should always
be used as a source of information in the course of carrying out the
design phase of the system.
• Design Patterns: Cloud design patterns represent solutions that cloud
providers use to enhance the reliability and scalability of their services.
These patterns consist of best practices, guidelines, and rules that
encapsulate effective strategies for cloud system design. By leveraging
these patterns, you can create a more robust and efficient cloud
architecture.
Features of Azure
Azure offers a comprehensive array of features designed to enhance data
protection and application management:
• Data Protection: Azure ensures the security of your data through various
methods, including replication, snapshots, and encryption. These options
allow for data protection across multiple regions globally, providing an
added layer of security against natural disasters, cyberattacks, or
hardware failures. By storing data in various data centers worldwide,
Azure guarantees that your information remains safe, even if one
location experiences an incident.
• Azure Site Recovery: This feature gives you full control over data
replication processes, allowing you to define the level of detail and
metrics to monitor. You can customize the replication schedule based on
your business requirements, ensuring your data remains secure and
accessible.
• Development Flexibility: Azure supports a wide range of capabilities for
building, deploying, and managing applications that can run on any
device at any time. Users can choose their preferred programming
languages and frameworks, enabling horizontal scaling by adding servers
or distributing the load across multiple servers.
• Open-Source Tools: Azure provides numerous tools and services rooted
in open-source technology, facilitating monitoring, logging, and
troubleshooting. These resources enable you to keep track of your
application’s health and address any issues that may arise.
• App Services and Mobile Management: Azure offers hosting through
App Services, allowing you to quickly deploy updates and new features
to your applications without downtime. It also supports mobile device
management (MDM) for apps tailored to mobile users.
• Active Directory Integration: Azure Active Directory (AAD) enhances
security by connecting user profiles with applications, enabling seamless
sign-in experiences. Through Active Directory synchronization, user
accounts, groups, and permissions are automatically managed between
on-premises Active Directory and Azure Active Directory, streamlining
user management and policy enforcement within your organization.
By leveraging these features, Azure enables businesses to build resilient,
scalable, and secure applications tailored to their needs.
Difference between AWS, Google Cloud, and Azure
The following are the differences among AWS, Google Cloud and Azure:
Fully supports
Fully supports Supports relational and
relational and NoSQL
technologies like Big NoSQL through Windows
Databases databases and Big
Query, Big Table, Hadoop Azure Table and HDInsight
Supported Data