Section 3 Provisioning and Migrating Cloud Resources

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/92

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

93 Terms

1
New cards

Resource allocation

The appropriate central processing unit/graphics processing unit, memory, storage, and network connectivity to support the application's performance, availability, and security requirements

2
New cards

Advantages of Virtualization

Cloud computing makes it far easier to scale—manually or automatically—compute resources to satisfy these requirements

3
New cards

Virtual CPU (vCPU)

Virtualized CPU assigned to a virtual machine that uses capacity from a physical CPU.

4
New cards

Input/Output (I/O)

Refers to the sending and receiving of information between a computer and other devices.

5
New cards

What is the primary element of Infrastructure as a Service (IaaS) solutions?

Server virtualization

6
New cards

hypervisor

Software or firmware that creates and manages virtual machines on the host hardware.

A management layer between the physical server hardware and the virtual machines (VMs) configured on that hardware

7
New cards

Type 1 hypervisors

Run directly on the server’s hardware

Cloud service providers (CSPs) offer Type 1 hypervisors on bare metal hardware, permitting cloud administrators to build VMs within the structure

8
New cards

Type 2 hypervisors

Run as an application within the server’s host operating system

Common for workstation or developer deployments and less common for production servers

9
New cards

oversubscription

Allows administrators to allocate more resources to VMs than the host system has available

Advantage is higher density and better resource utilization, as long as not all VMs consume their maximum resources simultaneously

The VMs cannot use more resources than the host provides

10
New cards

Virtual machine (VM) instances

A virtualized computing environment that runs on a physical server. It functions like a separate computer with its own operating system, CPU, memory, and storage, but it is hosted on a hypervisor that allows multiple VMs to run on the same physical machine

11
New cards

Typically when can you resize an instance and why should you?

Must be offline during the process

May need to resize instances based on misconfigurations, unanticipated growth, or to optimize costs

12
New cards

Multi-threading

A system's ability to divide tasks among multiple CPU cores, allowing several functions to be managed simultaneously

13
New cards

Provisioning vCPUs for VMs means calculating the CPU cores and selected threads, how is that done?

The AWS formula for this calculation is:

vCPU = number of cores x number of threads

For example, the f1.2xlarge image contains eight vCPUs. That is a combination of two threads per core, with four cores. The f1.4xlarge vCPU default is 16, with eight cores and two threads per core

14
New cards

Pass-through GPUs

A virtualization configuration that provides a virtual machine with direct access to GPU resources, bypassing the hypervisor.

For example, you can select an Ubuntu Linux platform with an NVIDIA GPU for cloud-based gaming

15
New cards

What is clock speed?

A common performance measurement for CPUs

16
New cards

What is the easiest way to configure virtual machines (VMs) for RAM-intensive applications and services?

Like Virtual CPU (vCPU) configurations, cloud service providers (CSPs) allocate RAM to various instance types

17
New cards

(AWS) Elastic Compute (EC2)

AWS service providing secure and scalable access to compute capacity.

18
New cards

When can Sysadmins change the instance type?

While the instance is powered off to resize the amount of memory or vCPU configuration in the AWS Management Console

19
New cards

Data Retention

The process an organization uses to maintain the existence of and control over certain data in order to comply with business policies and/or applicable laws and regulations.

20
New cards

What is a bucket?

Refers to a storage resource. These resources have various attributes that affect their capabilities, cost, features, and configurations

Cloud administrators control access to it

21
New cards

Cloud service providers offer many kinds of buckets. Here are a few general characteristics:

Identified by a globally-unique name

Stored at a specified geographic location (usually near the resources consuming storage)

Pricing is based on storage type, capacity, accessibility speed, outbound network data transfers, etc.

Scalable as requirements change

Offers compliance features for data retention, security, accessibility, etc.

22
New cards

Storage buckets

Basically, anything that must store information in cloud environments needs a specified storage location

EX. Static website files, Applications that generate stored data, Log files, such as from load balancers or websites

23
New cards

web application firewalls

A firewall designed specifically to protect software running on web servers and their back-end databases from code injection and DoS attacks.

24
New cards

Virtual private network (VPN)

A secure tunnel created between two endpoints connected via an unsecure transport network (typically the Internet).

25
New cards

To isolate network segments, cloud network administrators can create what?

Virtual LANs (VLANs)

26
New cards

Cloud virtual machines (VMs) utilize one or more what?

Virtual network interface cards (NICs) to communicate with other resources

27
New cards

Virtual network interface cards (NICs)

Adapter card that provides one or more Ethernet ports for connecting hosts to a network so that they can exchange data over a link.

Have Internet Protocol (IP) address assignments, routing capabilities, and more

28
New cards

Hyperconverged virtualization

Tightly-knit combination of CPU, memory, storage, and network subsystems that cannot be managed separately.

29
New cards

Hyperconverged deployments

Use off-the-shelf hardware, making them ideal for private clouds and organizational data centers

30
New cards

Hyperconverged solutions

Are easier to deploy and maintain because the entire structure is managed as a single unit.

This is simpler than specifying individual CPU, Graphics Processing Unit (GPU), memory, storage, and network components

31
New cards

Legal

Investigate legal requirements for your data and cloud resources, especially in the context of privacy

32
New cards

Regulatory

Consider any regulatory requirements that pertain to your industry. Examples include HIPAA, Sarbanes-Oxley, GDPR (European Union), and PCI DSS

33
New cards

Nation-specific

Data sovereignty and regulation vary by nation, so if your company operates internationally, ensure you meet the requirements for each country. Examples include FedRAMP, ITAR, and EAR

34
New cards

Business rules

Larger enterprises often have a set of business rules and mission statements within which they operate, and you must be careful to keep your cloud services within those boundaries

35
New cards

Local data center services

City and county regulations may govern your private cloud data center in terms of pollution, energy efficiency, power consumption, renewable resources, noise, and other areas

36
New cards

Proprietary business information

Your company's internal workings, including data transfers, financial information, business processes, and more must be secured

37
New cards

Intellectual Property

The company's proprietary designs and applications require protection from outside exposure to competitors

38
New cards

Customer availability to resources

Your customers assume they will have access to web, database, support, and other services on demand. Cloud services help ensure this access by using redundancy, scalability, and CDNs to provide data.

39
New cards

Service availability to resources

Microservices and web/database servers often require tight integration that assumes the availability of all components. Tools like server clusters help ensure this access

40
New cards

Capital expenditures (CapEx) versus operating expenses (OpEx)

Cloud services change how IT spending works and is budgeted. Spending might fluctuate based on scaling and service consumption

41
New cards

Optimized services

Optimization greatly impacts budgeting, allowing businesses to use their resources more efficiently

42
New cards

Reporting

Resource metering and auditing provide visibility for consumption and use, allowing organizations to understand how their resources are spent

43
New cards

An organization needs to periodically adjust the resources allocated to their VMs based on changing business requirements and performance data.

According to the document, what is the BEST approach for the sysadmin to manage these adjustments in AWS?

Change the instance type while the instance is powered off to resize memory or vCPU configurations

44
New cards

A cloud administrator is creating instances for databases that data scientists will use to manage big data analytics.

What is the best type of optimization the administrator should consider for these instances?

Memory-optimized

45
New cards

physical machine to virtual machine (P2V)

The practice of converting a physical server to a virtual machine.

46
New cards

virtual machine to virtual machine (V2V)

The practice of converting a virtual machine to another virtual machine, often for the purpose of migrating platforms

47
New cards

virtual machine to physical machine (V2P)

The practice of converting a virtual machine to a physical server

48
New cards

On-Premises-to-Cloud Migration

The process of moving applications, data, and workloads from an on-premises data center to a cloud environment (public, private, or hybrid cloud)

49
New cards

Cloud-to-Cloud Migration

Occur when your organization has decided to consolidate cloud services from several providers into one or when leaving one CSP entirely in favor of another

50
New cards

General steps for Cloud-to-Cloud Migration

  1. Create any necessary Identity and Access Management (IAM) identities and permissions.

  2. Establish a virtual private network (VPN) connection between the other provider and GCP.

  3. Configure network access requirements for AWS.

  4. Create necessary cloud extensions.

  5. Install migration packages for Linux or Windows virtual machines (VMs).

  6. Test the migration.

  7. Migrate in distinct groups, testing after each.

51
New cards

Cloud-to-On-Premises

This type of migration could occur due to changing security or industry regulation concerns or unanticipated costs.

The company may have decided that business processes or expenditures were not benefitting from cloud service

52
New cards

The four phases of the cloud migration process are what?

Assess, plan, implement, and optimize the deployment

53
New cards

Assessment

Understanding what services and applications exist and which are candidates for migration.

54
New cards

Planning

The planning phase of your migration

55
New cards

Implementation

The actual transfer of data, services, and servers to the cloud. The implementation is likely accomplished in phases

56
New cards

Optimization and security

Optimization of services and processes to ensure they are functioning as efficiently, securely, and cost-effectively as possible.

57
New cards

What are the three types of virtualization migrations?

  • Physical machine to virtual machine (P2V)

  • Virtual machine to physical machine (V2P)

  • Virtual machine to virtual machine (V2V)

58
New cards

What are the three types of P2V migrations?

Manual, semi-automatic, automatic

59
New cards

Manual

The administrator creates a virtual machine (VM), installs an operating system (OS) and applications, and copies data

60
New cards

Semi-automatic

A migration tool assists with some aspects of migration, such as hardware specifications and data migration

61
New cards

Automatic

A migration tool manages the entire process

62
New cards

In general, migration tools accomplish these three general steps

  1. The migration tool saves the physical server’s configuration and data as a snapshot.

  2. The VM manager, whether hosted locally or in the cloud, allocates compute, storage, and network resources.

  3. The migration tool loads the snapshot into the new VM

63
New cards

Reasons to migrate VMs between virtualization platforms

  • Test or development work is done on one platform and production occurs on another.

  • Converting the organization’s standard hypervisor from one vendor to another.

  • Testing VMs on different hypervisors.

  • Migrating between CSPs that support different hypervisors

64
New cards

Virtual to Virtual Migrations

The process of moving a virtual machine (VM) from one virtualized environment to another, either within the same cloud/on-premises infrastructure or between different platform

65
New cards

Rehosting ("Lift and Shift"

Moving applications to the cloud without modifications

Fastest and easiest migration.

66
New cards

Replatforming ("Lift, Tinker, and Shift")

Making small optimizations to applications during migration (e.g., switching databases or OS versions) while maintaining the core architecture

67
New cards

Refactoring (Rearchitecting)

Redesigning applications to be cloud-native by leveraging microservices, serverless computing, and scalable cloud features

Requires significant development time and may be quite expensive

68
New cards

Rearchitect

The application will be entirely rearchitected to be cloud-ready

69
New cards

Retaining ("Revisit")

Keeping certain applications on-premises or in a private cloud due to compliance, latency, or security concerns

These applications may be legacy but essential to business processes

70
New cards

Retiring

The Application is retired and not replaced

71
New cards

Repurchase (drop and shop)

The application is retired and replaced by a modern, cloud-ready application

Very common for legacy applications that cannot run in virtualized or cloud-based environments

72
New cards

Hybrid

Mix of any of the other six types

73
New cards

Vendor lock-in

Occurs when the cost (whether time, money, or resources) is too high to switch from the current cloud service provider (CSP) to a different desired provider

74
New cards

data gravity

Refers to the size of stored data causing decisions around applications, services, CSPs, and other concerns to be made with the data as the critical factor

75
New cards

Vendor lock-in concerns:

  • Service quality degrades for support, infrastructure performance, and available tools.

  • A change to available product offerings moves the service away from your core business requirements.

  • The vendor price increases

76
New cards

Data migration variables

Cost, time, available tools, security

77
New cards

Data integrity

Means ensuring data has not changed unexpectedly, such as during a network transfer

78
New cards

Block storage

Typically expensive but fast and efficient. Data is divided into chunks and may be distributed across various storage media

79
New cards

File storage

Simple and not very scalable. It is inexpensive, relies on the computer’s filesystem, and is often used for basic file servers

Services like Network File System (NFS) or Common Internet File System (CIFS) provide network accessibility

80
New cards

Object storage

Very efficient for reading but not for writing tasks and is not suitable for databases. It is very scalable and cost-effective

ex. Saving backup logs in Azure Blob Storage, allowing retrieval through API calls without needing a traditional file system

81
New cards

Networking Considerations: Bandwidth

Ensure plenty of low-latency bandwidth is available

82
New cards

Networking Considerations: Availability

Confirm reliable, 24x7 Internet access. Consider a second Internet service provider (ISP) to eliminate a single point of failure

83
New cards

Networking Considerations: Security

Lots of confidential traffic will move across the network connection between your employees and the cloud. Use strong network encryption to protect this information

84
New cards

Networking Considerations: Virtual private cloud (VPC)

Cloud networking enables restricted communication between virtual networks. For example, your cloud-hosted developer network could be isolated from your cloud-hosted production network

85
New cards

Networking Considerations: Access control

Design an access control mechanism for cloud network administration. Managing network services is a different skill set from system or application administration

86
New cards

Networking Considerations: IP addressing

Design an IP addressing scheme for your cloud network resources to manage and control communications

87
New cards

What best describes how virtual machine instance sizes and types are optimized?

Performance, Cost, Function

88
New cards

A company lost a government contract because they chose a cloud option that did NOT fulfill the requirements for a project.

Which cloud option did the company NOT choose?

Private

89
New cards

A server architect is planning a cloud migration and is defining a given problem that software or services are expected to meet.

Which of the following will best assist the architect in this process?

Solutions requirement

90
New cards

Which of the following is a characteristic of cloud computing defined by the National Institute of Standards and Technology (NIST)?

On-demand self-service

91
New cards

A healthcare startup is developing a new telemedicine application that requires high availability and scalability. The startup has a small IT team and wants to focus on developing the application rather than managing the underlying infrastructure.

Which cloud service model should they choose?

Platform as a Service (PaaS)

92
New cards

A company has tasked a team of engineers with validating a cloud application in a staging environment. This team works together with the development team to ensure the code does what is expected. If an engineer finds any issues, they are sent back to the development team to fix them.

What part of the application lifecycle is this?


Quality assurance

93
New cards

How would engineers reconfigure memory for a server instance using AWS?

Change the instance type

Explore top flashcards