Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cloud Application Architectures
Preface
Audience for This Book
Organization of the Material
Conventions Used in This Book
Using Code Examples
Safari® Books Online
We’d Like Your Feedback!
Acknowledgments
1. Cloud Computing
The Cloud
Software
Hardware
The advantages of a cloud infrastructure
Hardware virtualization
Cloud storage
Cloud Application Architectures
Grid Computing
Transactional Computing
The Value of Cloud Computing
Options for an IT Infrastructure
The Economics
Capital costs
Cost comparison
The bottom line
Cloud Infrastructure Models
Platform As a Service Vendor
Infrastructure As a Service
Private Clouds
All of the Above
An Overview of Amazon Web Services
Amazon Elastic Cloud Compute (EC2)
Amazon Simple Storage Service (S3)
Amazon Simple Queue Service (SQS)
Amazon CloudFront
Amazon SimpleDB
2. Amazon Cloud Computing
Amazon S3
Access to S3
Web Services
BitTorrent
S3 in Action
Amazon EC2
EC2 Concepts
EC2 Access
Instance Setup
Access to an Instance
Security Groups
Availability Zones
Static IP Addresses
Data Storage in EC2
EBS volume setup
Volume management
Snapshots
AMI Management
3. Before the Move into the Cloud
Know Your Software Licenses
The Shift to a Cloud Cost Model
How to Approach Cost Comparisons
A Sample Cloud ROI Analysis
Where the Cloud Saves Money
Service Levels for Cloud Applications
Availability
How to estimate the availability of your system
What constitutes availability?
Cloud service availability
Amazon Web Services service levels
Expected availability in the cloud
Reliability
Performance
Clustering versus independent nodes
EC2 performance constraints
Security
Legal, Regulatory, and Standards Implications
There Is No Perimeter in the Cloud
The Risk Profile for S3 and Other Cloud Storage Solutions Is Unproven
Disaster Recovery
4. Ready for the Cloud
Web Application Design
System State and Protecting Transactions
The problem with memory locks
Transactional integrity through stored procedures
Two alternatives to stored procedures
When Servers Fail
Machine Image Design
Amazon Machine Image Data Security
What Belongs in a Machine Image?
A Sample MySQL Machine Image
Amazon AMI Philosophies
Privacy Design
Privacy in the Cloud
Managing the credit card encryption
Processing a credit card transaction
If the e-commerce application is compromised
If the credit card processor is compromised
When the Amazon Cloud Fails to Meet Your Needs
Database Management
Clustering or Replication?
Using database clustering in the cloud
Using database replication in the cloud
Replication for performance
Primary Key Management
How to generate globally unique primary keys
Support for globally unique random keys
Database Backups
Types of database backups
Applying a backup strategy for the cloud
5. Security
Data Security
Data Control
When the cloud provider goes down
When a subpoena compels your cloud provider to turn over your data
When your cloud provider fails to adequately protect their network
Encrypt Everything
Encrypt your network traffic
Encrypt your backups
Encrypt your filesystems
Regulatory and Standards Compliance
Network Security
Firewall Rules
Network Intrusion Detection
The purpose of a network intrusion detection system
Implementing network intrusion detection in the cloud
Host Security
System Hardening
Antivirus Protection
Host Intrusion Detection
Data Segmentation
Credential Management
Compromise Response
6. Disaster Recovery
Disaster Recovery Planning
The Recovery Point Objective
The Recovery Time Objective
Disasters in the Cloud
Backup Management
Fixed data strategy
Configuration data strategy
Persistent data strategy (aka database backups)
Backup security
Geographic Redundancy
Spanning availability zones
Operating across regions
Organizational Redundancy
Disaster Management
Monitoring
Load Balancer Recovery
Application Server Recovery
Database Recovery
7. Scaling a Cloud Infrastructure
Capacity Planning
Expected Demand
Determining your expected demand
Analyzing the unexpected
The Impact of Load
Application architecture and database architecture revisited
Points of scale
The Value of Your Capacity
A simple thought experiment
How might the outcome have been different?
Cloud Scale
Tools and Monitoring Systems
The procurement process in the cloud
Managing proactive scaling
Managing reactive scaling
A recommended approach
Scaling Vertically
A. Amazon Web Services Reference
Amazon EC2 Command-Line Reference
ec2-add-group
ec2-add-keypair
ec2-allocate-address
ec2-associate-address
ec2-attach-volume
ec2-authorize
ec2-bundle-instance
ec2-cancel-bundle-task
ec2-confirm-product-instance
ec2-create-snapshot
ec2-create-volume
ec2-delete-group
ec2-delete-keypair
ec2-delete-snapshot
ec2-delete-volume
ec2-deregister
ec2-describe-addresses
ec2-describe-availability-zones
ec2-describe-bundle-tasks
ec2-describe-group
ec2-describe-image-attribute
ec2-describe-images
ec2-describe-instances
ec2-describe-keypairs
ec2-describe-regions
ec2-describe-snapshots
ec2-describe-volumes
ec2-detach-volume
ec2-disassociate-address
ec2-get-console-output
ec2-get-password
ec2-modify-image-attribute
ec2-reboot-instances
ec2-release-address
ec2-register
ec2-reset-image-attribute
ec2-revoke
ec2-run-instances
ec2-terminate-instances
Amazon EC2 Tips
Filesystem Encryption
Setting Up RAID for Multiple EBS Volumes
B. GoGrid
Types of Clouds
Cloudcenters in Detail
Data Centers in the Clouds
GoGrid Versus Traditional Data Centers
Horizontal and vertical scaling
GoGrid deployment architectures
Focus on Web Applications
Comparing Approaches
Side-by-Side Comparison
Real-Life Usage
What’s Right for You?
C. Rackspace
Rackspace’s Cloud Services
Cloud Servers
Cloud Files
Cloud Sites
Fully Integrated, Backed by Fanatical Support
Index
About the Author
Colophon
← Prev
Back
Next →
← Prev
Back
Next →