Category: The discovery phase

Using API policies – Comparing Application Components

Azure API Management policies allow you to change how your APIs function and behave. Typical examples include rate-limiting responses, converting one format to another, such as XML to JSON, or even modifying the contents of the data returned. Azure API Management offers a range of built-in policies, or you can create custom ones. The following …

Using API policies – Comparing Application ComponentsRead More

Managing APIs with Azure API Gateway – Comparing Application Components

When building cloud solutions and web applications, it is common to use APIs – specific types of apps that only return data in JSON or XML. This data is then used by a consuming application, a desktop application, a mobile application, or even a website. APIs can be used internally or to expose your data …

Managing APIs with Azure API Gateway – Comparing Application ComponentsRead More

Using deployment slots – Comparing Application Components

A powerful feature of app services in Azure is deployment slots. When publishing updates to app services, you need to be confident that your latest changes do not break the existing running application. Although you should always test changes in lower environments such as a development or test environment first, a final production deployment can …

Using deployment slots – Comparing Application ComponentsRead More

Working with web applications – Comparing Application Components

In the previous chapter, we concluded Section 3, Infrastructure and Storage Components, by looking at how to migrate existing on-premises workloads into Azure and what different options were available from an architectural and strategic perspective. With this chapter, we begin Section 4, Applications and Databases, by looking at the different options and architectural patterns for …

Working with web applications – Comparing Application ComponentsRead More

Monitoring and optimizing your migration – Migrating Workloads to Azure

Azure has several opportunities for enhancing performance and security that you may not have used with your on-premises systems. It is also possible that your existing servers were underutilized or even overutilized, which can impact costs. Therefore, once migrated, you should monitor your workloads for performance trends, security enhancements, or cost optimizations. To support these …

Monitoring and optimizing your migration – Migrating Workloads to AzureRead More

Migrating virtual machines and databases – Migrating Workloads to Azure

Depending on how you plan to migrate into Azure, determine your next steps and what tools are required. Refactorization, re-architecting, rebuilding, and replacing are manual processes and will need to be managed as individual projects. There are several tools available for VM migrations, and again, the Azure Migrate tool can perform this task for you. …

Migrating virtual machines and databases – Migrating Workloads to AzureRead More

The discovery phase – Migrating Workloads to Azure

Very few applications run in isolation on a single server. The majority will be split across multiple servers; for example, web applications may consist of a web server frontend and a backend database. To further complicate matters, some systems may share resources – multiple applications may share the same backend databases, and web servers may …

The discovery phase – Migrating Workloads to AzureRead More

Encryption – Exploring Storage Solutions

All storage accounts in Azure are encrypted by Storage Service Encryption (SSE) using a 256-bit Advanced Encryption Standard (AES) cipher. This makes Azure storage FIPS 140-2 compliant. Important note FIPS 140-2 is a US government security standard for the approval of cryptographic processes. By default, the keys used to encrypt the storage are managed by …

Encryption – Exploring Storage SolutionsRead More

Authorization – Exploring Storage Solutions

The next layer of protection ensures the person or application trying to access the data is authorized to. There are several different mechanisms in which to achieve this. RBAC Using RBAC, we can ensure a user or other type of identity (such as a managed identity or service principal) is authorized to perform a task …

Authorization – Exploring Storage SolutionsRead More

VM disks – Exploring Storage Solutions

Windows and Linux servers must have at least one hard disk drive to store the operating system on and, sometimes, you might also need separate data disks. When virtualization was introduced, those disks also become virtual but were stored on physical drives as disk image files used by the Hypervisor. In the case of Windows …

VM disks – Exploring Storage SolutionsRead More



          Copyright © 2015-2024 | About | Terms of Service | Privacy Policy