Archives for Cloud Computing - Page 23
Security Layers provided by Azure–from Outermost to Inner
Internet (Outermost) DDOS --> Public IP –> Virtual Network Isolation NSG and UDR --> Network Virtual Appliances --> Azure Deployments (VMs) –> Innermost
Google Cloud , Data Warehouse, Data Lakes
Data Lakes versus Data Warehouses Data Lakes typically encompass non relational data (document type, key-value type, graph data) as well. GCP BigData Ecosystem The GCP bigdata ecosystem consists of BigQuery…
Google Cloud VPN – Use Cases
Extending your Private IP Space to GCP Cloud VPN supports site-to-site VPN. You can have multiple tunnels to a single VPN gateway. In other words, you can connect multiple on-premises…
AWS Lambda Quick REcap
To be able to invoke Lambda via HTTP, need to setup a URL in API Gateway. The URL can then be invoked logging module to write message to the logs,…
Hypervisors–vSphere vs. HyperV
A hypervisor is computer software, firmware, or hardware that creates and runs virtual machines. ... Two of the most common choices for hypervisors include vSphere, a VMware product, and Hyper-V,…
Google Bucket Storage –Lifecycle Questions
Approximate Size of data being archived? How often do they need to retrieve this data? Do they need access to individual objects or just entire buckets? How are they currently…
Access Management Azure AD
Each Azure subscription is associated with one Azure Active Directory (AD) directory. Users, groups, and applications from that directory can manage resources in the Azure subscription. A role assigned…
Launching EC2 , typical steps in AWS
Pick an AMI. Create an App if you don’t already have one. Create a new policy - for each new app. Add any Tags – Good practice to have userId…
s3 and Cloudberry
Explorer is the free product. Drive is the server paid product. To make your life easier working with S3 based backups, it would be good to map a local drive…
aws tagging strategies
Tagging Categories Companies that are most effective in their use of tags typically create business-relevant tag groupings to organize their resources along technical, business, and security dimensions. Companies that use…