Optimizing Microsoft Azure Workloads Leverage the Well-Architected Framework to Boost Performance, Scalability, and Cost Efficiency

Master Azure Well-Architected Framework and improve your optimization skills by enhancing the quality of your workloads Purchase of the print or Kindle book includes a free PDF eBook Key Features Learn Well-Architected Framework from a cloud solution architect and an official Microsoft trainer Optim...

Descripción completa

Detalles Bibliográficos
Otros Autores: Skaria, Rithin, author (author), Singh, Jatinder Pal, writer of foreword (writer of foreword)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Birmingham, England : Packt Publishing Ltd [2023]
Edición:First edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009759340306719
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright and Credits
  • Foreword
  • Contributors
  • Table of Contents
  • Preface
  • Part 1: Well-Architected Framework Fundamentals
  • Chapter 1: Planning Workloads with the Well-Architected Framework
  • Why the WAF?
  • What are the pillars of the WAF?
  • Cost optimization
  • Operational excellence
  • Performance efficiency
  • Reliability
  • Security
  • Exploring the elements of the WAF
  • Azure Well-Architected Review
  • Azure Advisor
  • Documentation
  • Partners, support, and service offers
  • Reference architecture
  • Design principles
  • Summary
  • Further reading
  • Chapter 2: Distinguishing between the Cloud Adoption Framework and Well-Architected Framework
  • Introducing the CAF
  • Purpose of the CAF
  • The life cycle of the CAF
  • The intended audience of the CAF
  • Exploring CAF methodologies
  • Defining strategy
  • Creating a cloud adoption plan
  • Preparing for cloud adoption
  • Adopting the cloud
  • Implementing governance
  • Managing the cloud
  • Securing the cloud
  • Organizational alignment
  • Comparing the CAF and WAF
  • Summary
  • Part 2: Exploring the Well-Architected Framework Pillars and Their Principles
  • Chapter 3: Implementing Cost Optimization
  • Introducing cost optimization
  • Tools for optimizing cost
  • Understanding the cost optimization design principles
  • Choosing the right resources
  • Setting a budget and cost constraints
  • Allocating resources dynamically
  • Aiming for scalable costs
  • Continuous monitoring and optimization
  • Cost design checklist
  • Cost monitoring checklist
  • Cost optimization checklist
  • Tradeoff for cost
  • Summary
  • Chapter 4: Achieving Operational Excellence
  • Introducing operational excellence
  • Design principles
  • Optimize the build and release process
  • Comprehending operational health
  • Business continuity and disaster recovery.
  • Accept continuous operations enhancements
  • Use loosely coupled architecture
  • Automating deployments
  • Goals of automation
  • Best practices for automation
  • Types of automation
  • Release engineering
  • Application development
  • Continuous integration
  • Testing
  • Performance considerations
  • Deployment and rollback
  • Monitoring
  • Summary
  • Chapter 5: Improving Applications with Performance Efficiency
  • Principles of performance efficiency
  • Principles for scaling
  • Performance testing
  • Performance monitoring
  • Design for performance efficiency checklist
  • Application design
  • Data management
  • Implementation principles
  • Testing for performance efficiency checklist
  • Performance testing
  • Testing tools
  • Monitoring
  • Azure Monitor
  • Summary
  • Chapter 6: Building Reliable Applications
  • Introducing the reliability pillar
  • Reliability principles
  • Designing for reliability
  • Design requirements
  • Application design
  • Resiliency and dependencies
  • Reliability testing
  • Monitoring
  • Summary
  • Chapter 7: Leveraging the Security Pillar
  • Designing secure solutions
  • Key areas and security resources
  • Understanding the security pillar principles
  • Design areas
  • Governance
  • Identity and access management
  • Network security
  • Data protection
  • Applications and services
  • Monitoring
  • Summary
  • Part 3: Assessment and Recommendations
  • Chapter 8: Assessment and Remediation
  • Introducing the assessment tool
  • Introducing the reference workload
  • Architecture
  • Workflow
  • Cost optimization assessment and remediation
  • Questionnaire
  • Reference workload
  • Operational excellence assessment and remediation
  • Questionnaire
  • Reference workload
  • Performance efficiency assessment and remediation
  • Questionnaire
  • Reference workload
  • Reliability assessment and remediation
  • Questionnaire.
  • Reference workload
  • Security assessment and remediation
  • Questionnaire
  • Reference architecture
  • Summary
  • Index
  • Other Books You May Enjoy.