Unit 2 CSM
Unit 2 CSM
Management Fundaont
Contents
Cloud Strategy Fundamentals
21
(2-1)
Cloud Services
Ongong Assess
management
Learn
and adapf
Ecetna
Measure
performance
Strategic
Implementation management
performance
Alignment system SWOT
knowledge
TECHNICAL PUBLICATIONS®-an up-thrust for
Coud Services Management 2-5 Cloud Services Strategy
. The goal of cloud cost optimization is to gain better visibility into cloud environment
to ensure that resources are utilized effectively, balancing cost with performance,
security and availability.
Optimizing the cloud can reduce cloud costs, boost engineers' productivity and enable
companies to move more operations from their data centers to the cloud.
.If business operates in a multi-cloud or hybrid cloud environment and third party
software solutions are available from multiple vendors, then cost optimization cloud
policies are applied.
Cloud policy for performance management
. It enables user to specify performance thresholds for virtual machines and storage
volumes. So user can monitor asset utilization whether it is underutilize or over
utilize.
The application of cloud policies for performance management will affect the policies
put in place for financial management and cost optimization.
4, Network security cloud policies
" Maintaining a secure perimeter to allow only legitimate traffie onto network is critical
in the cloud and the leading cloud service providers acknowledge this by
supplying
tools to determine which users or group identities should have access to hosted
services and applications.
. Amazon and Microsoft both call their tools "Security
Groups", Google offers the
"Identity-Aware Service"
for knowiledge
TECHNICAL PUBLICATIONS-an up-thrust
Ctoud ServIces Managemet 2-7 Cloud Services Strategy
strategy is as follows :
Subsequently, the process for creating a cloud risk manayement
present within the cloud environment,
" Pisk identification : Determining all the risks surface.
extent of their risk profile and attack
allowing companies to determine the full of its
scope of each risk, í.e., the likelihood
L Risk assessment Analyzing the
security teans can evaluate the risk
pccurrence and potential severity. After analysis,
as low, "moderate", and high."
and assignits mitigation a priority - such
policies and controls to mitigate risk
Risk mitigation : Implementing the appropriate
ie., potential for the highest
factors, starting with those with the highest priority,
negative impact.
the effectiveness of the implemented
) Continuous monitoring and review : Tracking must constantly review
security teams
risk mitigation measures. Additionally,
seek out new risk factors as
previously identified risks to re-evaiuate their priority and
environment.
they add newapplications, users, etc. to the
security risks include :
. Common cloud
hijacking, weak
a) Unauthorised access : Credential theft (c.g., phishing), account
access controls, over-privileged account permissions.
sensitive data.
b) Data breaches : Loss, theft, disclosure, etc., of
ransomware,
c) Malware : The infection of your cloud environment with viruses,
Trojans, rootkits, etc.
d) Misconfiguration : Open ports, inadvertent internet-facing assets, insecure network
configurations.
e) Application and system vulnerabilities : Unpatched software, lack of updates to
firmware and hardware.
4. Develop new guidelines for cloud capacity planning based on data-driven suggestions,
such as size, underutilized or overprovisioned capacity, etc.
IT capacityplanning is part of the capacity management process. The IT capacity planning
process provides insight into business needs, existing capacity, gaps and financial strain.
and offes an impact assessment.
1 Estimate storage, hardware, software and infrastructure requirements : Assess
and forccast future requirements to ensure that you purchase just enough resources to
meet needs.
2. Evaluate existing capacity : Take an in-depth look at your current production
schedule to analyze the performance of resources, usage, utilization and workload.
3. Identify gaps : Perform an analysis that defines how capacity should Jook compared
to current capacity. This helps you illustrate the gap in capacity.
It
planning ams to match domand uith available reOurces. analyzes what
" Chood capiacity measuring their performance and predicting demand
systems are alrcady in place. allocate civud reurces based on that demand
Organizatinn can then rovision and
capscity-dennand management francwork.
. Fig. 2.71 shows fldertily usage patterms
bott shor term and
orgterm
Dnsnd managenent
Workload management
Translate customer
demands into
workloads put upon
critical components
Capacitymanagenent
framework
Fig. 2.7.4 Capacity-demand management
:
as providers performtwo complementary management tasks
obligations are met as contracted with the
1. CapCN pianing to make sure that SLA
Service pnders and
workload to make the
CaatiEs optimization of resource utilization given specific
effciet use of the existing capacity.
cost efficient
The frst sk pertains to the long-term capacity management aimed at elastic
end users,
provsioing in scoordance with contracted SLAs. To protect SLAS with
sersices scale up and down dynamically.
services
The IaaS provider shouid plan capacity of the cloud in such a way that when
change re deands in response to environment conditions, the resources will
indeed pnoided with the contracted probability. At the same time, the laaS cloud provide
strives e minineliy Dser-provision capacity, thus minimizing the operational costs.
The second task pertains o short- and medium-term optimization of resource allocati
under the current workkoas, This optimization may be guided by different manageme
policies that support high-ievel business goals of an laaS provider.
2 el Balking
Reneging Jockeyng
Fig. 2.8.1 Queuing system
" Queuing system may be finite capacity queuing
systems.
systems or infinite capacity queung
" Requests are generated at input source corresponding to uscrs
servers, the rate of arrival of request at the service whch s i serce fnm the
svstem IS deternet by the arIsa
process. Various rules are followed for the selection of
queue discipline or order. requests frm the queue AneWn as
" Service is rendered at a rate decided by the
service process De
requests and timing constraints, requests may balk. renege oe may npatient behav iNr ef
ea to jNcAey ing.
Balking is a prOcess in which requests do not enter the
quuc because of large wating e
expected. Request packets are dropped due to kot of trat n the
and requests gets shifted from one queue to queue kading to reneging
another rer t get quich ser ke in case ot
jockey ing,
TECHNICAL PUBL CATNNSan -theust tv kowiete
Cd Services Sratn
Dennand qucueng in cloud empiting refers to the pcess of aanagingrequests from use
1Or appications for cud resures uhen those reurces are currently unavailable
msuffcieni o immoiatety fulfill those requests.
" Working of demand queeing in cloud computing :
a) Resoaree ava}ability monitoring: Cloud providers continuously monitor th
availabilty and utilizatiom of their resources, sach as Virtual Machines (VMs). storag
and netwking compnents.
h) Regest qoreing : Wen a user or application requests resources that are currentl
uNENai}abic in short supply. the request is placed into a queue. This queue may be
nanAged the cloud provider's infrastructure or implemented as part of the
catir's kogic.
rierity nansgement : Requests in the queue may have different priorities based on
Edrs sact as service level agreements (SLAS), subscription tiers or predefined rules
igher priority requests are typically processed ahead of lower priority ones.
d Reosroe alocation : As resources become available, the cloud provider allocates
those resciCÉS to the requests in the queue based on their priorities.
Queve mcnitoring and optimization : Cloud providers often employ sophisticated
alporithms to aptimize the queue management process. This may involve dynamically
adasting prioritics, preemptively provisioning resources based on predicted demand.
ealkocating resources from low-priority tasks to high-priority ones.
AFeedhack echanisms : Cloud providers may provide feedback to users or
anpications regarding the status of their equests in the queue, estimated wait times, or
ggestions for optimizing resource utilization.
Monitor tdentify
Closure
Change
management
process
Implement
Approve
Cloud services
Benefits
Activities
Function Machine
Service consumption
Service security
Self service
Service support
Service function
Service economics