Virtual Machine ManagementSunday, March 18, 2018
Managing VMs in the Cloud is usually manual, intrusive and time consuming. It would include patching and maintaining the existing VM estate; procuring and deployment new VMs, assessing costs; and workloads. A goal with many firms with large VM estates is proper VM management through automation. This includes VM approval workflow, and automated provisioning systems, change control and ensuring that the security model is implemented. The following are some key considerations in automating VM management.
VM CONFIGURATION MANAGEMENT – 5 key conceptsSunday, March 18, 2018
An automated VM-cloud management system populates the configuration management database, with the server and compute resource detail of the VMS; as part of an automated provisioning process. This is called the ‘CMDB’ or configuration management database. The CMDB may reside within the ITSM platform, or more commonly, within the Cloud accounts on a server. The CMDB should be backed up and the information sent to another cloud platform for Disaster Recovery.
Phases and Categories of TOGAF and building robust ArchitecturesMonday, February 26, 2018
Architectures are iterative creations. They are not sequential, waterfall processes. This obviously means that iterative methodologies such as Agile-Scrum are necessary for projects to succeed. This does not mean, a dearth of documentation or proper planning. Quite the opposite. It does mean however, a limitation to creating relevant and impactful documentation, in which IS supports the Business Strategies and Objectives. The goal is to build a functioning IS Architecture. Not produce endless and quite useless artefacts. An open-standards approach to building aligned IS systems, through an iterative methodology is TOGAF (The Open Group Architectural Framework).
TOGAF and the Architecture ‘Continuum’Wednesday, February 21, 2018
The Open Group has a detailed set of frameworks and approaches for IT architecture (http://pubs.opengroup.org). These frameworks are for IT systems architecture design, development and deployment. They are not specific to Cloud Architectures, but can be used when building a de-novo Cloud solution, or migrating to a Cloud Platform and reforming your business and IT architectures. AWS’ CAF (Cloud Architecture Framework), is based on TOGAF for example.
Cloud Security Best Practices – an implementation frameworkTuesday, February 20, 2018
You cannot deploy into the cloud unless the security model is a part of the original design. Using Agile and other mature approaches to deployment, the security details might well change as the project moves from conceptual phases, into proof of concepts and pre-production environments. Nevertheless, security must be a key principle around which the platform is created and implemented. All layers from network to application data security management, must be identified and understood, even if they are deemed not applicable for the project under consideration.