Are You SURE You Are Ready To Move Online?

Cloud Readiness

Over the last three months, we have discussed the reasons why you may have wanted to move to the cloud.  Maybe the decision wasn’t yours to be made in the first place?  Either way, you are now getting ready to start down that road of cloud enlightenment!

The question is, what is the first thing you should be in possession of when starting a cloud project?  The answer may or may not shock you, but it is knowledge.

Why would I say that?  Or maybe, knowledge of what might be the other question.  Having knowledge of what some specific terminologies are will help you get started, or truly understand what is happening.

Being thrust into a new model of operations based on virtual resources can be quite challenging.  The difference between vCPU and a physical CPU in a cloud environment needs to be understood.  Also, you have vRAM and physical RAM, along with its block storage use in a cloud management tool and what is presented at the physical level.

So, what is the number one thing I tell my clients before they get started?  It is a simple question, “Where is your test cloud?”  Not all clouds need to be hosted by third party companies.  You can have a test cloud setup with something as small as a single laptop, or two larger machines depending on the cloud management software and virtualization software that is used.

So you now have a test cloud, error free of course, so what are you going to do with it?  You will be running many different tasks, all based on using the full potential of the cloud management software you have chosen.  Let’s review a few tests that you should perform, so you get a better idea of the cloud and the cloud management software.

  • Create an Instance: This means spinning up a virtual device (server or desktop) and assigning resources to it (vCPU, vRAM, etc.…)
  • Destroying an Instance: This means deleting it from inside your management software and returning the resources it had allocated back to the overall pool.
  • If you have it available, try mounting shared/unshared volumes to an instance and then remove it. You can also try your hand at shared storage so you can create clusters in the cloud.
  • Create a virtual network, and assign subnets to it. Make sure your subnets have proper routing and each one has a default gateway.
  • Create projects/tenants within your software so you can create separation of data and groups based on name AND network.
  • Create users to take advantage or trying out various authentication and authorization modes. Are you going to connect your cloud to Microsoft AD or
  • Once you create a few instances, start monitoring them with software that will tell you its overall performance. You want to see how to refine the build process of the instance is so it will have the horsepower you need it to without having to redo the instances later when they hold data.

This is just getting ready for the cloud.  Again, all engineers MUST understand these principles, and managers SHOULD understand them.  Next month we will talk about what to do with your new knowledge of the cloud!

By Richard Thayer

Gilad David Maayan
What Is SSPM? SaaS Security Posture Management (SSPM) is a set of security tools that an organization’s security team can use to gain visibility and manage security for their Software as a Service (SaaS) applications ...
Dan Teichman
Cloud-Native Communications Historically, Communication Service Providers (CSPs) networks ran on purpose-built hardware. However, in the early 2000s organizations started to update their infrastructure, moving to virtualization. Now, providers are looking to take the next step, ...
JK Chelladurai
Maintain telecom tax compliance The Telecommunications industry is one of the most heavily taxed service industries. In countries such as the United States, providers have to keep on top of Federal, State, and District taxes, ...
Wealth Management Software Solutions - ServiceNow
Financial wealth management services (Updated: 06/29/2022) Many want to live in abundance, but very few people have what it takes to harness true wealth. True wealth is harnessed through the effective management of resources. Despite ...
Metasploit-Penetration-Testing-Software-Pen-Testing-Security
Vulnerability Scanners Cyber security vulnerabilities are a constant nuisance and it certainly doesn't help with the world in a current state of disarray and uncertainty. Vulnerabilities leave businesses and individuals subject to a wide range ...

SECURITY TRAINING

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.