Book Image

Modernizing Legacy Applications to Microsoft Azure

By : Steve Read, Larry Mead
Book Image

Modernizing Legacy Applications to Microsoft Azure

By: Steve Read, Larry Mead

Overview of this book

Organizations have varying circumstances, objectives, and prerequisites when contemplating a hyper-scale cloud solution transformation to a platform such as Azure. Modernizing Legacy Applications to Microsoft Azure uncovers potential scenarios and provides choices, methodologies, techniques, and prospective possibilities for transitioning from legacy applications to the Microsoft Azure environment. You’ll start by understanding the legacy systems and the main concerns regarding migration. Then, you’ll investigate why distributed architectures are compelling and the various components of the Azure platform needed during migration. After that, you’ll explore the approaches to modernizing legacy applications and the Rs of modernizing (i.e., rehost, refactor, rearchitect, and retire). You’ll also learn about integration approaches and potential pitfalls. By the end of this book, you’ll be well equipped to modernize your legacy workloads while being aware of pitfalls and best practices.
Table of Contents (18 chapters)
1
Part 1: Legacy Estate Options
3
Chapter 2: Strategies for Modernizing IBM and Unisys Mainframes
6
Part 2: Architecture Options
10
Part 3: Azure Deployment and Future Considerations

Understanding Azure features for backup and recovery

Earlier in this chapter, we looked at ASR, which is the primary way to keep VMs in sync across regions. It can also be used within a region if needed. In addition to ASR, there is also Azure Backup Service. With Azure Backup Service, you can back up pretty much any storage you are using in Azure to LRS, GRS, or ZRS. You can back up Azure VMs, managed disks, Azure file shares, and Azure Blob Storage. You can also back up your databases. You can even backup storage in your on-premises data center, provided you have the Azure Backup Server (MABS) agent installed. The data is encrypted in transit and at rest, so it is secure.