Book Image

Achieving Digital Transformation Using Hybrid Cloud

By : Vikas Grover, Ishu Verma, Praveen Rajagopalan
Book Image

Achieving Digital Transformation Using Hybrid Cloud

By: Vikas Grover, Ishu Verma, Praveen Rajagopalan

Overview of this book

Hybrid cloud technology can be leveraged by organizations aiming to build next-gen applications while safeguarding prior technological investments. This book will help you explore different hybrid cloud architectural patterns, whether designing new projects or migrating legacy applications to the cloud. You'll learn about the key building blocks of hybrid cloud enabling you to deploy, manage, and secure applications and data while porting the workloads between environments without rebuilding. Further, you’ll explore Kubernetes, GitOps, and Layer 3/7 services to reduce operational complexity. You'll also learn about nuances of security and compliance in hybrid cloud followed by the economics of hybrid cloud. You’ll gain a deep understanding of the concepts with use cases from telecom 5G and industrial manufacturing, giving you a glimpse into real industry problems resolved by hybrid cloud, and unlocking millions of dollars of opportunities for enterprises. By the end of this book, you'll be well-equipped to design and develop efficient hybrid cloud strategies, lead conversations with senior IT and business executives, and succeed in hybrid cloud implementation or transformation opportunities.
Table of Contents (12 chapters)
1
Part 1: Containers, Kubernetes, and DevOps for Hybrid Cloud
6
Part 2: Design Patterns, DevOps, and GitOps

Summary

All layers in our application stack have data associated with them that necessitates a consideration of security. Responsibility for security lies with the enterprise or the cloud provider in differing proportions depending on the infrastructure footprint. Any architecture can be approved only after a detailed end-to-end security analysis.

Throughout this chapter, we focused on the different components of hybrid cloud across the entire application stack to understand the security implications of each layer from an architecture standpoint. To further understand the security aspects objectively, we looked at an example of an application that used a hybrid cloud architecture. This is just one of many architecture patterns that exist for hybrid cloud, but the fundamentals remain the same across other patterns.

The principles of security discussed weren’t something new, but are important for enterprises to acknowledge the danger associated with architectures that do...