Book Image

Hybrid Cloud for Developers

By : Manoj Hirway
Book Image

Hybrid Cloud for Developers

By: Manoj Hirway

Overview of this book

This book introduces you to the hybrid cloud platform, and focuses on the AWS public cloud and OpenStack private cloud platforms. It provides a deep dive into the AWS and OpenStack cloud platform services that are essential for developing hybrid cloud applications. You will learn to develop applications on AWS and OpenStack platforms with ease by leveraging various cloud services and taking advantage of PaaS. The book provides you with the ability to leverage the ?exibility of choosing a cloud platform for migrating your existing resources to the cloud, as well as developing hybrid cloud applications that can migrate virtual machine instances from AWS to OpenStack and vice versa. You will also be able to build and test cloud applications without worrying about the system that your development environment supports. The book also provides an in-depth understanding of the best practices that are followed across the industry for developing cloud applications, as well as for adapting the hybrid cloud platform. Lastly, it also sheds light on various troubleshooting techniques for OpenStack and AWS cloud platform services that are consumed by hybrid cloud applications. By the end of this book, you will have a deep understanding of the hybrid cloud platform and will be able to develop robust, efficient, modular, scalable, and ?exible cloud applications.
Table of Contents (16 chapters)
Title Page
Dedication
Packt Upsell
Contributors
Preface
Index

Virtual machine security


Once the virtual machine is launched on the cloud platform, it might be exposed to several stakeholders for access. Usually, customers are provided full access to the virtual machine. Therefore, it is the responsibility of the customer to ensure the security of the virtual machine. 

A public cloud provider such as AWS offers web APIs to manipulate the EC2 instances. These APIs, when orchestrated properly using automation techniques, can provide easy scalability and elasticity for meeting the increased workload in high demand situations. Sufficient network access migration steps must be taken to restrict access to the virtual machines by configuring the firewall rules in the security groups. The virtual machine internal firewall rules should also be configured if required. For example, Linux iptable rules can be leveraged to increase the network access security. Similarly, Windows has a native firewall that can be configured appropriately to ensure that only relevant...