Unit Iv
Unit Iv
Google provides GAE free up to a certain amount of use for the following
resources:
• processor (CPU)
• storage
• application programming interface (API) calls
• concurrent requests
How is GAE used?
GAE is a fully managed, serverless platform that is used to host, build and
deploy web applications. Users can create a GAE account, set up a software
development kit and write application source code. They can then use GAE to
test and deploy the code in the cloud.
Procedure:
3. open SDK and set to path , where you save the app folder that
folder path copy and past sdk cmd…
4. you will get local host address , Then press Browse to open a
browser pointing at your application which is running at
http://localhost:8080/
6. Just for fun, edit the add.py to change the name “a value” to your
own name and press Refresh in the browser to verify your updates.
Application testing is another way to use GAE. Users can route traffic to
different application versions to A/B test them and see which version performs
better under various workloads.
API selection. GAE has several built-in APIs, including the following five:
Support for legacy runtimes. GAE supports legacy runtimes, which are
versions of programming languages no longer maintained. Examples include
Python 2.7, Java 8 and Go 1.11.
Application diagnostics. GAE lets users record data and run diagnostics on
applications to gauge performance.
Security features. GAE enables users to define access policies with the GAE
firewall and managed Secure Sockets Layer/Transport Layer
Security certificates for free.
Benefits of GAE
• Ease of setup and use.
• Pay-per-use pricing.
• Scalability.
• Security.
GAE challenges
• Lack of control. Although a managed infrastructure has advantages, if a
problem occurs in the back-end infrastructure, the user is dependent on
Google to fix it.
• Performance limits. CPU-intensive operations are slow and expensive to
perform using GAE. This is because one physical server may be serving
several separate, unrelated app engine users at once who need to share the
CPU.
• Limited access. Developers have limited, read-only access to the GAE
filesystem.
• Java limits. Java apps cannot create new threads and can only use a subset
of the Java runtime environment standard edition classes.
Examples of Google App Engine
One example of an application created in GAE is an Android messaging app
that stores user log data. The app can store user messages and write event logs
to the Firebase Realtime Database and use it to automatically synchronize data
across devices.
Java servers in the GAE flexible environment connect to Firebase and receive
notifications from it. Together, these components create a back-end streaming
service to collect messaging log data.
Amazon AWS:
o AWS stands for Amazon Web Services.
o The AWS service is provided by the Amazon that uses distributed IT
infrastructure to provide different IT resources available on demand. It
provides different services such as infrastructure as a service (IaaS),
platform as a service (PaaS) and packaged software as a service (SaaS).
o Amazon launched AWS, a cloud computing platform to allow the
different organizations to take advantage of reliable IT infrastructure .
AWS Services:
• Sever - EC2(Elastic cloud computing) Instance
• Storage – Simple service storage(S3)
• Network – Virtual Private cloud(VPC)
• Data Base – Rational database service(RDS)
• Security – Identity access Management(IAM)
• Application
Amazon AMI:
AMI Lifecycle
o First, you need to create and register an AMI.
o You can use an AMI to launch EC2 instances.
o You can also copy an AMI to some different region.
o When AMI is no longer required, then you can also deregister it
Amazon AWS:
Server –EC2(Elastic Cloud Computing )Instance:
• OS Selection – Windows,linux,ubunu,Redhat…..
• Amazon Elastic Compute Cloud (Amazon EC2) instances represent
virtual machines. EC2 instances are launched by created by an Amazon
Machine Image (AMI). An AWS template that describes and defines the
OS and operating environment for one or more EC2 instances of one or
more EC2 instance types.
• Each instance type delivers a mix of CPU, memory, storage and
networking capacity, across one or more size options and should be
carefully matched to your workload's unique demands.
EC2 functions:
Signup
for Create
an Create
a Createa
AWS IAM user virtual
key pair
private
cloud
Createa
Cleanup Connectto Launch on
security
instance instance Instance
group
. When you signup for Amazon Web Services (AWS), your AWS account is
automatically signed up for all services in AWS, including Amazon EC2.
You are charged only for the services that you use.
• With Amazon EC2, you pay only for what you use. If you are a new AWS
customer, you can get started with Amazon EC2 for free.
You can then access AWS using a special URL and the credentials for the
IAM user. If you signed up for AWS but have not created an IAM user for
yourself, you can create one using the IAM console.
AWS uses public-key cryptography to secure the login information for your
instance. A Linux instance has no password; you use a key pair to log in to
your instance securely. You specify the name of the key pair when you
launch your instance, then provide the private key when you log in using
SSH.
Amazon VPC enables you to launch AWS resources into a virtual network
that you've defined, known as a Virtual Private Cloud (VPC). The newer
EC2 instance types require that you launch your instances in a VPC. If you
have a default VPC, you can skip this section and move to the next task,
create a security group. To determine whether you have a default VPC, open
the Amazon EC2 console and look for default VPC under account attributes
on the dashboard.
EC2 Creation:
i)OS Selection (AMI)-windows ,amazon Linux, Ubuntu ….
o Choose an Instance Type, and then click on the Next. Suppose I choose a
t2.micro as an instance type.
Shutdown behavior: It defines the behavior of the instance type. You can
either stop or terminate the instance when you shut down the Linux machine.
Now, I leave it as Stop.
User data: In Advanced details, you can pass the bootstrap scripts to EC2
instance. You can tell them to download PHP, Apache, install the Apache, etc.
Volume Type: We select the Magnetic (standard) as it is the only disk which
is bootable.
Delete on termination: It is checked means that the termination of an EC2
instance will also delete EBS volume.
we observe that we add two tags, i.e., the name of the server and department.
Create as many tags as you can as it reduces the overall cost.
o Review an EC2 instance that you have just configured, and then click on
the Launch button.
vii)Key pair generation – privacy enhanced mail, encrypted private key
o Create a new key pair and enter the name of the key pair. Download the
Key pair.
viii)Launch Instance :
o If you upload a file to S3 bucket, then you will receive an HTTP 200 code
means that the uploading of a file is successful.
o Objects
o Objects are the entities which are stored in an S3 bucket.
o An object consists of object data and metadata where metadata is a
set of name-value pair that describes the data.
o An object consists of some default metadata such as date last
modified, and standard HTTP metadata, such as Content type.
Custom metadata can also be specified at the time of storing an
object.
o It is uniquely identified within a bucket by key and version ID.
. EBS volumes are highly available and reliable storage volumes that can be
EBS volumes are particularly well-suited for use as the primary storage for
file systems, databases, or for any applications that require fine granular
updates and access to raw, unformatted, block-level storage.
The size of an EBS volume can be configured by the user and can range
from 1 GB to 1 TB.
Microsoft Azure:
Microsoft Azure is a growing set of cloud computing services created by
Microsoft that hosts your existing applications, streamline the development of a
new application, and also enhances our on-premises applications. It helps the
organizations in building, testing, deploying, and managing applications and
services through Microsoft-managed data centers.
Azure Services
o Compute services: It includes the Microsoft Azure Cloud Services,
Azure Virtual Machines, Azure Website, and Azure Mobile Services,
which processes the data on the cloud with the help of powerful
processors.
o Data services: This service is used to store data over the cloud that can
be scaled according to the requirements. It includes Microsoft Azure
Storage (Blob, Queue Table, and Azure File services), Azure SQL
Database, and the Redis Cache.
o Application services: It includes services, which help us to build and
operate our application, like the Azure Active Directory, Service Bus for
connecting distributed systems, HDInsight for processing big data, the
Azure Scheduler, and the Azure Media Services.
o Network services: It helps you to connect with the cloud and on-
premises infrastructure, which includes Virtual Networks, Azure Content
Delivery Network, and the Azure Traffic Manager.
When a request is made by the user either using PowerShell or Azure portal.
First, it will go to the Orchestrator, where it will fundamentally do three things:
Azure covers more global regions than any other cloud provider, which offers
the scalability needed to bring applications and users closer around the world. It
is globally available in 50 regions around the world. Due to its availability over
many regions, it helps in preserving data residency and offers comprehensive
compliance and flexible options to the customers.
Azure Certification
Microsoft Azure helps to fill the gap between the industry requirement and the
resource available. Microsoft provides Azure Certification into three major
categories, which are:
Eucalyptus
Eucalyptus CLIs can handle Amazon Web Services and their own private
instances. Clients have the independence to transfer cases from Eucalyptus to
Amazon Elastic Cloud. The virtualization layer oversees the Network, storage,
and Computing. Occurrences are isolated by hardware virtualization.
Important Features are:-
1. Images: A good example is the Eucalyptus Machine Image which is a
module software bundled and uploaded to the Cloud.
2. Instances: When we run the picture and utilize it, it turns into an instance.
3. Networking: It can be further subdivided into three modes: Static
mode(allocates IP address to instances), System mode (assigns a MAC
address and imputes the instance’s network interface to the physical
network via NC), and Managed mode (achieves local network of
instances).
4. Access Control: It is utilized to give limitations to clients.
5. Elastic Block Storage: It gives block-level storage volumes to connect to
an instance.
6. Auto-scaling and Load Adjusting: It is utilized to make or obliterate
cases or administrations dependent on necessities.
Components of Architecture
1. Eucalyptus can be utilized to benefit both the eucalyptus private cloud and
the eucalyptus public cloud.
2. Examples of Amazon or Eucalyptus machine pictures can be run on both
clouds.
3. Its API is completely similar to all the Amazon Web Services.
4. Eucalyptus can be utilized with DevOps apparatuses like Chef and Puppet.
OpenStack
OpenStack is a cloud OS that is used to control the large pools of computing,
storage, and networking resources within a data center. OpenStack is an open-
source and free software platform. This is essentially used and implemented as
an IaaS for cloud computing.
We can call the OpenStack a software platform that uses pooled virtual
resources to create and manage private and public cloud. OpenStack offers
many cloud-related services (such as networking, storage, image services,
identity, etc.) by default. This can be handled by users through a web-based
dashboard, a RESTful API, or command-line tools. OpenStack manages a lot of
virtual machines; this permits the usage of physical resources to be reduced.
Open Source: Under the Apache 2.0 license, OpenStack is coded and
published. Apache allows the community to use it for free.
Open Design: For the forthcoming update, the development group holds a
Design Summit every 6 months.
Components of OpenStack
Block Storage (Cinder): This works in the traditional way of attaching and
detaching an external hard drive to the OS for its local use. Cinder manages to
add, remove, create new disk space in the server.
Dashboard (Horizon): This is the first component that the user sees in the
OpenStack. Horizon is the web UI (user interface) component used to access the
other back-end services. Through individual API (Application programming
interface), developers can access the OpenStack's components, but through the
dashboard, system administrators can look at what is going on in the cloud and
manage it as per their need.
Identity Service (Keystone): It is the central repository of all the users and
their permissions for the OpenStack services they use. This component is used
to manage identity services like authorization, authentication, AWS Styles
(Amazon Web Services) logins, token-based systems, and checking the other
credentials (username & password).
Image Service (Glance): The glance component is used to provide the image
services to OpenStack. Here, image service means the images or virtual copies
of hard disks.