A hands-on guide to mastering Azure cloud design patterns and best practices.
- Master architectural design patterns in Azure.
- Get hands-on with implementing design patterns.
- Implement best practices for improving efficiency and security
A well designed cloud infrastructure covers factors such as consistency, maintenance, simplified administration and development, and reusability. Hence it is important to choose the right architectural pattern as it has a huge impact on the quality of cloud-hosted services. This book covers all Azure design patterns and functionalities to help you build your cloud infrastructure so it fits your system requirements.
This book initially covers design patterns that are focused on factors such as availability and data management/monitoring. Then the focus shifts to complex design patterns such as multitasking, improving scalability, valet keys, and so on, with practical use cases. The book also supplies best practices to improve the security and performance of your cloud.
By the end of this book, you will thoroughly be familiar with the different design and architectural patterns available with Windows Azure and capable of choosing the best pattern for your system.
What you will learn
- Learn to organize Azure access
- Design the core areas of the Azure Execution Model
- Work with storage and data management
- Create a health endpoint monitoring pattern
- Automate early detection of anomalies
- Identify and secure Azure features
Who This Book Is For
This book is targeted at cloud architects and cloud solution providers who are looking for an extensive guide to implementing different patterns for the deployment and maintenance of services in Microsoft Azure. Prior experience with Azure is required as the book is completely focused on design patterns.
Table of Contents
Chapter 1 An Introduction toMicrosoft Azure
Chapter 2 Compute Design & Management
Chapter 3 Data Storage and Processing
Chapter 4 Networking Design & Management
Chapter 5 Availability
Chapter 6 Performance & Scalability
Chapter 7 Monitoring & Telemetry
Chapter 8 Resieliency
Chapter 9 Identity & Security