eBooks

OreillyMultiCloudFinalEBOOK

Learn all you need to know about email best practices, deliverability, and tools with email whitepapers and ebooks.

Issue link: https://hub.dyn.com/i/1119883

Contents of this Issue

Navigation

Page 14 of 57

Trade-Offs Although the benefits of multicloud architecture are myriad and discussed in detail throughout this book, it is important to head into a multicloud strategy with eyes open. There are a number of trade- offs involved in migrating to this type of architecture, and some organizations might not be prepared for a multicloud world. There are three potential pitfalls that organizations need to be mindful of when considering a multicloud strategy: • Increased networking complexity • Staying abreast of changing public cloud product offerings • Development agility Let's explore these trade-offs in detail so that your team will be armed with the information it will need to make the best decision. Increased Networking Complexity Multicloud deployments, by their very nature, are complex. This complexity doesn't just apply to the networking infrastructure you employ or how you manage servers and databases. There are vaga‐ ries of each cloud provider (such as interfaces, controls, and limita‐ tions of the platform) that you need to consider as you plan your strategy. But the primary difficulty is in the networking stack. Anyone who has worked as a network or security engineer for any length of time has had that "Oh, s**t" moment in which part of the network is acci‐ dentally knocked offline. Just imagine a mistake that takes down a worldwide infrastructure deployment across multiple datacenters. For example, in November 2018, a Border Gateway Protocol (BGP) misconfiguration at a Nigerian ISP resulted in many of Google's services being unavailable to much of the world for more than an hour. Correctly designing the network infrastructure in a multicloud envi‐ ronment is critical. Proper multicloud design involves DNS manage‐ ment, load-balancer configuration, server redundancy, database replication, and firewall rules that allow this traffic to flow freely across multiple providers while not allowing unauthorized visitors access to sensitive data. Of course, this design is not static; it is a liv‐ Trade-Offs | 9

Articles in this issue

Links on this page

view archives of eBooks - OreillyMultiCloudFinalEBOOK