polito.it
Politecnico di Torino (logo)

Study, design and implementation of infrastructure as code libraries for the provisioning of a resilient cloud infrastructure model in a multi-cloud context

Davide Manca

Study, design and implementation of infrastructure as code libraries for the provisioning of a resilient cloud infrastructure model in a multi-cloud context.

Rel. Guido Marchetto. Politecnico di Torino, Corso di laurea magistrale in Ingegneria Informatica (Computer Engineering), 2023

[img]
Preview
PDF (Tesi_di_laurea) - Tesi
Licenza: Creative Commons Attribution Non-commercial No Derivatives.

Download (5MB) | Preview
Abstract:

In the latest years a lot of companies and organizations have been considering cloud computing and the delivery of computing services as one of their top investment priorities for their business. In daily life under the hood cloud computing is constantly used without people finds it out. Sending emails, editing documents, watching movies or TV, listening to music, playing games, or storing pictures and other files is a set of activities which have absolutely something to do with multi-cloud. This sector is in continuous growth and it will still provide many benefits thanks to the many positive results it brings to companies which adopts it. The multi-cloud allows an enterprise to use and to orchestrate more than one cloud platform to deliver application services. Implementing standard infrastructures in different public cloud providers help IT operation and management in running environments increasing security and simplifying infrastructure management. The developed project consists in studying, designing and implementing infrastructure as code (IaC) libraries for building and provisioning a high available, resilient and redundant cloud infrastructure solution, in a multi-cloud context, which can be usable as a template to fit as many use cases as possible of cloud-native application’s deployment. The chosen public cloud providers are Amazon Web Services and Microsoft Azure. Having a cloud infrastructure with those characteristics is of paramount importance in a cloud environment due to the profound impact it has on ensuring the stability, continuity, and performance to services and applications. As a matter of fact it minimizes downtime, which can be both financially and reputationally costs as well as hardware failures, network issues, or other unexpected events, in order to prevent from disrupting operations, lost revenue, decreased productivity, and eroded customer trust, while the services in the meantime can continue to run with high availability and redundancy in place, even in the face of these disruptions, reducing or eliminating these negative consequences. A resilient infrastructure contributes significantly to business continuity. By being able to withstand a wide range of challenges (from hardware malfunctions to natural disasters), companies who adopt a solution such as the one proposed for this project can continue its operations without substantial interruptions in order to avoid financial losses and to ensures that critical services remain accessible to customers and users. Additionally, cost savings are another significant benefit. While investing in redundancy may seem like an additional expense, it is an investment that often pays off. The costs associated with downtime, including lost business, recovery expenses, can be far greater than the initial investment in redundancy. In the realm of data protection and disaster recovery, instead, redundancy and resilience play a vital role. Redundant copies of data, often stored in geographically diverse locations, protect against data loss and corruption, ensuring the integrity of the critical data. Moreover, compliance requirements are often a consideration, in fact there are many industries and organizations which are subject to regulations and standards that mandate certain levels of availability, redundancy, and data protection exactlty because maintaining high availability is essential for meeting these requirements and avoiding potential technological security vulnerabilities, legal and financial consequences.

Relatori: Guido Marchetto
Anno accademico: 2023/24
Tipo di pubblicazione: Elettronica
Numero di pagine: 120
Soggetti:
Corso di laurea: Corso di laurea magistrale in Ingegneria Informatica (Computer Engineering)
Classe di laurea: Nuovo ordinamento > Laurea magistrale > LM-32 - INGEGNERIA INFORMATICA
Aziende collaboratrici: Blue Reply Srl
URI: http://webthesis.biblio.polito.it/id/eprint/29420
Modifica (riservato agli operatori) Modifica (riservato agli operatori)