Monday, February 4, 2019
Thursday, January 17, 2019
The planetary health diet
Scientists have been trying to figure out how we are going to feed billions more people in the decades to come. You can still have a couple of portions of fish and the same of chicken a week, but plants are where the rest of your protein will need to come from. The researchers are recommending nuts and a good helping of legumes (that's beans, chickpeas and lentils) every day instead.If you served it all up this is what you would be allowed each day:
1. Nuts - 50g a day
2. Beans, chickpeas, lentils and other legumes - 75g a day
3. Fish - 28g a day
4. Eggs - 13g a day (so one and a bit a week)
5. Meat - 14g a day of red meat and 29g a day
of chicken
6. Carbs - whole grains like bread and rice
232g a day and 50g a day of starchy vegetables
7. Dairy - 250g - the equivalent of one glass
of milk
8. Vegetables -(300g) and fruit (200g)
The diet has room for 31g of sugar and about 50g worth of oils like olive oil.
Source https://www.bbc.co.uk/news/health-46865204
Monday, January 7, 2019
Cloud Computing Basic
- Software as a Service (SaaS)
- Infrastructure as a Service (IaaS)
- Platform as a Service (PaaS)
- Broad network access
- On-demand self-service
- Resource pooling
- Measured service
- Rapid elasticity
The best way to start
with that is to compare it to traditional IT computing. Where on-premises on
our own networks, we would at some point have a capital investment in
hardware. So think of things like having a server room constructed, getting
racks and then populating those racks with equipment. With things like telecom
equipment, routers, switches, servers, storage arrays, and so on.
Then, we have to
account for powering that equipment. We then have to think about HVAC,
heating, ventilation and air conditioning, to make sure that we've got optimal
environmental conditions to maximize the lifetime of our equipment.
Then there's
licensing. We have to license our software. We have to install it, configure
it and maintain it over time, including updates. So with traditional IT
computing, certainly there is quite a large need for an IT staff to take care
of all of our on-premises IT systems.
But with cloud
computing, at least with public cloud computing, we are talking about hosted
IT services. Things like servers and related storage, and databases, and web
apps can all be run on provider equipment
that we don't have to purchase or maintain. So in other words, we only pay for the services that are used.
And another part of the cloud is self-provisioning,
where on-demand, we can provision, for example additional virtual machines or
storage. We can even scale back on it
and that way we're saving money because we're only paying for what we are
using.
With cloud computing,
all of these self-provisioned services need to be available over a network. In the case of public clouds,
that network is the Internet. But
something to watch out for is vendor lock-in. When we start looking at cloud
computing providers, we want to make sure that we've got a provider that won't
lock us into a proprietary file format for instance. If we're creating
documents using some kind of cloud-based software, we want to make sure that
data is portable and that we can move it back on-premises or even to another
provider should that need arise. Then there is responsibility.
This really gets
broken between the cloud provider and the cloud consumer or subscriber,
otherwise called a tenant. So the degree
of responsibility really depends on the specific cloud service that we're
talking about. But bear in mind that there is more responsibility with cloud
computing services when we have more control. So if we need to be able to
control underlying virtual machines, that's fine, but then it's up to us to
manage those virtual machines and to make sure that they're updated. The hardware is the provider's responsibility.
Things like power,
physical data center facilities in which equipment is housed, servers, all
that stuff. The software, depending on what we're talking about, could be
split between the provider's responsibility and the subscriber's
responsibility. For example, the provider might make a cloud-based email app
available, but the subscriber configures it and adds user accounts, and
determines things like how data is stored related to that mail service. Users
and groups would be the subscriber's responsibility when it comes to identity
and access management.
Working with data
and, for example, determining if that data is encrypted when stored in the
cloud, that would be the subscriber's responsibility. Things like data center
security would be the provider's responsibility. Whereas, as we've mentioned,
data security would be the subscriber's responsibility when it comes to things
like data encryption. The network connection however is the subscriber's
responsibility, and it's always a good idea with cloud computing, at least
with public cloud computing, to make sure you've got not one, but at least two
network paths to that cloud provider.
A cloud is defined by resource pooling. So, we've got all this IT
infrastructure pooled together that can be allocated as needed. Rapid elasticity means that we can quickly
provision or de-provision resources as we need. And that's done through an
on-demand self-provisioned portal, usually web-based. Broad network access means that we've got connectivity available
to our cloud services. It's always available. And measured service means that it's metered, much like a utility, in
that we only pay for those resources that we've actually used. So, now we've
talked about some of the basic characteristics of the cloud and defined what
cloud computing is.
For non-techies out
there, the cloud might be an intimidating and nebulous concept. We hear about
cloud computing all the time, but what exactly does it mean?
The National
Institute of Standards and Technology (NIST) describes the basics of cloud
computing this way:
Cloud computing is a model for enabling ubiquitous,
convenient, on-demand network access to a shared pool of configurable
computing resources (e.g., networks, servers, storage, applications, and
services) that can be rapidly provisioned and released with minimal management
effort or service provider interaction.
Still confused?
In short, the cloud
is the Internet, and cloud computing is techspeak that describes software and
services that run through the Internet (or an intranet) rather than on private
servers and hard drives.
Cloud computing is
taking the world by storm. In fact, 94% of workloads and compute instances
will be processed through cloud data centers by 2021, compared to only 6% by
traditional data centers, according to research by Cisco.
So why companies are moving from traditional severs
and datacentres to cloud ?
With
cloud computing, it allows companies to have more time to focus on their
business, instead of on the IT infrastructure. One of the reasons for this is
because most of the IT infrastructure is the responsibility of the cloud
provider.
With the
cloud we have metered usage, whereby all of the usage of cloud resources is
tracked and that's how we get billed. So, what that ends up meaning at the
accounting level is that we're dealing with a monthly recurrent operating
expense versus a capital expenditure. Which might be less frequent, but
nonetheless requires capital for things like the acquisition of hardware to
run on-premises networks. So, it's a monthly ongoing expense which often might
include a subscription plus a usage fee. But also the nice thing about it is
it can facilitate budgeting over time as we set a baseline for our usage of
cloud resources in our environment.
So, you
pay for what you use similar to a utility like electricity or water.
We also
have to bear in mind that the IT needs of an organization to support its
business processes will change over time. Things like the amount of disk space
that's needed, or the underlying server horsepower, maybe to perform Big Data
analytics. We have to think about lost productivity and downtime from failed,
or misconfigured, or even hacked IT systems. Then we have to recognize, in the
cloud we've got the ability to rapidly provision and also deprovision
resources. That can even be automated in some cases. Bear in mind that
deprovisioning, for example scaling in, that would be removing virtual machine
instances to support an app, saves money. Because we have less virtual
machines running in the cloud at the same time.
In the
cloud it's also very easy to enable high availability across different
geographical regions. For example, to make sure our data or database replicas
are highly available. The cloud also has a global reach with points of
presence around the world with Google Cloud Platform. So, if we want to enable
some content to be made available to users in Europe. Even though the web site
that really hosts the content is in North America, we can do that using things
like a cloud content delivery network,
or CDN.
We should
also plan to monitor the network link between our on-premises network and the
cloud. Assuming that we have connectivity from on-premises to the cloud,
whether it's for data center purposes or that's where end users are. We need
to make sure that's done properly because we want to make sure that we have
redundant links to the cloud. That's essentially the single point of failure
between a company that has an on-premises environment as well as a cloud
environment. The Internet links us between them and so, we need to make sure
that it's trustworthy.
Then
there's cloud economics. Consider this
example, where we might have a return on investment, or ROI, of 5 years. Now
that could mean that we have a payback period of 5.5 months. So that our total
cost of ownership, or TCO reduction could potentially be upwards of 64%. Now
these numbers will certainly vary depending on your usage of the cloud. Like
the use of any type of commodity so to speak, it has to be used efficiently.
That doesn't take care of itself in the cloud. We still have to manage it
properly. It still requires proper IT workload and IT system governance.
So, what
are some factors, then, that could feed into some of these potential cost
savings? Well, one is less time spent updating and managing IT resources,
because the bulk of that is the responsibility of the public cloud provider.
Also high availability. We're more likely to have systems left up and running
over the long term if they're hosted in different data centers owned by a
cloud provider than we are on-premises. Then there's the rapid provisioning
and deprovisioning or the scalability of resources. So, if we offer some kind
of retail services online for shopping, maybe during holiday seasons. We have
it configured to auto-scale to add other virtual machine instances to support
the peak demand. But then when that disappears, so do the extra virtual
machine instances. So, we're only paying for the peak demand usage that's
required. And the lessened risk of downtime, besides high availability, is
also something we consider in the SLA, the service level agreement. The
service level agreement is a contractual document between the cloud provider
and the cloud consumer. And one of the many things it will cover is things
like expected uptime, and the consequences of that not being met.
Public Clouds
There are
varying cloud models, one of which is the public cloud. The public cloud is
accessible to all users over the Internet, potentially. Now, of course,
they're going to have to sign up, either initially for a trial account, or
initially or after the trial is expired for a paid account. But nonetheless,
the public cloud is accessible to individuals. So, individual consumers as
well as organizations, government agencies, academic institutions, and so on.
So, this means then that with a public cloud environment, the public cloud
provider has data centers around different geographical locations in the
world. And as a result, they also have multiple cloud tenants or customers. Of
course, each cloud tenant or customer, their configurations, and their data
are kept completely separate from other cloud tenants. Otherwise, nobody would
use the service, whether it be individuals or organizations.
Cloud
provider hardware is owned by the cloud provider and exists in data centers in
different regions around the world physically. So, what we end up having then
is a large scale of pooled resources. Things like servers with a lot of
horsepower that can act as hypervisors and run virtual machine guests and
applications. Things like Docker containers. Also, we have things like pooled
resources in the form of network equipment. That can be configured at a higher
level by cloud tenants. Things like routing paths and firewall rules. Another
example of a pooled resource, of course, would be storage that customers or
tenants can provision at a moment's notice, or deprovision at a moment's
notice, as well. So, the cloud provider, then, benefits from economies of
scale. Due to the large number of cloud tenants or customers, it allows them
to be able to acquire all of these facilities containing all of this physical
computing equipment. And to assure that they meet specific security standards,
so that they are trustworthy, and customers will actually use their service
and pay for it. And so as a result, the economies of scale mean that users can
end up perhaps with a small subscription fee but really, they only pay for
what they are using. And that is in quite a stark contrast to the purchase of
equipment on premises, and licensing in software, where once you've purchased
it it's yours.
Then we
have to consider network connectivity to and from the public cloud. Now,
normally this is done over the Internet. Certainly, for individuals this is
the case and even for most organizations. So, we have access to the public
cloud provider services through the Internet. In the corporate environment,
user devices like mobile smartphones, laptops, desktops will maybe reside on a
corporate on-premises network that connects over the Internet to the cloud.
Now, that can also happen even through a VPN if required, if we need that
encrypted tunnel or if we want to link an on-premises network directly with a
cloud-based network. Now, also, there's the option of a private dedicated
connection.
With
Google Cloud Platform, that's called Google
Dedicated Interconnect. We'll get into the details later. But for now,
essentially, it's a dedicated network link from your on-premises network or
data center to the Google Cloud without going through the Internet. Now, if we
are going to use network connectivity such as the Internet, we should consider
redundant network paths. And ideally, that would be network connections from
different Internet service providers. We don't want a single point of failure.
So that if there's a problem with one Internet service provider, we can fall
back on our Internet link to the Google public cloud to our secondary Internet
service provider network link.
Private Clouds
Besides
the public cloud type, we also have private clouds. Private clouds are
different in that they're accessible only to a single organization. Whereas
public clouds are accessible to anyone that wants to sign up over the
Internet. So, it's organization-owned hardware infrastructure that the
organization is responsible for configuring and maintaining over time.
However, a private cloud still adheres to the exact same cloud characteristics
that a public cloud does such as self-provisioning. Whether it's through some
kind of a web user interface and the rapid elasticity of pooled IT resources,
such as the ability to use a web interface to quickly deploy virtual machines
or additional storage, maybe for use by a particular department within the
organization.
So,
you'll see private clouds in larger enterprises are often used for
departmental chargeback. So, another common characteristic of a cloud is, metered usage. So, all the usage of resources
is tracked and then, in this case, it's charged back to departments that use
those IT resources.
A private
cloud can also be extended into the public cloud. Now, that's where we get
into what's called a hybrid cloud, and
we might use that for something called cloud
bursting. Cloud bursting essentially means that, once we've depleted
our on-premises resources, whether that be the number of virtual machines we
can run, or we've consumed all of our storage capacity on-premises. We've got
a link to the cloud as a secondary plan B that can be used to provision, in
our case, maybe additional virtual machines or additional storage. And in some
cases, it won't even be known to the end user, this is actually happening into
a different environment, into the public cloud.
The
private cloud is sometimes the only real choice we have, because regulations
might prohibit or limit the use of public cloud providers. So, if we're
dealing with some kind of government sensitive data, we might be prohibited
from that leaving a specific network under military control if it's that type
of information.
In a
private cloud, the organization has way more IT responsibility. Now, that
comes in the form of the cost of acquiring all the equipment and paying
personnel to configure it and maintain it over time. But also, fault tolerance
is also the responsibility of the organization. So, the organization is responsible for the installation,
configuration, and maintenance of IT equipment for the private cloud.
Now,
organizations can have internal SLAs or service level agreements that
guarantee uptime, for example, to departments that pay for their usage of
those private cloud resources. And fault tolerance might be achieved by using clustering on-premises. Multiple servers that
offer an app, if a server node goes down, then another one can pick up the
slack and continue running the app.
The
organization, in a private cloud, also has full
control of that environment in how it's configured, how it's maintained
and updated.
And, of
course, there's definitely a further degree of
privacy depending on the configuration. But generally, this is true
because we don't have any data that is leaving the on-premises network. That's not to say that a private cloud is
always more secure than the public cloud. Not necessarily true at all. But
there is more privacy.
Community Clouds
We've
already discussed public and private clouds. Another cloud type is a community
cloud. A community cloud uses cloud provider IT infrastructure and pooled
resources. So, really that's just cloud computing unto itself. However, what
makes them a little bit different than a public or a private cloud is that
there are same needs, or the same requirements exist across multiple tenants.
Now, of course, that means that if the public cloud provider also offers
public cloud computing to anyone over the Internet, that there is isolation
from those public tenants.
In some
cases, a community cloud would be the perfect solution to remain compliant
with certain industry regulations. So, a
community cloud must ensure regulatory compliance.
So, for
example, for regulatory compliance, in terms of security, we might use G Suite
for Government. Now, there also is FedRAMP compliant, where FedRAMP stands for
the Federal Risk and Authorization Management Program. Where US government
departments have to have certain security controls in place. Then on the
medical side there's HIPAA compliance. HIPAA stands for the Health Insurance
Portability and Accountability Act, and again, as usual, it's really about
data governance on the security side. Making sure that data is protected with
reasonable encryption. Whether it be data at rest, that would be stored data,
or data being transmitted by configuring things appropriately like firewalls
and intrusion detection systems. Other possible regulatory compliance items
would deal with things like long term data retention policies and archiving
and making sure that it's immutable. In other words, that something that's
archived cannot then be modified.
Hybrid Clouds
You can
think of a hybrid cloud as really being the best of both worlds. When we talk
about both worlds we're talking about on-premises
computing environments as well as cloud
computing environments working together at the same time. Now this
would be something that's common with public cloud adoption for an
organization. Where we might run a private and public set of IT workloads in
parallel or together as we migrate over time. Now that would mean taking data
or systems or virtual machines. Even converting on-premises
physical servers to virtual machines in the cloud. That physical to
virtual conversion is called P2V. We can
also use a hybrid cloud as a way to extend our private network into the cloud.
And often that would be done for things like cloud bursting to meet peak
demands. So that when we've depleted the IT resources available on-premises,
we simply seamlessly extend into the public cloud to use additional resources
there.
The
migration of our on-premises systems and data can take a long time. So for
example, we might have data that's stored on-premises and in the cloud. And
maybe that is our backup solution, it's an off-site backup. So we might have
an appliance on-premises that allows users to access data. But at the same
time maybe it synchronizes or replicates data to the cloud for backup
purposes. Could also be the other way around. We might also have cloud data
presented to an on-premises appliance, which then presents itself to backup
software on-premises as something like a virtual tape library. So our
on-premises backup software just thinks, oh yeah, it's another regular backup
source.
Now, in
the case of the migration of very large amounts of data into Google Cloud. It
might be unfeasible to think of doing that over and even the highest speed
Internet connections. So instead, we might look at something like the Google Transfer Appliance. And what this
really means is that we've got an on-premises storage appliance that we
essentially copy data to. And that appliance is then physically shipped to a Google Cloud Platform data center where
the data is then copied onto their infrastructure.
Another
possible option to consider when we talk about hybrid clouds is the Google Dedicated Interconnect feature. We'll
focus on its details later. But what it really lets us do is bypass the
Internet by having a private dedicated network
link from our on-premises network directly into the Google Cloud. Now, that
normally means that we have more predictable
throughput than we would by using a shared connection over the Internet. And
one might argue it might offer more security since it's private. Now of
course, over the Internet we could also achieve security by using a VPN tunnel. But Google Dedicated Interconnect
is yet another consideration when we think about hybrid cloud computing.
Service Models in Cloud Computing
One type
of cloud computing service model is software as a service, which is otherwise
simply called SaaS. Now, really what this is, is application or office
productivity software that's hosted on provider equipment. And it's accessible
over a network such as the Internet. So normally, it requires only a web
browser. It might require some plugins. But usually, the web browser and a
plugin would be the extent to what's required to access SaaS services. And
often they'll offer some degree of customization. Where you can configure
maybe the visual appearance or skins or certain security settings related to
the specific SaaS tool you're using.
For
example, if we're using office productivity tools like word processors through
a cloud provider. So with software as a service because it is cloud computing,
we pay for the usage of a service. For example, we have Gmail and G Suite,
which are considered software as a service offerings through Google. And in
the case of Gmail, depending on whether it's being used by an individual or a
large enterprise determines on the cost of it, in terms of the storage space
for archived messages. Or the number of messages in and out.
Software
as a service relies on virtualization. And this also means that we've got
tenant isolation. Now the virtualization doesn't necessarily mean virtual
machine operating system virtualization. It could also be application
virtualization using what are called application containers. In other words, no control of underlying virtual
machines, also known as VMs. In the end, as a cloud consumer, we
don't really care as long as the isolation is in place. So for example, if I'm
using a cloud Gmail solution, I want to make sure that my organization's Gmail
accounts are not in any way accessible to other Google cloud tenants. So when
we talk about software as a service, yes, it does rely on virtualization of
some kind at some level. However, that's not visible and certainly its
configuration is not available to us as cloud consumers. That configuration,
including things like making changes or applying patches is the responsibility
of the cloud provider. Software as a service also removes the need for things
like installing software and licensing it. So really, it transfers the IT
management responsibility from our organization to the cloud provider instead.
With
software as a service, one business consideration is vendor lock-in. So we
might take a look at the service level agreements for the various cloud
services we use from a specific cloud provider. Service level agreements are also known as SLAs. Because we
want to make sure that if we decide that we want to stop cloud computing, we
want to go back on-premises or switch to a different public cloud provider,
that we can. And that might mean that we have to ensure that data can be
exported in a standard format from one provider and then imported to another.
Or even live migrated over the Internet.
For example, with Google, we have the option
of actually migrating Amazon Web Services storage data from Amazon Web
Services directly into Google Cloud Storage. We then have to think about our
network connection. Because when we depend on software as a service, that
network connection to the cloud is our single point of failure if we've only
got one network connection. So, there is a
dependency on connecting to the cloud provider. We should also make
sure that we acquire sufficient bandwidth in that connection. And that would
depend upon, for instance, the number of users that would concurrently be
using software as a service through that network link. And again, due to
having a single point of failure, we should really consider having redundant
network paths. In the case of Internet connections, that would be multiple
Internet connections ideally in a perfect world through different Internet
service providers.
Now we
will look into infrastructure as a
service. Just like software as a service is a different type of cloud service
model, well, so is infrastructure as a service and it's normally just called IaaS. It relies on virtualization. For
example, working with virtual machines. Virtual
machines are also known as VMs.When we deploy our virtual machine
instance, that's infrastructure as a service. When we provision new storage in
the cloud, that is infrastructure as a service. So is things like network
configurations, like firewall rule sets. It's all part of our network
infrastructure. Physical equipment that makes all of this possible is actually
housed in Google Cloud data centers around the globe. Now because that
acquisition of hardware, that expense in powering it and cooling it and so on
is done by Google, it’s their responsibility. So for us, the cloud customer,
it reduces capital expenditures on our end. All we do is pay for what we use,
which is really just an operational expense.
Infrastructure
as a service can be provisioned using the Google Cloud console, so using the
web GUI. Or of course it can be provisioned and managed programmatically
through various APIs. Or even using the GCloud command line tool. We provision
and manage infrastructure as a service over the network. And it also supports
scalability, on-demand where we pay for the usage. So if we decide, for
example, we want to provision four new virtual machines, we can do that in a
matter of minutes with a few clicks. That same thing is true if we want to
provision additional storage. And also deprovisioning
resources that we no longer need to save on costs. This might even be
automated. So we might even configure something like a VM instance group in
Google Cloud Platform and configure it with a specific number of instances to
support things like autoscaling. So that
when we have a peak demand in an app, we scale out horizontally. We add more
virtual machines to support the app and when that demand declines, so does the
number of virtual machines we scale back in.
Google Cloud Storage is definitely considered
infrastructure as a service. All of the network configurations are also part
of infrastructure, and this uses something called software defined networking. Now, that's not specific to Google
Cloud computing. It's a standard cloud computing term that's often referred to
as SDN. And what it really means is that
we, the cloud customers, have an easy way of configuring network resources.
Deploying
cloud virtual networks and IP ranges and firewall rules without actually
communicating directly with the underlying physical network hardware that
makes all of that possible. Of course, we would then deploy virtual private clouds or VPCs. In
other words, a VPC is a virtual network in the cloud. These are
simply virtual network configurations that we define in the cloud. And then we
deploy our resources like virtual machine instances into the VPCs. We
mentioned that we have firewall rule sets that can be configured for a VPC or
even specific VM instances that control inbound or outbound network traffic.
So what
is infrastructure as a service normally used for?
So, infrastructure as a service would commonly be
used as follows. Well, often it will be used for testing purposes, because it's so quick and
easy to provision, for instance, virtual machines that are isolated from
others in a VPC. So it's sandboxed, maybe to test an application quickly. Or
to host a web site, whether it's for
private organizational use, or it's a public-facing
web site. We might use infrastructure as a service for cloud storage and/or backup. Even for high
performance computing or HPC, where we can configure clusters for the purpose
of parallel computing, which you might use for things like Big Data analytics.
Platform
as a service is yet another type of cloud computing service model, and it's
often simply called PaaS. Now it's related more to applications, the
development of applications, and then the deployment of them. Whether that's
in a staging or test environment or deploying it into production. So the focus
then is on the application rather than the underlying supporting resources
like network configurations, virtual machines, and storage. Or virtual servers.
Platform
as a service-specific resources would include things like development tools.
Now that would include also APIs that expose cloud functionality to developers
in a variety of different languages. And that's definitely the case with
Google Cloud Platform. Many of the cloud services are available to developers
in languages like C#, Python, Java and so on. Also platform as a service deals
with databases. So if we want to deploy a MySQL database, for example, in the
cloud the underlying complexities like virtual machines, installing the
software and so on, that's already taken care of in most cases. We simply tell
our environment, our GUI environment, or whether we're doing it through the
command line, that we want to deploy some kind of a database in the cloud. A
couple of parameters, such as, like the number of replicas, whether we want to
use our own license, that type of thing. And it just happens very quickly.
Other
types of PaaS resources would include things like business intelligence tools
or Big Data analytical tools. These are essentially like extensions that can
take data that's been massaged through our platform as a service use. And then
we can gain insights from them that otherwise wouldn't readily be apparent.
Some examples of Google Cloud platform as a service offerings would include
MySQL or even using the Docker Container
Registry. Where Docker containers are essentially a way to isolate
applications from one another, like virtual machines can isolate operating
systems from one another.
Disaster Recovery as a Service (DRaaS)
Even
though it doesn't sound like a good idea, planning for failure is a good idea.
It's really related to disaster recovery. In the cloud, we're really talking
about Disaster Recovery as a Service, otherwise called DRaaS. Now with traditional on-premises disaster recovery,
otherwise simply called DR, we have things like off-site backups to protect
data. Failover clustering, so that if we've got a critical app running on a
host that fails, that app can then run on another host within the cluster, and
in some cases, with zero downtime. We then have machine imaging that we can
then use to quickly get a system back up and running in the event of a
disaster. And then on the facility side, we've got power generators in case the
power grid goes down. There are battery-powered lights and so on. Now that's
with a traditional on-premises disaster recovery mechanism.
Now in
the cloud, with Disaster Recovery as a Service or DRaaS, we have a much smaller capital expenditure than traditional
disaster recovery. Actually there's no capital expenditure really because in
the cloud, we have an ongoing operational expense instead. So that means
dealing with things like data backups, maybe from on-premises, to the cloud,
and also long-term data archiving to the cloud. We might even have a hybrid
cloud solution where we extend our on-premises workloads into the Google
Cloud. So often that might be done in the case of disaster recovery so that if
we have a problem with an on-premises IT workload, it can failover into the
cloud as required.
So
Disaster Recovery as a Service then will vary from one public cloud provider
to the next. But generally speaking, it allows us to utilize cloud provider
infrastructure in case we have a failure of some kind with our on-premises
environment.
Summary
The public cloud is available to all over the
Internet. It might require signing up for an account, but potentially anyone
over the Internet, individual or organization, can sign up for public cloud
computing services.
A private cloud is different because it has all
of the cloud characteristics that a public cloud would have. Things like rapid
elasticity, self-provisioning, metered usage and so on. However, it's all
under the control of a single organization. So it's an organization's
infrastructure on-premises. They've paid for it, they're responsible for it,
and they manage it. Hence, it's a private cloud. But take note that just
because you're using virtualization on-premises does not mean you have a
cloud. You have to meet the cloud characteristics of metered usage,
self-provisioning, rapid elasticity, broad access, and so on.
A community cloud means that we've got the
infrastructure available but really for special needs, so organizations that
have similar computing requirements. Often it's usually in the case of
isolation and security, and maybe even certain types of connections or certain
app availability. Those similar computing requirements are best served through
what's called a community cloud.
A hybrid cloud uses on-premises as well as cloud
resources in the public cloud environment. So for example, we might have a VPN
link between our on-premises network or data center and the Google Cloud VPC
or a virtual network in the Google Cloud. We might have on-premises clients
that access Google Cloud virtual machine instances, that might also happen
through that VPN link. Virtual machines
are also known as VMs. Now, in some cases a hybrid cloud could be a
temporary solution during cloud adoption and the migration of data and IT
workloads from on-premises to the cloud. But also a hybrid cloud could also be
a more longer term solution for cloud bursting,
which means that we have depleted our on-premises IT resources and now need to
use public cloud resources. It might also be used for high availability where
we use it as a disaster recovery solution
if we have a failed workload on-premises we might have it configured to fail
over to the cloud.
Software as a service or SaaS is often in the
form of end-user productivity software where the cloud provider is responsible
for the maintenance of this software. The installation, the general
configuration, updating and so on. So in the Google Cloud we might use
software as a service offerings such as G Suite, or even using Gmail.
Infrastructure as a service, or IaaS, is
really based on IT infrastructure components. So that would be things like
virtual machines, or cloud storage, or cloud network configurations such as
VPCs, or IP address ranges we configure for certain VPC subnets, or firewall
configurations, or VPN connections, and so on. So in the case of Google Cloud,
infrastructure as a service would include virtual machine instances, VPCs,
which are virtual networks in the cloud and Google Cloud Storage offering.
Characteristics of cloud computing.
What makes a cloud a cloud? 5 defining
characteristics are,
This excerpt is from
'The Economics of Cloud Computing:
An Overview For Decision Makers,' by Bill Williams. Coming in July from Cisco
Press (ISBN: 1587143062).
With
traditional IT computing, we have an on-premises computing environment, which
requires a capital investment in hardware. We then have to power the
equipment. We have to assure that we have proper HVAC, that's Heating,
Ventilation, and Air Conditioning to make sure that equipment runs smoothly.
Then we have to license software. After we acquire the software, it needs to
be installed, configured, and maintained, including upgrades and even updates.
Now in
the cloud, we're talking about hosted IT services on the Google Cloud
Platform, that's on Google's equipment in their data centers around the world.
That includes servers, storage, databases, web apps, and so on. And just like
a utility, such as electricity, with cloud computing we pay for the services
that we use. There's also self-provisioning on demand, where we can either
programmatically or from a command line or using a GUI, we can provision cloud
resources or deprovision them if we need less. Also, the services are all
accessible over a network such as the Internet. But we should always be
careful with cloud computing to avoid vendor lock-in. And we want to make sure
that means that we have the ability to export data to standard formats or to
migrate data to other providers should we have a need in the future.
In the
cloud, there is often shared responsibility of taking care of the IT workload
running in the cloud. But the degree of that responsibility depends on the
specific cloud service that we're talking about. For example, if we're talking
about a hosted database in the cloud, maybe the underlying virtual machine
operating system and updates are taken care of by the cloud provider. So more
responsibility does, however, mean more control. Hardware is the provider's responsibility, whether we're
talking about network routers and switches, storage arrays, physical
hypervisor servers, and so on. The software, in some cases, will be the
provider's responsibility, such as in the case of something like Gmail.
However, the subscriber has some responsibility in terms of using it and
configuring it to serve their business needs. So it's a little bit of both, in
that case, with software.
When it
comes to the creation of users and groups, and in the Google Cloud Platform
that's called IAM, identity access and management, that's the subscriber's
responsibility. It's not Google's responsibility. Just like the creation and
management of data is the subscriber's responsibility. Security, in some
cases, can be the subscriber's responsibility. But the provider also has a
role in that, in making sure that their data centers, the equipment, and the
staff are all falling under the appropriate security recommendations to run a
proper IT cloud environment. The network connection, of course, is the
subscriber's responsibility. And that's why often it pays to have redundant
links, ideally through different Internet service providers, to assure that we
can get to the Google Cloud.
Google
manages the physical data center facilities that house all of the racks of
equipment. So they deal with things like hardware physical security, such as
locking up racks of equipment. They deal with the physical network
infrastructure links and the virtualization infrastructure, which really means
having the hypervisors that can run the virtual machines on them.
The
subscriber has a responsibility with the virtual machine instances that they
might deploy. [Video description begins] Virtual
machine is also referred to as VM. [Video description ends] How
they configure and create policies, such as how to control firewall rules and
also how to control data retention. That is under the subscriber's
responsibility, in this case. Dealing with user credentials, whether for example,
multi-factor authentication is configured, is the subscriber's responsibility.
Such as whether data at rest or data in transit is encrypted. And also what
type of data stores are being used to hold cloud-based storage information.
The cloud
really has a number of characteristics, such as resource pooling, having all
of these resources available for cloud consumers. Broad network access allows
access over the network using any type of device. The network in this case
being the Internet. Cloud computing also has a characteristic of having
on-demand self-provisioning. Usually, that's done through a web interface. So,
for example, if a client requires more storage, they can simply click a few
buttons and it's done very quickly. It's a measured or metered service, and
that's how we pay for our usage of cloud computing. The rapid elasticity is a
result of both resource pooling and self-provisioning, where we can rapidly,
in our example, deploy more storage or even more virtual machines as required.
Sunday, January 6, 2019
Google Cloud Concepts Part II
This blog is going to be a continuation of below article so if you have not seen that please read that and come back here. https://annmaryjoseph.blogspot.com/2018/12/google-cloud-platform-concepts.html
Here I am talking about,
Google Cloud Storage Basics
Here I am talking about,
Google Cloud Storage Basics
Google
Cloud Storage implies virtually unlimited data storage and access globally, and
it's available 24/7.
Why use
Cloud Storage? Well, you could use it to, for example, serve website content,
provide an archive for disaster recovery, as well as for direct downloads of
large data objects.
Google
offers a number of Cloud Storage options, and which one you use depends on the
application and the workload profile.
Cloud
Storage options support structured, unstructured, transactional, as well as
relational data types.
Cloud
Storage solutions are available for a wide array of use cases, including
solutions for mobile applications, for hosting commercial software, for
providing data pipelines, as well as basic backup storage.
Google
Compute Engine is an Infrastructure-as-a-Service offering for provisioning
flexible and self-managed VMs hosted on Google's infrastructure.
Google
Compute Engine (GCE) is the Infrastructure as a Service (IaaS) component of
Google Cloud Platform which is built on the global infrastructure that runs
Google's search engine, Gmail, YouTube and other services. Google Compute
Engine enables users to launch virtual machines (VMs) on demand.
VMs can be
launched from the standard images or custom images created by users. GCE users
must authenticate based on OAuth 2.0 before launching the VMs. Google Compute
Engine can be accessed via the Developer Console, RESTful API or command-line
interface (CLI).
Supported
virtual machine operating systems include a number of Windows-based operating
systems as well as many of the common Linux distributions. Compute Engine
integrates with other Google Cloud Platform services like Cloud Storage, App
Engine, and BigQuery.This extends the service to address more complex
application requirements.
Google
Compute Engine includes predefined machine configurations as well as the
ability to define custom machine types that you could optimize for your
organization's requirements. With Compute Engine, you can run large compute and
batch jobs using preemptible VMs, which are very inexpensive and short-lived
compute instances. Fixed-pricing with no contracts or commitments simplify the
provisioning and shutdown of virtual machines. All data that's written to
persistent disk using Compute Engine is encrypted transparently and then
transmitted and stored in encrypted form. And Google Compute Engine also
complies with a number of data and security certifications. Compute Engine
offers local solid-state drive block storage that is always encrypted. Local solid-state
drives are physically attached to the hosting server supporting very high IOPS
and low latency. With Google Compute Engine instances, maintenance is
transparent.
Google
data centers use their live migration technology, providing proactive
infrastructure maintenance. This improves reliability and security. Live
virtual machines are automatically moved to nearby hosts, even while under
extreme load, so that underlying host machines can undergo maintenance. This
means no need to reboot your virtual machines due to host software updates, or
even in the event of some types of hardware failure. Compute Engine instances
are highly scalable. And global load balancing technology enables the
distribution of incoming requests across pools of Compute Engine instances
across multiple regions. The high performance Compute Engine virtual machines
boot quickly and have persistent disk storage. In addition, Compute Engine
instances use Google's private global fiber network with data centers located
worldwide.
CPUs on Demand with Google Compute Engine
Google Compute Engine
has predefined machine types from micro instances to instances with 96 virtual
CPUs and 624 GB of memory. The tier of available configurations include
Standard, High memory, and High CPU. With Compute Engine, you can create
virtual machines with the configuration that's customized for your particular
workloads. Again, from 1 to 64 virtual CPUs and up to 6.5 GB of memory
available for each CPU.
This flexibility means
that you can potentially save money, because you don't have to overcommit to a
hard-sized, basically oversized, virtual machine. No, instead, you can
customize to optimize your virtual CPUs and memory. By offering custom machine
types and predefined machine types, this flexibility means that you can create
infrastructure that is customized for your organization's particular workload
requirements.
Compute Engine is very
scalable and there is no commitment, meaning that you aren't locked in to
whatever configuration you initially choose. So, for example, Compute Engine
offers a start/stop feature that allows you to move your workload to smaller or
larger custom machine type instances or to a predefined machine type
Cloud Storage
Google Cloud Storage
offers a number of different storage and database options. Which you choose
depends on the application, the data type, and the workload profile. Types of
data supported include structured, unstructured, transactional, as well as relational
data. So let's have a look at the different options.
First, Persistent Disk.
This is fully managed block storage suitable for virtual machines and
containers. So for Compute Engine and Kubernetes Engines instances. It's also
recommended for snapshots for data backup. Typical workloads include disks for
virtual machines, read only data sharing across multiple virtual machines, as
well as quick and durable backups of virtual machines.
Google Cloud
Storage is a scalable, fully managed, reliable, and cost efficient
object and blob store. It's recommended for images, pictures, videos, objects,
and blobs, as well as unstructured data. Common workloads include streaming and
storage of multimedia, as well as custom data analytics pipelines, and
archives, backups, and disaster recovery.
Next is Cloud Bigtable. Cloud Bigtable is a
scalable, fully managed, NoSQL wide column database. And this suitable for both
real time access and analytics workloads. Cloud Bigtable is indicated for
low-latency read/write access, high-throughput of analytics as well as native time
series support. Typical workloads include Internet of Things, streaming data,
finance, adtech, which is marketing, as well as monitoring, geospatial datasets
and graphs, and personalization.
Cloud Datastore
is a fully managed NoSQL document database for web and mobile applications.
It's recommended for semi-structured application data, as well as hierarchical
data, and durable key-value data. Typical workloads include user profiles,
product catalogs, for e-commerce, and game state for example.
Google Cloud
SQL is a fully managed MySQL, and PostgreSQL, database service. And it's
built on the strength and reliability of Google's infrastructure, of course.
It's recommended for web frameworks, as well as structured data, and online
transaction processing workloads. Common workloads include web sites and blogs,
content management systems and business intelligence applications, ERP, CRM,
and e-commerce applications, as well as geospatial applications.
Google Cloud
Spanner is a mission critical relational database service with strong
transactional consistency at global scale. It's recommended for mission
critical applications, as well as high throughput transactions, and for scale
and consistency requirements. Typical work loads include adtech and financial
services as well as global supply chain and retail.
Google BigQuery
is a scalable, fully managed enterprise data warehouse with SQL and very fast
response times. Consequently it's recommended for OLAP workloads, big data,
examination, investigation processing, as well as reporting using business
intelligence tools. Typical workloads include large data analytical reporting,
data science, and advanced analyses, as well as processing big data using SQL.
And Google Drive.
This is a collaborative space for storing, sharing and editing files, including
Google Docs. It's recommended for interaction with docs and files by end users,
collaboration, as well as file synchronization between cloud and local devices.
Typical workloads include global file access via web, apps, and sync clients,
coworker collaboration on documents, as well as backing up photos and other
forms of media.
Google Cloud Storage
options include a separate line for mobile. And, for example, we have cloud
storage for Firebase, which is a mobile and web access service to could storage
with serverless third-party authentication and authorization. Firebase
Realtime Database is a realtime NoSQL JSON database for web and mobile
applications. Firebase Hosting is production ready web and mobile content
hosting for developers. And Cloud Firestore for Firebase is a NoSQL document
database. Cloud Firestore for Firebase serves to simplify storing, querying,
and syncing data for web apps and mobile apps, especially at global scale.
Google Shell
Google
Cloud Shell is a shell environment for the Google Cloud platform. You can use
it to manage projects and resources. And there's no need to install the Google
Cloud SDK, it comes pre-installed. It can also be used with the gcloud
command-line tool and any other utilities.
The
Cloud Shell is a temporary Compute Engine VM instance. When you activate Cloud
Shell, it provisions a g1-small Compute Engine instance on a per-user,
per-session basis. The environment persists while the session is active. It
also comes with a code editor, which is a beta version based on Orion, the open
source development platform. Can also use Cloud Shell to browse file
directories, view, and edit files.
Cloud
Shell features include command line access. So you access the virtual machine
instance in a terminal window. And it supports opening multiple shell
connections to the same instance. That way you can work in one to, say, start a
web server, and then work in another shell to perform some other operations.
You can also use Cloud Shell to launch tutorials, open the code editor, and
download files, or upload files.
It
comes with 5 gigs of persistent disk storage and it's mounted as the $HOME
directory on that virtual machine instance. And this is on a per-user basis
across multiple projects. With respect to authorization, it's built in for
access to projects and resources that are hosted on Cloud Platform because you
are already logged in to Cloud Platform, it uses those credentials.
So
there's no need for additional authorization. So you have access to platform
resources, but the thing is, what access you have to those resources depends on
the role that's been assigned to the Google Cloud platform user that you've
logged in with. Cloud Shell also comes pre-installed with language support for Java, Go, Python, Node.js, PHP, Ruby, as well as .NET.
Cloud Shell comes with a number of pre-installed tools. So for example, we have
Linux shell interpreters and utilities like bash and sh for your shell
interpreters. And it comes with the standard Debian system utilities. For text
editors you're got emacs, vim and nano.
For
source control, Cloud Shell supports Git and Mercurial. For Google SDKs and
tools, you've got the Google App Engine SDK, the Google Cloud SDK, as well as
gsutil for cloud storage. It also comes pre-installed with some build and
package tools. For example, Gradle, Make, and Maven, as well as npm, nvm, and
pip. Additional tools include the gRPC compiler, the MySQL client, Docker, and
IPython. Cloud Shell also provides a web preview function that allows you to
run web apps on the virtual machine instance and preview them from the Cloud
console. The web applications must listen for HTTP requests on ports within a
range of 8080 to 8084. And those ports are only available to the secure Cloud
Shell proxy service, and that restricts access over HTTPS to your user account
only.
To activate Google
Cloud Shell, you just click on the activate Google Cloud Shell icon in the
toolbar. And that opens underneath the current window, or within the current
window that is.
Now, to list your
config defaults, you just type gcloud config list
gcloud compute instances delete deletes one or more Google Compute Engine
virtual machine instances.
Now I'll just type
clear and press Enter. Now to set any defaults, you use gcloud config set project
So now let's say that
we want to set up my default compute zone. So gcloud config set compute/zone. And
we'll say that I want to set it up as europe-west2
Zone names is
available here https://cloud.google.com/compute/docs/regions-zones/
And you can verify it
using gcloud
config list
Okay, so now let's
clear this by typing C-L-E-A-R and pressing Enter. Now, you can also see what
components that come pre-installed. And you can also see the current Cloud SDK
version you're using as well as the latest available version by typing gcloud components
list.
I am in latest version
but if you like to update the gcloud components update
Using Sudo command
If you have update
Press Y and this may take some time
Shell environment
again supports the standard Debian system utilities, well that means that we
can, for example, create an alias for a command.
So let's type alias c=clear. So now if I
type c, that's like issuing a clear command.
That also means that
you can configure variables and so on by placing those directly in the .profile
file. In the tilde, or dollar sign home directory, and that's where we're at
right now. So if I type pwd, this is my home directory, if I type echo $HOME, again same
thing.
So if I go tail to
list the last ten lines of .profile, you'll see here that I have in my profile
setup some environment variables.
And I've also set up
an alias command here. So in actuality any time that I launch the Shell I
will have that alias set up on this machine, those environment variables will
also be populated with the values that you see there. Okay, so that's Cloud Shell.
Setting Shell and Environmental
Variables
Environmental variables are
variables that are defined for the current shell and are inherited by any child
shells or processes. Environmental variables are used to pass information into
processes that are spawned from the shell.
Shell variables are variables
that are contained exclusively within the shell in which they were set or
defined. They are often used to keep track of ephemeral data, like the current
working directory.
We can
see a list of all of our environmental variables by using the env or printenv commands.
The set command can be used to see the shell variables This is usually a huge list. You
probably want to pipe it into a pager program to deal with the amount of output
easily:
set |
less
We will begin by
defining a shell variable within our current session. This is easy to
accomplish; we only need to specify a name and a value. We'll adhere to the
convention of keeping all caps for the variable name, and set it to a simple
string.
Creating a Cloud Storage Bucket in Cloud Shell
Now we'll create a
cloud storage bucket using the gsutil tool in Google Cloud Shell.
Gsutil is the cloud storage command line tool
Gsutil is a Python
application that allows you to access cloud storage from the command line. You
can use Gsutil to do a number of things with cloud storage buckets. And also
perform object to management tasks like creating and deleting buckets, uploading,
downloading and deleting objects. Listing buckets and objects moving, copying
and renaming objects, as well as editing object and bucket access control
lists. So before we get started, I just want to show that I've logged into my
Google Cloud platform here, and I've already activated Cloud Shell.
You need python 2.7
for this so please verify. Now, this is already installed in Google Cloud
Shell. But if you're using Cloud SDK on your local machine you'll need to
install Python 2.7. So to see if you have gsutil tool installed, type gcloud components
list.
More instructions here
https://cloud.google.com/storage/docs/gsutil
Command to create
bucket is
gsutil mb
gs://mybucket
And you can see
service exception 409 bucket my bucket
already exists. See the message it displays .
And obviously,
somebody else across Cloud storage has already used that. And that's the thing,
the name of your bucket has to be unique across cloud storage. So this one
might work, however. Let's try this one, my bucket, 1258
gsutil mb
gs://mybucket1258
Next I am creating
some fake images and then copying the same to new bucket I created
touch london.png
touch delhi.png
touch apple.jpeg
ls
Command to copy images
to bucket I just created is do one at a time
gsutil cp
london.png gs://mybucket1258
gsutil cp delhi.png
gs://mybucket1258
gsutil cp
apple.jpeg gs://mybucket1258
Now go to GCP -
Storage -Browser - Refresh Bucket and the images are there
Okay, now, it's always
a good idea to clean up after yourself, right? You don't want to incur any
charges if you don't have to. So to do so what we can do is, we can use this
command, right?
Gsutil rb
for remove bucket or gsutil rm -r to remove the bucket and anything underneath it. So
let's copy these commands. In order to use rb for remove bucket, it must
be empty. However, this command, gsutil rm -r will remove all the contents and
the bucket.
gsutil rm
gs://mybucket1258/*
gsutil rb
gs://mybucket1258/
First command will
delete the contents in bucket
Second Command deletes
the bucket
and we'll see now that
we've got no buckets. So we successfully cleaned up after ourselves.
Data Analysis with GCP
Modern
applications typically generate large amounts of data from many different
sources. Devices or sensors can capture raw data in unprecedented volumes, and
this data is perfect for analysis. This analysis can provide insight into an
organization's operating environment and business.
BigQuery
is a serverless (In the context of a data warehouse, serverless means being
able to simply store and query your data, without having to purchase, rent,
provision or manage any infrastructure or software licensing.) highly scalable
enterprise data warehouse on Google Cloud Platform. It's fully managed, so no
infrastructure to manage, eliminating the need for a database administrator. So
an organization can focus on analyzing the data using SQL. It enables real-time
capture and analysis of data by creating a logical data warehouse. And with
BigQuery, you can set up your data warehouse in minutes and start querying
against huge amounts of data.
Cloud Dataflow
is a unified programming model and managed service from Google Cloud Platform
using Apache Beam SDK. Apache Beam SDK supports powerful operations that
resemble MapReduce operations, powerful data windowing and verifying
correctness control against streaming or batch data. It's used for a wide range
of data processing patterns, including against streaming and batch computations
and analytics as well as extract, transform, load operations. [or ETL.] Since it's fully managed, it
lets you focus on operational tasks like capacity planning, resource
management, and performance optimization.
Cloud Dataproc
is a fully managed and fast cloud service that is used to run Apache Spark and
Hadoop clusters. You can take advantage of Apache big data ecosystem using
tools, libraries, and documentation for Spark, Hive, Hadoop, and even Pig.
Features include the fact that it's fully managed, and that means that [automated cluster management.] you've
got a managed deployment, logging, as well as monitoring. This means an
organization can focus on the data not the cluster, and clusters are scalable,
speedy, and robust.
With Cloud
Dataproc, clusters can also utilize Google Cloud Platform's flexible virtual
machine infrastructure, including custom machine types, as well as preemptible
virtual machines. So this provides for perfect sizing and scaling. Since it's
on Google Cloud Platform, Cloud Dataproc integrates with several other Cloud
Platform services like Cloud Storage, BigQuery, BigTable, Stackdriver Logging
and Monitoring. And this results in a comprehensive powerful data platform.
Versioning lets you switch versions of big data tools like Spark, Hadoop, as
well as others. And you can operate clusters with multiple master nodes and set
jobs to restart on failure, ensuring high availability.
Google's Cloud
SQL is a fully managed database service that simplifies the creation,
maintenance, management, and administration of relational databases on Cloud
Platform. Cloud SQL works with MySQL or PostgreSQL databases. Cloud SQL offers
fully managed MySQL Community Edition database instances in the cloud, and
these are available in the US, EU, or Asia. Cloud SQL supports both first and
second generation MySQL instances. And data encryption is provided on Google's
internal networks, as well as for databases, temporary files, and backups. You
can use the Cloud Platform Console to create and manage instances. The service
also supports instance cloning.
Cloud SQL for MySQL
also supports secure external connections using Cloud SQL Proxy or SSL. It also
provides automatic failover for data replication between multiple zones. And
you can import and export databases either with mysqldump or you can import and
export CSV files. Cloud SQL for MySQL offers on-demand back ups and automated
point-in-time recovery, as well as Stackdriver integration for logging and
monitoring.
Cloud SQL for
PostgreSQL is a Beta service from Google supporting PostgreSQL 9.6 database
instances in the cloud, and these, again, are available in the US, EU, or Asia.
It supports custom machine types and up to 416 gigs of RAM and 32 CPUs as well
as up to 10 terabytes of storage, and that can also be increased if required.
Similar to Cloud SQL for MySQL, you can use Cloud Platform Console to create
and manage instances. And data encryption is provided on Google's internal
networks, and for databases, temporary files, and backups.
Cloud SQL for
PostgreSQL supports secure external connections using the Cloud SQL Proxy or
SSL. You can use SQL dump to import and export databases. And Cloud SQL offers
PostgreSQL client-server protocol and standard PostgreSQL connectors support.
Cloud SQL for PostgreSQL offers on-demand and automated backups, as well as
Stackdriver integration for logging and monitoring.
Creating a MySQL Database with Cloud SQL
I'm logged into my Google Cloud Platform
account. I'm going to click on burger menu and I'm going to scroll down.
And I'll click on SQL under Storage, so here I am on the Cloud SQL page, and
I'm going to click Create Instance. [
Choose a database engine - MySQL Version 5.6 or 5.7
or PostgreSQL BETA Version 9.6.] I'm going to leave MySQL selected,
and I'll click Next. [In the next page,
there are two types of Cloud SQL MySQL instances. There is Learn more
hyperlinked text and: MySQL Second Generation (Recommended) and MySQL First
Generation (Legacy)] And I'm going to click Choose Second
Generation, [In the Create a MySQL Second
Generation instance page, there is an Instance ID field, Root password field,
or a checkbox for No password, Location: Region, and Zone dropdowns and a
Create button and an option to Show configuration options.] and now
we'll enter the instance information. So we'll call this annmj. [
You can
leave the rest of the configuration at the defaults. But you can also click to
show more configuration options. And you can drill right down into labels,
maintenance schedule, database flags, authorize networks, and so on. But we'll
hide those configuration options, we don't need those. And we'll click on
Create. Now it will return us to the Instances page, and you'll see now that
it's initializing the instance. Okay, so our instance has now initialized
and started. And we can connect to it using the MySQL client in Cloud Shell.
We have
two choices. We can either start or activate a Cloud Shell manually. [# you can either manually activate Google Cloud
Shell by clicking # the icon in the upper right corner of the 'tool bar'
] And optionally set some default configurations. [# OPTIONAL: to set any defaults use 'getcloud config
set' gcloud config set project gcde-2019-197823 gcloud config set compute/zone
us-central1-a] Or we can connect to it using the Instance details
page.
To do
that, click on the instance, and on the instance details page, scroll
down. And we'll click Connect using Cloud Shell. [This is under the Connect to this instance tile which displays the
instance IPv4 address and the Instance connection name. CloudShell displays at
the bottom of the screen.]
Okay, so
the connection string was populated in Cloud Shell automatically. so, we'll just press Enter to connect as
root. [The message displays: Whitelisting
your IP for incoming connection for 5 minutes.] And this is where
we're at, we're going to enter the root password. Now you just have to wait a
couple of minutes until it's done white listing the IP for this connection. And
you saw that notification saying done. So it made a modification to the instance,
white listing the IP for this connection, and now we enter the password. So
click into Shell, and enter the password that you used. And press Enter. [When he enters the password, a message displays:
Welcome to the MariaDB monitor. Commands end with ;
or /g.] So now we're at the MySQL prompt. So, first what we'll do
is we'll create a database called blog. So I'll highlight this command.
CREATE
DATABASE blog;
And we can
see that it was successful. Now, we'll insert some sample blog data into our
new database. So first, what we have to do, so we have to specify to use blog.
Then we create the table blogs and it's got a couple of columns. Blogger name,
content, and an entryID, and that's the primary key,
Use
blog; CREATE TABLE blogs (bloggerName VARCHAR (255), content VARCHAR (255),
entryID INT NOT NULL AUTO_INCREMENT, PRIMARY KEY (entryID));
INSERT
INTO blogs (bloggerName, content) values ("Leicester", "this is
MY first blog");
INSERT
INTO blogs (bloggerName, content) values ("London", "this is MY
first blog");
INSERT
INTO blogs (bloggerName, content) values ("Scotland", "this is
MY first blog");
Okay, so
we should have some data. So let's type select * from blogs; don't forget
the semi-colon. Press Enter, and there you see is our data.
Now to
exit you just type exit, press Enter, and it's always a good idea to clean up
after yourself. So what I'm going to do is I'm going to close the Cloud Shell.
I'm going to go back to our Instance. Now we'll scroll up to the top of the
Instance details page. Click the ellipsis, and we'll select, Delete. Now we
have to type the instance name.
Creating a PostgreSQL Database with Cloud SQL
Okay, our PostgreSQL
instance has initialize and started. And now at this point, we can connect to
it using the PSQL Client in Cloud Shell. We
have a couple of options. We can either manually activate a Google Cloud Shell,
and we can optionally specify some configuration settings. Or we can connect
directly to it by clicking Connect using Cloud Shell from the Instance details
page. This is the easiest way, so let's go ahead and do this.
When you see your
instance name and mypsqlinstance --user=postgres --quiet click enter and enter
the password.
CREATE DATABASE
blog;
\connect blog; - Enter password
CREATE TABLE blogs
(bloggerName VARCHAR (255), content VARCHAR (255), entryID SERIAL PRIMARY KEY)
;
\d+ table_name to find
the information on columns of a table.
\d+ blogs
INSERT INTO blogs
(bloggername, content) values ('Joe', 'this is my first blog');
INSERT INTO blogs
(bloggername, content) values ('Wade', 'this is my first blog');
INSERT INTO blogs
(bloggername, content) values ('Bill', 'this is my first blog');
select * from
blogs;
Now to quit from the
PSQL prompt, just press \q, press Enter.
I was new to
PostgreSQL so visited below site for basics.
Subscribe to:
Posts (Atom)