SlideShare a Scribd company logo
Proprietary + Confidential
Google Cloud
Architect Design and
Process Workbook
Proprietary + Confidential
1a. Defining your case study
Come up with a case study. Then fill in the next slide.
Examples:
● Online Banking Portal
● Ride sharing application (like Uber)
● Online shopping site
● Something else...
Proprietary + Confidential
1b. [Case Study Name Here]
Brief description:
List a few main features:
List roles of typical users:
Proprietary + Confidential
2a. Writing user personas
Create two user personas that describe typical users of your application.
Add a new slide for each persona.
Example persona:
Jocelyn is a busy working mom who wants to access MegaCorp Bank to check her account balances
and make sure that there are enough funds to pay for her kids' music and sport lessons. She also uses
the web site to automate payment of bills and see her credit account balances. Jocelyn wants to save
time and money, and she wants a credit card that gives her cash back.
Proprietary + Confidential
2b. Writing user stories
Create three user stories for the roles you defined earlier.
Create a new slide for each user story.
Example user story:
Balance Inquiry
As a checking account holder, I want to check my available balance at any time of day, so that I am sure
not to overdraw my account.
Proprietary + Confidential
3. Defining SLIs and SLOs
User story SLO SLI
Balance Inquiry Available 99.95% Fraction of 200 vs 500 HTTP responses from
API endpoint measured per day
Balance Inquiry 95% of requests complete in under 300 ms Time to last byte GET requests measured
every 10 seconds aggregated per minute
Based on the requirements of your case study, fill in the table on the next slide with SLOs and SLIs
as shown in the example below.
Proprietary + Confidential
3. Defining SLIs and SLOs
Based on the requirements of your case study, fill in the table below with SLOs and SLIs.
User story SLO SLI
Proprietary + Confidential
Web
UI
Mobile
UI
Auth
Service
Products
Service
Accounts
Service
Analytics
Service
Customer
Service Reporting
Service
Customer
Database
Accounts
Database
Data
Warehouse
4. Design microservices for your application
Draw a diagram on the next slide showing your application's microservices and their connections.
Below is an example.
Proprietary + Confidential
4. Design microservices for your application
Draw a diagram showing your application's microservices and their connections.
Proprietary + Confidential
5. Designing REST APIs
Service name Collections Methods
Account Service transactions list
deposit
withdraw
transfer
Fill in the table on the next slide with your services and their resources and operations as shown in
the example below.
Proprietary + Confidential
5. Designing REST APIs
Service name Collections Methods
Fill in the table with your services and their resources and operations.
Proprietary + Confidential
6. Defining storage characteristics
Service
Structured or
Unstructured
SQL or NoSQL
Strong or
Eventual
Consistency
Amount of
Data (MB, GB,
TB, PB, ExB)
Read only or
Read/Write
Account Service Structured SQL Strong GB Read/Write
On the next slide fill in the required storage features. Below is an example.
Proprietary + Confidential
6. Defining storage characteristics
Service
Structured or
Unstructured
SQL or NoSQL
Strong or
Eventual
Consistency
Amount of
Data (MB, GB,
TB, PB, ExB)
Read only or
Read/Write
Fill in the required storage features.
Proprietary + Confidential
7. Choosing Google Cloud Storage and Data Services
Service
Persistent
Disk
Cloud
Storage
Cloud
SQL
Firestore Cloud
Bigtable
Cloud
Spanner
BigQuery
Account
Service
X
On the next slide choose the Google Cloud storage products for each service.
Below is an example.
Proprietary + Confidential
7. Choosing Google Cloud Storage and Data Services
Choose the Google Cloud storage products for each service.
Service
Persistent
Disk
Cloud
Storage
Cloud
SQL
Firestore Cloud
Bigtable
Cloud
Spanner
BigQuery
Proprietary + Confidential
8a. Defining network characteristics for your services
Service
Internet facing
or Internal only
HTTP TCP UDP Multiregional?
Account Internal only X No
On the next slide fill in the required network features. Below is an example.
Proprietary + Confidential
8a. Defining network characteristics for your services
Service
Internet facing
or Internal only
HTTP TCP UDP Multi-Regional?
Fill in the required network features.
Proprietary + Confidential
8b. Select the load balancers for your services
Service
HTTP TCP UDP
Account X
On the next slide choose the Google Cloud load balancer product(s) for each service.
Below is an example.
Proprietary + Confidential
8b. Select the load balancers for your services
Service
HTTP TCP UDP
Choose the Google Cloud load balancer product(s) for each service.
Proprietary + Confidential
9. Diagramming your network
Auth
Service
UI
Products
Service
HTTPS
Global HTTP
Load Balancer
Products
Database
Customer
Service
Customer
Database
Accounts
Service
Accounts
Database
Third-Party VPC
On the next slide draw a diagram that depicts how your services will communicate over the network.
Include regions, zones, load balancers, CDN, and DNS if applicable. Below is an example.
Proprietary + Confidential
9. Diagramming your network
Draw a diagram that depicts how your services will communicate over the network. Include regions,
zones, load balancers, CDN, and DNS if applicable.
Proprietary + Confidential
10. Designing reliable, scalable applications
us-east-1
us-central1
UI
us-central1-a
UI
us-central1-b
us-central1-a
Orders
Service
Inventory
Service
us-central1-b
TCP Load
Balancer
us-central-1
Analytics
Service
Even if some service is down, we want the web frontend of our application to be available nearly all the
time. We also want the website to be fast with very low latency to users all over the world. On the next
slide, draw a diagram that depicts how we can achieve this using Google Cloud services. Below is an
example.
HTTPS
HTTP Global
Load Balancer
Cloud
SQL
Firestore
BigQuery
Inventory
Service
Failover
Orders
Service
Multi-regional Cloud Storage bucket for backups
Proprietary + Confidential
10. Designing reliable, scalable applications
Even if some service is down, we want the web frontend of our application to be available nearly all the
time. We also want the website to be fast with very low latency to users all over the world. Draw a
diagram that depicts how we can achieve this using Google Cloud services.
Proprietary + Confidential
11a. Disaster recovery scenario
You've deployed for high availability by replicating resources in multiple zones. However, to meet
regulatory requirements, you need a plan to recover from a disaster that brings down the entire region.
The current architecture is depicted below. On the next slide, create a plan to bring up your application
in another region if your main region is down. Below is an example.
us-central1-a
Orders
Service
Inventory
Service
us-central1-b
TCP Load
Balancer
us-central-1
Analytics
Service
Cloud
SQL
Firestore
BigQuery
Products
Service
Failover
Accounts
Service
Proprietary + Confidential
11a. Disaster recovery scenario
You've deployed for high availability by replicating resources in multiple zones. However, to meet
regulatory requirements, you need a plan to recover from a disaster that brings down the entire region.
The current architecture is depicted on the previous slide. Create a plan to bring up your application in
another region if your main region is down.
Proprietary + Confidential
11b. Service disaster recovery scenarios
Service Scenario
Recovery Point
Objective
Recovery Time
Objective
Priority
Ratings Service Programmer deleted
all ratings
accidentally
24 hours 1 hour Med
Orders Service Orders database
crashes
0 (can’t lose any
data)
2 minutes High
Write a high-level list of possible scenarios on the next slide. Below is an example.
Proprietary + Confidential
11b. Service disaster recovery scenarios
Service Scenario
Recovery Point
Objective
Recovery Time
Objective
Priority
Write a high-level list of possible scenarios.
Proprietary + Confidential
11c. Resource disaster recovery plans
Resource Backup Strategy Backup Location Recovery Procedure
Ratings Database Daily automated backups Multi-Regional Cloud
Storage Bucket
Run Restore Script
Orders Database Failover replica plus daily
backups
Multi-zone deployment Automated
For each scenario, fill in the table on the next slide. Below is an example.
Proprietary + Confidential
11c. Resource disaster recovery plans
Resource Backup Strategy Backup Location Recovery Procedure
For each scenario, fill in the table.
Proprietary + Confidential
12. Modeling secure Google Cloud services
Draw a diagram on the next slide that depicts how you will secure your services. Include firewalls, IAM
roles, service accounts and network resources as appropriate. Below is an example.
HTTPS
Firewall Rules:
Allow HTTPS from 0.0.0.0/0
Allow SSH from known sources
Subnets:
us-central1
us-east1
Custom VPC
Google Cloud Armor Block
denied IPs
HTTP
Global Load Balancer
Proprietary + Confidential
12. Modeling secure Google Cloud services
Draw a diagram that depicts how you will secure your services. Include firewalls, IAM roles, service
accounts and network resources as appropriate.
Proprietary + Confidential
13. Cost estimating and planning
Service name Google Cloud Resource Cost
Accounts Cloud SQL $574.71/month
Use the pricing calculator to determine and record on the next slide the cost of your microservices.
Below is an example.
Proprietary + Confidential
13. Cost estimating and planning
Service name Google Cloud Resource Cost
Use the pricing calculator to determine and record the cost of your microservices.
GCP-design.pptx

More Related Content

Similar to GCP-design.pptx

Simplifying Microsoft Architectures with AWS Services
Simplifying Microsoft Architectures with AWS ServicesSimplifying Microsoft Architectures with AWS Services
Simplifying Microsoft Architectures with AWS Services
AWS Summits
 
Understanding The Azure Platform March 2010
Understanding The Azure Platform   March 2010Understanding The Azure Platform   March 2010
Understanding The Azure Platform March 2010
DavidGristwood
 
Breaking the Monolith road to containers.pdf
Breaking the Monolith road to containers.pdfBreaking the Monolith road to containers.pdf
Breaking the Monolith road to containers.pdf
Amazon Web Services
 
Technology Overview
Technology OverviewTechnology Overview
Technology Overview
Liran Zelkha
 
Comparison of Cloud Computing Services | Torry Harris Whitepaper
Comparison of Cloud Computing Services | Torry Harris WhitepaperComparison of Cloud Computing Services | Torry Harris Whitepaper
Comparison of Cloud Computing Services | Torry Harris Whitepaper
Torry Harris Business Solutions
 
1. Google Cloud Platform Load BalancingIntroductionGoog.docx
1. Google Cloud Platform Load BalancingIntroductionGoog.docx1. Google Cloud Platform Load BalancingIntroductionGoog.docx
1. Google Cloud Platform Load BalancingIntroductionGoog.docx
blondellchancy
 
Breaking the Monolith road to containers.pdf
Breaking the Monolith road to containers.pdfBreaking the Monolith road to containers.pdf
Breaking the Monolith road to containers.pdf
Amazon Web Services
 
Privacy Issues of Cloud Computing in the Federal Sector
Privacy Issues of Cloud Computing in the Federal SectorPrivacy Issues of Cloud Computing in the Federal Sector
Privacy Issues of Cloud Computing in the Federal Sector
Lew Oleinick
 
Modern-Application-Design-with-Amazon-ECS
Modern-Application-Design-with-Amazon-ECSModern-Application-Design-with-Amazon-ECS
Modern-Application-Design-with-Amazon-ECS
Amazon Web Services
 
Serverless Apps on AWS
Serverless Apps on AWS Serverless Apps on AWS
Serverless Apps on AWS
Amazon Web Services
 
Serverless Applications on AWS
Serverless Applications on AWSServerless Applications on AWS
Serverless Applications on AWS
Dean Bryen
 
Progetta, crea e gestisci Modern Application per web e mobile su AWS
Progetta, crea e gestisci Modern Application per web e mobile su AWSProgetta, crea e gestisci Modern Application per web e mobile su AWS
Progetta, crea e gestisci Modern Application per web e mobile su AWS
Amazon Web Services
 
Google Cloud Next '22 Recap: Serverless & Data edition
Google Cloud Next '22 Recap: Serverless & Data editionGoogle Cloud Next '22 Recap: Serverless & Data edition
Google Cloud Next '22 Recap: Serverless & Data edition
Daniel Zivkovic
 
Introduction to Cloud Computing (New)
Introduction to Cloud Computing (New)Introduction to Cloud Computing (New)
Introduction to Cloud Computing (New)Chathuranga Bandara
 
Cloud computing infrastructure
Cloud computing infrastructureCloud computing infrastructure
Cloud computing infrastructuresinhhn
 
Self service cloud resources
Self service cloud resourcesSelf service cloud resources
Self service cloud resources
Appvia
 
AWS RoadShow Manchester Part 3 - Getting Started with AWS
AWS RoadShow Manchester Part 3 - Getting Started with AWSAWS RoadShow Manchester Part 3 - Getting Started with AWS
AWS RoadShow Manchester Part 3 - Getting Started with AWS
Ian Massingham
 
AWS RoadShow Bristol - Part 2 Getting Started with AWS
AWS RoadShow Bristol - Part 2 Getting Started with AWSAWS RoadShow Bristol - Part 2 Getting Started with AWS
AWS RoadShow Bristol - Part 2 Getting Started with AWS
Ian Massingham
 
AWS RoadShow Dublin - Part 3 Getting Started with AWS
AWS RoadShow Dublin - Part 3 Getting Started with AWSAWS RoadShow Dublin - Part 3 Getting Started with AWS
AWS RoadShow Dublin - Part 3 Getting Started with AWS
Ian Massingham
 

Similar to GCP-design.pptx (20)

Simplifying Microsoft Architectures with AWS Services
Simplifying Microsoft Architectures with AWS ServicesSimplifying Microsoft Architectures with AWS Services
Simplifying Microsoft Architectures with AWS Services
 
Understanding The Azure Platform March 2010
Understanding The Azure Platform   March 2010Understanding The Azure Platform   March 2010
Understanding The Azure Platform March 2010
 
Breaking the Monolith road to containers.pdf
Breaking the Monolith road to containers.pdfBreaking the Monolith road to containers.pdf
Breaking the Monolith road to containers.pdf
 
Technology Overview
Technology OverviewTechnology Overview
Technology Overview
 
Comparison of Cloud Computing Services | Torry Harris Whitepaper
Comparison of Cloud Computing Services | Torry Harris WhitepaperComparison of Cloud Computing Services | Torry Harris Whitepaper
Comparison of Cloud Computing Services | Torry Harris Whitepaper
 
1. Google Cloud Platform Load BalancingIntroductionGoog.docx
1. Google Cloud Platform Load BalancingIntroductionGoog.docx1. Google Cloud Platform Load BalancingIntroductionGoog.docx
1. Google Cloud Platform Load BalancingIntroductionGoog.docx
 
Breaking the Monolith road to containers.pdf
Breaking the Monolith road to containers.pdfBreaking the Monolith road to containers.pdf
Breaking the Monolith road to containers.pdf
 
Privacy Issues of Cloud Computing in the Federal Sector
Privacy Issues of Cloud Computing in the Federal SectorPrivacy Issues of Cloud Computing in the Federal Sector
Privacy Issues of Cloud Computing in the Federal Sector
 
Modern-Application-Design-with-Amazon-ECS
Modern-Application-Design-with-Amazon-ECSModern-Application-Design-with-Amazon-ECS
Modern-Application-Design-with-Amazon-ECS
 
Serverless Apps on AWS
Serverless Apps on AWS Serverless Apps on AWS
Serverless Apps on AWS
 
Serverless Applications on AWS
Serverless Applications on AWSServerless Applications on AWS
Serverless Applications on AWS
 
Progetta, crea e gestisci Modern Application per web e mobile su AWS
Progetta, crea e gestisci Modern Application per web e mobile su AWSProgetta, crea e gestisci Modern Application per web e mobile su AWS
Progetta, crea e gestisci Modern Application per web e mobile su AWS
 
Google Cloud Next '22 Recap: Serverless & Data edition
Google Cloud Next '22 Recap: Serverless & Data editionGoogle Cloud Next '22 Recap: Serverless & Data edition
Google Cloud Next '22 Recap: Serverless & Data edition
 
Introduction to Cloud Computing (New)
Introduction to Cloud Computing (New)Introduction to Cloud Computing (New)
Introduction to Cloud Computing (New)
 
Colloquium Report
Colloquium ReportColloquium Report
Colloquium Report
 
Cloud computing infrastructure
Cloud computing infrastructureCloud computing infrastructure
Cloud computing infrastructure
 
Self service cloud resources
Self service cloud resourcesSelf service cloud resources
Self service cloud resources
 
AWS RoadShow Manchester Part 3 - Getting Started with AWS
AWS RoadShow Manchester Part 3 - Getting Started with AWSAWS RoadShow Manchester Part 3 - Getting Started with AWS
AWS RoadShow Manchester Part 3 - Getting Started with AWS
 
AWS RoadShow Bristol - Part 2 Getting Started with AWS
AWS RoadShow Bristol - Part 2 Getting Started with AWSAWS RoadShow Bristol - Part 2 Getting Started with AWS
AWS RoadShow Bristol - Part 2 Getting Started with AWS
 
AWS RoadShow Dublin - Part 3 Getting Started with AWS
AWS RoadShow Dublin - Part 3 Getting Started with AWSAWS RoadShow Dublin - Part 3 Getting Started with AWS
AWS RoadShow Dublin - Part 3 Getting Started with AWS
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

GCP-design.pptx

  • 1. Proprietary + Confidential Google Cloud Architect Design and Process Workbook
  • 2. Proprietary + Confidential 1a. Defining your case study Come up with a case study. Then fill in the next slide. Examples: ● Online Banking Portal ● Ride sharing application (like Uber) ● Online shopping site ● Something else...
  • 3. Proprietary + Confidential 1b. [Case Study Name Here] Brief description: List a few main features: List roles of typical users:
  • 4. Proprietary + Confidential 2a. Writing user personas Create two user personas that describe typical users of your application. Add a new slide for each persona. Example persona: Jocelyn is a busy working mom who wants to access MegaCorp Bank to check her account balances and make sure that there are enough funds to pay for her kids' music and sport lessons. She also uses the web site to automate payment of bills and see her credit account balances. Jocelyn wants to save time and money, and she wants a credit card that gives her cash back.
  • 5. Proprietary + Confidential 2b. Writing user stories Create three user stories for the roles you defined earlier. Create a new slide for each user story. Example user story: Balance Inquiry As a checking account holder, I want to check my available balance at any time of day, so that I am sure not to overdraw my account.
  • 6. Proprietary + Confidential 3. Defining SLIs and SLOs User story SLO SLI Balance Inquiry Available 99.95% Fraction of 200 vs 500 HTTP responses from API endpoint measured per day Balance Inquiry 95% of requests complete in under 300 ms Time to last byte GET requests measured every 10 seconds aggregated per minute Based on the requirements of your case study, fill in the table on the next slide with SLOs and SLIs as shown in the example below.
  • 7. Proprietary + Confidential 3. Defining SLIs and SLOs Based on the requirements of your case study, fill in the table below with SLOs and SLIs. User story SLO SLI
  • 8. Proprietary + Confidential Web UI Mobile UI Auth Service Products Service Accounts Service Analytics Service Customer Service Reporting Service Customer Database Accounts Database Data Warehouse 4. Design microservices for your application Draw a diagram on the next slide showing your application's microservices and their connections. Below is an example.
  • 9. Proprietary + Confidential 4. Design microservices for your application Draw a diagram showing your application's microservices and their connections.
  • 10. Proprietary + Confidential 5. Designing REST APIs Service name Collections Methods Account Service transactions list deposit withdraw transfer Fill in the table on the next slide with your services and their resources and operations as shown in the example below.
  • 11. Proprietary + Confidential 5. Designing REST APIs Service name Collections Methods Fill in the table with your services and their resources and operations.
  • 12. Proprietary + Confidential 6. Defining storage characteristics Service Structured or Unstructured SQL or NoSQL Strong or Eventual Consistency Amount of Data (MB, GB, TB, PB, ExB) Read only or Read/Write Account Service Structured SQL Strong GB Read/Write On the next slide fill in the required storage features. Below is an example.
  • 13. Proprietary + Confidential 6. Defining storage characteristics Service Structured or Unstructured SQL or NoSQL Strong or Eventual Consistency Amount of Data (MB, GB, TB, PB, ExB) Read only or Read/Write Fill in the required storage features.
  • 14. Proprietary + Confidential 7. Choosing Google Cloud Storage and Data Services Service Persistent Disk Cloud Storage Cloud SQL Firestore Cloud Bigtable Cloud Spanner BigQuery Account Service X On the next slide choose the Google Cloud storage products for each service. Below is an example.
  • 15. Proprietary + Confidential 7. Choosing Google Cloud Storage and Data Services Choose the Google Cloud storage products for each service. Service Persistent Disk Cloud Storage Cloud SQL Firestore Cloud Bigtable Cloud Spanner BigQuery
  • 16. Proprietary + Confidential 8a. Defining network characteristics for your services Service Internet facing or Internal only HTTP TCP UDP Multiregional? Account Internal only X No On the next slide fill in the required network features. Below is an example.
  • 17. Proprietary + Confidential 8a. Defining network characteristics for your services Service Internet facing or Internal only HTTP TCP UDP Multi-Regional? Fill in the required network features.
  • 18. Proprietary + Confidential 8b. Select the load balancers for your services Service HTTP TCP UDP Account X On the next slide choose the Google Cloud load balancer product(s) for each service. Below is an example.
  • 19. Proprietary + Confidential 8b. Select the load balancers for your services Service HTTP TCP UDP Choose the Google Cloud load balancer product(s) for each service.
  • 20. Proprietary + Confidential 9. Diagramming your network Auth Service UI Products Service HTTPS Global HTTP Load Balancer Products Database Customer Service Customer Database Accounts Service Accounts Database Third-Party VPC On the next slide draw a diagram that depicts how your services will communicate over the network. Include regions, zones, load balancers, CDN, and DNS if applicable. Below is an example.
  • 21. Proprietary + Confidential 9. Diagramming your network Draw a diagram that depicts how your services will communicate over the network. Include regions, zones, load balancers, CDN, and DNS if applicable.
  • 22. Proprietary + Confidential 10. Designing reliable, scalable applications us-east-1 us-central1 UI us-central1-a UI us-central1-b us-central1-a Orders Service Inventory Service us-central1-b TCP Load Balancer us-central-1 Analytics Service Even if some service is down, we want the web frontend of our application to be available nearly all the time. We also want the website to be fast with very low latency to users all over the world. On the next slide, draw a diagram that depicts how we can achieve this using Google Cloud services. Below is an example. HTTPS HTTP Global Load Balancer Cloud SQL Firestore BigQuery Inventory Service Failover Orders Service Multi-regional Cloud Storage bucket for backups
  • 23. Proprietary + Confidential 10. Designing reliable, scalable applications Even if some service is down, we want the web frontend of our application to be available nearly all the time. We also want the website to be fast with very low latency to users all over the world. Draw a diagram that depicts how we can achieve this using Google Cloud services.
  • 24. Proprietary + Confidential 11a. Disaster recovery scenario You've deployed for high availability by replicating resources in multiple zones. However, to meet regulatory requirements, you need a plan to recover from a disaster that brings down the entire region. The current architecture is depicted below. On the next slide, create a plan to bring up your application in another region if your main region is down. Below is an example. us-central1-a Orders Service Inventory Service us-central1-b TCP Load Balancer us-central-1 Analytics Service Cloud SQL Firestore BigQuery Products Service Failover Accounts Service
  • 25. Proprietary + Confidential 11a. Disaster recovery scenario You've deployed for high availability by replicating resources in multiple zones. However, to meet regulatory requirements, you need a plan to recover from a disaster that brings down the entire region. The current architecture is depicted on the previous slide. Create a plan to bring up your application in another region if your main region is down.
  • 26. Proprietary + Confidential 11b. Service disaster recovery scenarios Service Scenario Recovery Point Objective Recovery Time Objective Priority Ratings Service Programmer deleted all ratings accidentally 24 hours 1 hour Med Orders Service Orders database crashes 0 (can’t lose any data) 2 minutes High Write a high-level list of possible scenarios on the next slide. Below is an example.
  • 27. Proprietary + Confidential 11b. Service disaster recovery scenarios Service Scenario Recovery Point Objective Recovery Time Objective Priority Write a high-level list of possible scenarios.
  • 28. Proprietary + Confidential 11c. Resource disaster recovery plans Resource Backup Strategy Backup Location Recovery Procedure Ratings Database Daily automated backups Multi-Regional Cloud Storage Bucket Run Restore Script Orders Database Failover replica plus daily backups Multi-zone deployment Automated For each scenario, fill in the table on the next slide. Below is an example.
  • 29. Proprietary + Confidential 11c. Resource disaster recovery plans Resource Backup Strategy Backup Location Recovery Procedure For each scenario, fill in the table.
  • 30. Proprietary + Confidential 12. Modeling secure Google Cloud services Draw a diagram on the next slide that depicts how you will secure your services. Include firewalls, IAM roles, service accounts and network resources as appropriate. Below is an example. HTTPS Firewall Rules: Allow HTTPS from 0.0.0.0/0 Allow SSH from known sources Subnets: us-central1 us-east1 Custom VPC Google Cloud Armor Block denied IPs HTTP Global Load Balancer
  • 31. Proprietary + Confidential 12. Modeling secure Google Cloud services Draw a diagram that depicts how you will secure your services. Include firewalls, IAM roles, service accounts and network resources as appropriate.
  • 32. Proprietary + Confidential 13. Cost estimating and planning Service name Google Cloud Resource Cost Accounts Cloud SQL $574.71/month Use the pricing calculator to determine and record on the next slide the cost of your microservices. Below is an example.
  • 33. Proprietary + Confidential 13. Cost estimating and planning Service name Google Cloud Resource Cost Use the pricing calculator to determine and record the cost of your microservices.