This document provides an overview of the Global Azure Bootcamp event and Azure platform services. It discusses Infrastructure Services, Platform Services, Domain Services, and Security & Management services available on Azure. It then summarizes Azure SQL Database service tiers and flavors including databases that can be scaled up/down or out/in depending on predictable or unpredictable workloads. The document concludes with a discussion of StorageWorkload benchmarks performed with Storage Spaces Direct and Scale-Out File Server on Azure, comparing performance of different drive types.
Presentation from the following session ; http://expertslive.nl/sessions/end-to-end-automation-what-happens-when-we-throw-arm-dsc-posh-into-a-blender-en/
"Wat voor een magisch efffect komt naar boven wanneer we Azure Resource Manager, Desired State Configuration & Powershell in een blender duwen? We zetten de stand op “DevOps” en nemen gelijk een kijkje naar wat dit marketing verhaaltje nu in praktijk zal betekenen voor een ITpro!"
22/11/2016
Azure Automation delivers cloud-based automation, operating system updates, and configuration service that supports consistent management across your Azure and non-Azure environments. It includes process automation, configuration management, update management, shared capabilities, and heterogeneous features.
Stephane Lapointe, Frank Boucher & Alexandre Brisebois: Les micro-services et...MSDEVMTL
16 Avril 2016
Groupe Azure
Sujet: Les micro-services et Azure Service Fabric
Conférenciers: Alexandre Brisebois, Microsoft, Stéphane Lapointe, Orckestra et Frank Boucher, Lixar IT
Nous vous proposons une journée complète sur les micro-services et Azure Service Fabric, le but étant d'appendre la théorie avec une série de présentations pour ensuite concrétiser le tout avec une partie pratique "hands-on" et des labs.
Pour participer, vous devrez obligatoirement apporter votre ordinateur portable, avoir installé Visual Studio 2015 Update 2 et Service Fabric SDK 2.0.135.
Presentation from the following session ; http://expertslive.nl/sessions/end-to-end-automation-what-happens-when-we-throw-arm-dsc-posh-into-a-blender-en/
"Wat voor een magisch efffect komt naar boven wanneer we Azure Resource Manager, Desired State Configuration & Powershell in een blender duwen? We zetten de stand op “DevOps” en nemen gelijk een kijkje naar wat dit marketing verhaaltje nu in praktijk zal betekenen voor een ITpro!"
22/11/2016
Azure Automation delivers cloud-based automation, operating system updates, and configuration service that supports consistent management across your Azure and non-Azure environments. It includes process automation, configuration management, update management, shared capabilities, and heterogeneous features.
Stephane Lapointe, Frank Boucher & Alexandre Brisebois: Les micro-services et...MSDEVMTL
16 Avril 2016
Groupe Azure
Sujet: Les micro-services et Azure Service Fabric
Conférenciers: Alexandre Brisebois, Microsoft, Stéphane Lapointe, Orckestra et Frank Boucher, Lixar IT
Nous vous proposons une journée complète sur les micro-services et Azure Service Fabric, le but étant d'appendre la théorie avec une série de présentations pour ensuite concrétiser le tout avec une partie pratique "hands-on" et des labs.
Pour participer, vous devrez obligatoirement apporter votre ordinateur portable, avoir installé Visual Studio 2015 Update 2 et Service Fabric SDK 2.0.135.
Global Azure Bootcamp 2018 - Azure Network SecurityScott Hoag
In this session, attendees will learn about the network control plane in Azure and how to secure both Infrastructure-as-a-Service and Platform-as-a-Service components of Azure.
With the GA release of Consul 1.6, HashiCorp Dev Advocate Nic Jackson demos several new features in this release, including Layer 7 controls and Mesh Gateways.
One of the biggest challenges in writing code that manages encrypted data is developing a secure model for obtaining keys and rotating them when an administrator leaves. AWS Key Management Service (KMS) changes the equation by offering key management as a service, enabling a number of security improvements over conventional key storage methods. Jon Todd will show how Okta uses the KMS API to secure a multi-region system serving thousands of customers. This talk is oriented toward developers looking to secure their applications and simplify key management.
This presentation was made as part of Container Conference 2018 : www.containerconf.in
"Typically enterprise applications are deployed as processes on Virtual Machines or as Containers. For example, applications can be deployed on Amazon EC2 instances or as Docker containers in on-premise Kubernetes cluster. Both the strategies have their own pros and cons. While VMs are portable and secure, they are also bulky and time consuming to bring up. Containers on the other hand are lightweight, portable and can be launched very quickly, but their security concerns remain.
Even though traditional containers (such as Docker) isolate the application process namespace from other containers, they share the host OS kernel. Considering the number of un-trusted applications that are run as containers, the entire host OS can be compromised. Even though the community has come up with a variety of tools for scanning vulnerabilities (such as Clair) and modules for enhancing the security (such as AppArmor & SELinux), the onus is on the administrator to use these tools and make the environment secure. In this presentation we explore Virtualized Containers, an evolving container technology which inherently provides security by design without compromising on speed and flexibility."
Terraform allows you to define your infrastructure as code. Variables and modules empower you to extend and reuse your Infrastructure as Code. With the Consul provider for Terraform, you can also let your Consul KV data drive your Terraform runs.
Building PCI Compliance Solution on AWS - Pop-up Loft Tel AvivAmazon Web Services
PCI-DSS is one of the most popular compliance regulations facing most customers on the cloud. In this session we will take a look at reference architecture that will provide you with guidelines and strategies to design a PCI compliant environment. By Lahav Savir, Emind CEO & Architect
ContainerDays NYC 2016: "Containers in Azure: Understanding the Microsoft Con...DynamicInfraDays
Slides from Rob Bagby's talk "Containers in Azure: Understanding the Microsoft Container Ecosystem" at ContainerDays NYC 2016: http://dynamicinfradays.org/events/2016-nyc/programme.html#azure
Automating Your Microsoft Azure Environment (DevLink 2014)Michael Collier
Discussion of various automation options available in the Microsoft Azure platform - Azure Automation, PowerShell, Azure Management Libraries, Azure Resource Manager, and Brewmaster.
- TeamSQL AWS Architecture
- VPC Introduction (Public, private subnets) and Demo
- EC2 Introduction and Demo
- RDS Introduction and Demo
- Introduction to Cloudformation
- A simple Cloudformation Script and make it live (Creating EC2 with Cloudformation)
- Deleting Cloudformation Stack
- More advanced Cloudformation Script and make it live
(Cloudformation parameters, VPC, public, private subnets, RDS, ElasticBeanstalk, ElastiCache)
- Updating Cloudformation Stack
- Hands on - Advanced Cloudformation Script
AWS vs. Azure vs. Google vs. SoftLayer: Network, Storage and DBaaSRightScale
Most enterprises have a multi-cloud strategy, but choosing the right cloud for a workload can be challenging. In a previous deck we covered differences in block/object storage, pricing, and container services. In this deck we’ll drill down on archival storage, database-as-a-service (DBaaS), and networking options for the leading public clouds.
MSDN - Converting an existing ASP.NET application to Windows AzureMaarten Balliauw
Put your stuff in the cloud! Windows Azure allows you to take advantage of cloud computing infranstructure for hosting, computing, and storage of your applications. In this demo filled session we take an existing ASP.Net Application and move it to be hosted in Windows Azure, while taking advantage of Windows Azure storage.
Dans cette session nous vous présenterons les différentes manières d'utiliser SQL Server dans une infrastructure Cloud (Microsoft Azure). Seront présentés des scénarios hybrides, de migration, de backup, et d'hébergement de bases de données SQL Server en mode IaaS ou PaaS.
Global Azure Bootcamp 2018 - Azure Network SecurityScott Hoag
In this session, attendees will learn about the network control plane in Azure and how to secure both Infrastructure-as-a-Service and Platform-as-a-Service components of Azure.
With the GA release of Consul 1.6, HashiCorp Dev Advocate Nic Jackson demos several new features in this release, including Layer 7 controls and Mesh Gateways.
One of the biggest challenges in writing code that manages encrypted data is developing a secure model for obtaining keys and rotating them when an administrator leaves. AWS Key Management Service (KMS) changes the equation by offering key management as a service, enabling a number of security improvements over conventional key storage methods. Jon Todd will show how Okta uses the KMS API to secure a multi-region system serving thousands of customers. This talk is oriented toward developers looking to secure their applications and simplify key management.
This presentation was made as part of Container Conference 2018 : www.containerconf.in
"Typically enterprise applications are deployed as processes on Virtual Machines or as Containers. For example, applications can be deployed on Amazon EC2 instances or as Docker containers in on-premise Kubernetes cluster. Both the strategies have their own pros and cons. While VMs are portable and secure, they are also bulky and time consuming to bring up. Containers on the other hand are lightweight, portable and can be launched very quickly, but their security concerns remain.
Even though traditional containers (such as Docker) isolate the application process namespace from other containers, they share the host OS kernel. Considering the number of un-trusted applications that are run as containers, the entire host OS can be compromised. Even though the community has come up with a variety of tools for scanning vulnerabilities (such as Clair) and modules for enhancing the security (such as AppArmor & SELinux), the onus is on the administrator to use these tools and make the environment secure. In this presentation we explore Virtualized Containers, an evolving container technology which inherently provides security by design without compromising on speed and flexibility."
Terraform allows you to define your infrastructure as code. Variables and modules empower you to extend and reuse your Infrastructure as Code. With the Consul provider for Terraform, you can also let your Consul KV data drive your Terraform runs.
Building PCI Compliance Solution on AWS - Pop-up Loft Tel AvivAmazon Web Services
PCI-DSS is one of the most popular compliance regulations facing most customers on the cloud. In this session we will take a look at reference architecture that will provide you with guidelines and strategies to design a PCI compliant environment. By Lahav Savir, Emind CEO & Architect
ContainerDays NYC 2016: "Containers in Azure: Understanding the Microsoft Con...DynamicInfraDays
Slides from Rob Bagby's talk "Containers in Azure: Understanding the Microsoft Container Ecosystem" at ContainerDays NYC 2016: http://dynamicinfradays.org/events/2016-nyc/programme.html#azure
Automating Your Microsoft Azure Environment (DevLink 2014)Michael Collier
Discussion of various automation options available in the Microsoft Azure platform - Azure Automation, PowerShell, Azure Management Libraries, Azure Resource Manager, and Brewmaster.
- TeamSQL AWS Architecture
- VPC Introduction (Public, private subnets) and Demo
- EC2 Introduction and Demo
- RDS Introduction and Demo
- Introduction to Cloudformation
- A simple Cloudformation Script and make it live (Creating EC2 with Cloudformation)
- Deleting Cloudformation Stack
- More advanced Cloudformation Script and make it live
(Cloudformation parameters, VPC, public, private subnets, RDS, ElasticBeanstalk, ElastiCache)
- Updating Cloudformation Stack
- Hands on - Advanced Cloudformation Script
AWS vs. Azure vs. Google vs. SoftLayer: Network, Storage and DBaaSRightScale
Most enterprises have a multi-cloud strategy, but choosing the right cloud for a workload can be challenging. In a previous deck we covered differences in block/object storage, pricing, and container services. In this deck we’ll drill down on archival storage, database-as-a-service (DBaaS), and networking options for the leading public clouds.
MSDN - Converting an existing ASP.NET application to Windows AzureMaarten Balliauw
Put your stuff in the cloud! Windows Azure allows you to take advantage of cloud computing infranstructure for hosting, computing, and storage of your applications. In this demo filled session we take an existing ASP.Net Application and move it to be hosted in Windows Azure, while taking advantage of Windows Azure storage.
Dans cette session nous vous présenterons les différentes manières d'utiliser SQL Server dans une infrastructure Cloud (Microsoft Azure). Seront présentés des scénarios hybrides, de migration, de backup, et d'hébergement de bases de données SQL Server en mode IaaS ou PaaS.
The Most Trusted In-Memory database in the world- AltibaseAltibase
Life is a database. How you manage data defines business. ALTIBASE HDB with its Hybrid architecture combines the extreme speed of an In-Memory Database with the storage capacity of an On-Disk Database’ in a single unified engine.
ALTIBASE® HDB™ is the only Hybrid DBMS in the industry that combines an in-memory DBMS with an on-disk DBMS, with a single uniform interface, enabling real-time access to large volumes of data, while simplifying and revolutionizing data processing. ALTIBASE XDB is the world’s fastest in-memory DBMS, featuring unprecedented high performance, and supports SQL-99 standard for wide applicability.
Altibase is provider of In-Memory data solutions for real-time access, analysis and distribution of high volumes of data in mission-critical environments.
Please visit our website (www.altibase.com) to learn more about our products and read more about our case studies. Or contact us at info@altibase.com. We look forward to helping you!
A preview into SQL Server 2019 from Bob, Asad and my presentation at PASS Summit 2018 (Nov '18). We provided insights into what our public preview builds for SQL Server 2019 had in November.
In this presentation we introduce the basic concepts around SQL Server Azure: the database in the cloud.
Regards,
Ing. Eduardo Castro, PhD
http://ecastrom.blogspot.com
http://comunidadwindows.org
Microsoft Azure zmienia się. Jego częśc poświęcona bazie danych (Windows Azure SQL Database) zmienia się jeszcze szybciej. Podczas tej sesji chciałbym pokazac tym, którzy nie widzieli, oraz przypomniec tym, którzy już coś wiedzą - o co chodzi z WASD, jakie zmiany nastapiły i czego możemy po tej bazie oczekiwać. Dla odważnych będzie okazja podłączenia się do konta w chmurze i przetestowania ych rozwiązań samemu.
Building Analytic Apps for SaaS: “Analytics as a Service”Amazon Web Services
TIBCO Jaspersoft® for AWS is a business intelligence suite that helps you deliver stunning interactive reports and dashboards inside your app that make it easy for your customers to get answers. Purpose-built for AWS, our reporting and analytics server quickly and easily connects to Amazon Relational Database Service (RDS), Amazon Redshift, and Amazon EMR. It includes ad-hoc reporting, dashboards, data analysis, data visualization, and data blending. In less than 10 minutes, you can be analyzing and reporting on your data. You get a full Cloud BI server starting at less than $1/hour, with no user or data limits and no additional fees.
This webinar deck shows how embeddable analytics with TIBCO Jaspersoft for AWS gives you the power to create the experience your end users demand and how to scale and manage that experience across your customer base with AWS.
Consolidation, cloud privé, cloud public, SQL As A Service etc. sont autant de scénarios de virtualisation possibles avec SQL Server. Cette session reposera les règles de bon usage de ce type de déploiement et les scénarios clés. Nous reviendrons sur quelques-unes des « Lessons learned from Azure ».
Consolidation, cloud privé, cloud public, SQL As A Service etc. sont autant de scénarios de virtualisation possibles avec SQL Server. Cette session reposera les règles de bon usage de ce type de déploiement et les scénarios clés. Nous reviendrons sur quelques-unes des « Lessons learned from Azure ».
Ralph Kemperdick – IT-Tage 2015 – Microsoft Azure als DatenplattformInformatik Aktuell
In dieser Session möchten wir eine Orientierung geben, welche Daten-Services auf Azure die geeignete Plattform für eine App bzw. eine Anwendung sein können. Die Session konzentriert sich auf die Platform as a Service (PaaS) mit einem SQL Interface. Es wird Azure SQL Server, Azure SQL DW, DocumentDB, Stream Analytics, Spark/Scala/Hive und Data Lake Analytics betrachtet und Unterschiede herausgearbeitet. Live Demos begleiten die einzelnen Themen in der Session. Ferner werden Argumente für und gegen Cloud basierte Services diskutiert.
The new Microsoft Azure SQL Data Warehouse (SQL DW) is an elastic data warehouse-as-a-service and is a Massively Parallel Processing (MPP) solution for "big data" with true enterprise class features. The SQL DW service is built for data warehouse workloads from a few hundred gigabytes to petabytes of data with truly unique features like disaggregated compute and storage allowing for customers to be able to utilize the service to match their needs. In this presentation, we take an in-depth look at implementing a SQL DW, elastic scale (grow, shrink, and pause), and hybrid data clouds with Hadoop integration via Polybase allowing for a true SQL experience across structured and unstructured data.
Similar to Global Azure Bootcamp 2017 - Why I love S2D for MSSQL on Azure (20)
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Karim Vaes
https://www.xylos.com/en/corporate/events/explore-new-digital-ways
Public cloud and security go hand in hand, if you approach it properly
The cloud is already being well used, but lots of organisations still have questions about its security. Is data protection in the cloud really optimal, or is this uncertainty justified? In this breakout session we look at the main concerns we hear from our customers. Can we build a perimeter around cloud applications? Which sectors or scenarios are not suitable for the cloud, and where in particular is it recommended? How do I get to grips with ‘shadow IT’? Do I have to manage things myself in the cloud? Does the public cloud satisfy the strictest security requirements? And what's the most secure authentication? Data protection isn't just limited to firewalls or intrusion systems, after all. The key lies in having a comprehensive security policy, and in this session we zoom in on the major components and challenges.
Speaker: Karim Vaes, Solution Architect, Xylos
The IT Crowd stance on writing advice documentsKarim Vaes
Writing advice documents isn't always easy for technical persons like Moss. This storyline presentation gives some pointers on how writing an effective advice document.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
5. Platform Services
Infrastructure Services
Web
Apps
Mobile
Apps
API
Apps
Notification
Hubs
Hybrid
Cloud
Backup
StorSimple
Azure Site
Recovery
Import/Export
SQL
Database DocumentDB
Redis
Cache
Azure
Search
Storage
Tables
SQL Data
Warehouse
Azure AD
Health Monitoring
AD Privileged
Identity
Management
Operational
Analytics
Cloud
Services
Batch
RemoteApp
Service
Fabric
Visual Studio
Application
Insights
VS Team Services
Domain Services
HDInsight Machine
Learning Stream Analytics
Data
Factory
Event
Hubs
Data Lake
Analytics Service
IoT Hub
Data
Catalog
Security &
Management
Azure Active
Directory
Multi-Factor
Authentication
Automation
Portal
Key Vault
Store/
Marketplace
VM Image Gallery
& VM Depot
Azure AD
B2C
Scheduler
Xamarin
HockeyApp
Power BI
Embedded
SQL Server
Stretch Database
Mobile
Engagement
Functions
Cognitive Services Bot Framework Cortana
Security Center
Container
Service
VM
Scale Sets
Data Lake Store
Dev/Test Lab
BizTalk
Services
Service Bus
Logic
Apps
API
Management
Content
Delivery
Network
Media
Services
Media
Analytics
6. Data platform continuum
Hybrid Cloud
On premises
Shared
Lower cost
Dedicated
Higher cost
Higher administration Lower administration
Off premises
7. Azure SQL Database
5 10 20 50 100 125 250 500 1,000 1,750
Database transaction units
Scale up or demand for more or less peformance
Basic Standard Premium
8. Azure SQL Database service tiers (single DB model)
Built For
Available SLA
Max Storage
Business Continuity
Security
Performance Objectives
Database Transaction
Units (DTUs)
Available Tiers
($/Month) and GA Price
Point-in-time Restore
(“oops” Recovery)
BASIC PREMIUMSTANDARD
P1S0
Light transactional
workloads
Medium transactional workloads Heavy Transactional Workloads
99.99%
2 GB 250 GB 500 GB
Any point within 7 days Any point within 14 days Any point within 35 days
Geo-restore, Active geo-replication, up to four readable
secondary backups
Always Encrypted, Transparent Data Encryption, Azure Active Directory authentication,
Auditing, row-level security, dynamic data masking
Transactions per hour Transactions per minute Transactions per second
5
$4.99
S1 S2 S3 P2 P4 P6 P11
10 20 50 100
$15 $30 $75 $150
125 250 500 1,000 1,750
$465 $930 $1,860 $3,720 $7,001
4 TB
P15
4,000
$16,003
9. Predictable workloads
Single databases or partitioned data across multiple
databases; scale between service tiers and
performance levels as capacity needs fluctuate.
Scaledatabases
upasneeded
Scale out/in the pool
…
Single database or
partitioned databases
Customer
1
Customer
2
Customer
3 Customer
#N…
Unpredictable workloads
For large numbers of databases with unpredictable
performance demands; pool resources to be shared
between these databases.
Elastic Database Pool
Databasesconsume
resourcesasneeded
Azure SQL Database Flavours
26. Storage
Subsystem
2x DS1 with each 2x P20 : https://storage.kvaes.be/system/results/kvaessql01/1485791722/
2x DS2 with each 2x P20 : https://storage.kvaes.be/system/results/kvaessql01/1485872445/
2x DS3 with each 2x P20 : https://storage.kvaes.be/system/results/kvaessql01/1485886929/
2x DS4 with each 2x P20 : https://storage.kvaes.be/system/results/kvaessql01/1485895557/
0 5000 10000 15000 20000 25000 30000 35000
Large IO - Read - iops
Small IO - Write - iops
Small IO - Read - iops
Large IO - Write - iops
Large IO - Read - iops Small IO - Write - iops Small IO - Read - iops Large IO - Write - iops
DS4 510 4630 30185 510
DS3 255 4632 15682 255
DS2 120 3000 6232 127
DS1 63 3200 4077 63
IO per Second
DS4 DS3 DS2 DS1
27. Storage
Subsystem
2x DS1 with each 2x P20 : https://storage.kvaes.be/system/results/kvaessql01/1485791722/
2x DS2 with each 2x P20 : https://storage.kvaes.be/system/results/kvaessql01/1485872445/
2x DS3 with each 2x P20 : https://storage.kvaes.be/system/results/kvaessql01/1485886929/
2x DS4 with each 2x P20 : https://storage.kvaes.be/system/results/kvaessql01/1485895557/
0 50 100 150 200 250 300
Large IO - Read - MB/s
Small IO - Write - MB/s
Small IO - Read - MB/s
Large IO - Write - MB/s
Large IO - Read - MB/s Small IO - Write - MB/s Small IO - Read - MB/s Large IO - Write - MB/s
DS4 255 36 247 251
DS3 130 45 124 127
DS2 54 20 49 63
DS1 30 25 31 32
MB per Second
DS4 DS3 DS2 DS1
28. Workload
Go for industry benchmarks… Like TPC
The TPC Benchmark™H (TPC-H) is a decision support benchmark. It consists of
a suite of business oriented ad-hoc queries and concurrent data modifications.
The queries and the data populating the database have been chosen to have
broad industry-wide relevance. This benchmark illustrates decision support
systems that examine large volumes of data, execute queries with a high degree
of complexity, and give answers to critical business questions.
TPC Benchmark C is an on-line transaction processing (OLTP) benchmark. TPC-
C is more complex than previous OLTP benchmarks such as TPC-A because of
its multiple transaction types, more complex database and overall execution
structure. TPC-C involves a mix of five concurrent transactions of different types
and complexity either executed on-line or queued for deferred execution. The
database is comprised of nine types of tables with a wide range of record and
population sizes. TPC-C is measured in transactions per minute (tpmC).
32. Want to do read up on this yourself?
https://kvaes.wordpress.com/2017/02/01/ever-tried-the-mix-of-azure-sql-server-storage-spaces-direct-scale-out-file-server/