Cloud Computing and SLAs

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the primary goal of capacity planning in traditional web application deployments?

To determine the number of servers and their capacity to satisfactorily serve application end-user requests at peak loads.

What are the cost advantages realized by enterprises when outsourcing application hosting to third-party providers?

Enterprises avoid upfront investments in hardware, reduce the burden of hardware and application maintenance, and lower costs associated with managing increasingly complex data centers.

What is the main purpose of a Service Level Agreement (SLA) between an enterprise and an infrastructure service provider?

To guarantee a minimum quality of service (QoS) including system CPU, data storage, and network availability for efficient application execution, especially at peak loads.

Explain how co-hosting applications with complementary workload patterns can lead to more efficient resource utilization in ASP data centers.

<p>By hosting applications with non-overlapping peak usage times on the same servers, ASPs reduce redundancies and increase server utilization, leading to cost savings.</p> Signup and view all the answers

What is 'performance isolation' and why is it important in a co-hosting environment?

<p>Performance isolation ensures that one application does not unfairly consume resources needed by another co-located application, preventing performance degradation.</p> Signup and view all the answers

How do virtualization technologies address the challenges of performance isolation and data security in co-hosted environments?

<p>Virtualization allows applications to be encapsulated in virtual machines, providing performance isolation and data security through resource allocation and access controls.</p> Signup and view all the answers

Contrast 'conserving' and 'nonconserving' modes of system resource allocation in virtualized environments.

<p>In conserving mode, a VM cannot exceed its allocated quota, even if resources are available; nonconserving mode allows a VM to utilize spare resources not used by other VMs.</p> Signup and view all the answers

How does virtualization impact the need for capacity planning?

<p>Virtualization allows system resources to be allocated to applications based on their needs at different times, making traditional capacity planning less critical.</p> Signup and view all the answers

What is the difference between infrastructure SLAs and application SLAs?

<p>Infrastructure SLAs guarantee the availability of infrastructure, whereas application SLAs focus on application-level metrics like request rates and response times.</p> Signup and view all the answers

What does it mean for a service provider to be a Managed Service Provider (MSP)?

<p>MSPs are responsible for managing the availability of applications, going beyond just providing infrastructure.</p> Signup and view all the answers

List the five phases of the SLA lifecycle.

<p>The phases are: Contract Definition, Publishing and Discovery, Negotiation, Operationalization, and De-commissioning.</p> Signup and view all the answers

What is the purpose of the 'Contract Definition' phase in the SLA lifecycle?

<p>To define service offerings and corresponding SLAs using standard templates, forming a catalog of services.</p> Signup and view all the answers

What is the goal of the 'SLA Negotiation' phase, and is this process always automated?

<p>The goal is to mutually agree on SLA terms and conditions before signing the agreement. It is automated for standard packaged applications but manual for customized applications.</p> Signup and view all the answers

Describe what happens during the 'Operationalization' phase of an SLA.

<p>SLA monitoring measures parameter values, SLA accounting captures adherence for compliance, and SLA enforcement takes action upon detecting violations.</p> Signup and view all the answers

Outline the activities involved in 'De-commissioning' an SLA.

<p>This involves terminating all activities under the SLA when the hosting relationship ends, and adhering to terms and conditions for contract termination.</p> Signup and view all the answers

Name the five phases involved in SLA management for applications hosted on cloud platforms.

<p>Feasibility, On-boarding, Pre-production, Production, and Termination.</p> Signup and view all the answers

What are the three types of feasibility assessed during the 'Feasibility Analysis' phase?

<p>Technical feasibility, infrastructure feasibility, and financial feasibility.</p> Signup and view all the answers

Briefly explain the 'On-boarding' process of an application to a cloud platform.

<p>It involves moving the application from customer servers to the MSP's hosting platform, understanding runtime characteristics, and creating necessary policies for SLOs.</p> Signup and view all the answers

List the three types of policies that the MSP starts creating after the customer agrees to the set of SLOs and costs.

<p>The policies are: business, operational, and provisioning.</p> Signup and view all the answers

Explain the main purpose of 'operational policies' and provide an example.

<p>Operational policies define actions to be taken when thresholds or conditions are reached on service-level parameters. For example, automatically scaling out the web-server tier when the average latency of the web server exceeds 0.8 seconds.</p> Signup and view all the answers

Describe the goal of 'provisioning policies'.

<p>Provisioning policies define a sequence of actions corresponding to external inputs or user requests. An example is to define the steps to start a web site.</p> Signup and view all the answers

What is the purpose of the 'Pre-production' phase in cloud application management?

<p>The application is hosted in a simulated production environment, and the customer verifies and validates the MSP's findings on application runtime characteristics and agrees on the defined SLA.</p> Signup and view all the answers

What actions are taken during the 'Production' phase if the application SLA is breached frequently?

<p>If the application SLA is breached frequently the on-boarding process is performed again to analyze the application and its policies with respect to SLA fulfillment.</p> Signup and view all the answers

Describe the process during the 'Termination' phase of cloud application management.

<p>All application-related data is transferred to the customer, essential information is retained for legal compliance, and the customer provides a sign-off.</p> Signup and view all the answers

What is the role of 'Automated Policy-based Management' in cloud environments?

<p>It involves the operationalization of 'Operational' and 'Provisioning' policies to dynamically manage resources and maintain SLA goals.</p> Signup and view all the answers

Explain how understanding the relationship between system resources and SLA goals can benefit a cloud provider.

<p>It helps in identifying the optimal amount of system resources to allocate to application components based on system attributes, allowing providers to meet SLAs efficiently.</p> Signup and view all the answers

Describe how a test system is used to determine system resource requirements for an application.

<p>The test system collects low-level system metrics and high-level service levels, which are used to derive functional relationships between SLOs and system attributes.</p> Signup and view all the answers

What parameters are often used to prioritize actions and perform resource contention resolution in a cloud environment?

<p>Parameters include SLA class, penalty associated with the SLA breach, and whether the application is at or has already breached SLO. The number of applications belonging to the same customer that are breaching or are about to breach SLA and the type of action that needs to be performed to rectify the situation are also used.</p> Signup and view all the answers

Describe the key function of the 'prioritization engine' in automated policy management.

<p>The prioritization engine resolves resource contentions among different customer web applications based on business policies.</p> Signup and view all the answers

What role does the 'rules engine' play in maintaining SLA compliance?

<p>The rules engine evaluates data from the monitoring system against predefined operational rules and triggers actions to guarantee SLA under a self-healing system.</p> Signup and view all the answers

Explain how the 'monitoring system' contributes to the overall automated policy management system?

<p>The monitoring system collects defined metrics in the SLA. It also collects metrics that are used for monitoring resource failures, evaluating operational policies, and auditing and billing purpose.</p> Signup and view all the answers

How are virtualization technologies applicable in MSP solutions?

<p>Using virtualization enterprises are encapsulated in virtual machines, providing performance isolation and data security through resource allocation and access controls. MSPs utilize this by being able to allocating different resources to competing applications.</p> Signup and view all the answers

What is the purpose of the 'accounting system' in automated policy management?

<p>This module is used for accounting and billing operations. Based on the payment model, chargebacks could be made based on the resource utilized by the process during the operation.</p> Signup and view all the answers

Describe how the 'optimization engine' enhances virtual machine migration strategies.

<p>It decides the migration strategy that optimises the number of VM migrations or minimise the number of physical machines affected by the migration process. This provides better performance and cost savings.</p> Signup and view all the answers

Why are the 'operational policies (OP)' important?

<p>Operational policies are the actions to be taken when different thresholds/conditions are reached i.e, actions when thresholds/conditions/triggers on service-level parameters are breached or about to be breached are defined</p> Signup and view all the answers

What is the difference between event-based migrations and OP migrations?

<p>Event based migrations are local, while OP migrations also include considering global factors. During overload, instead of migrating the VM, switching of two VMs can have the same function and less PM are switched on.</p> Signup and view all the answers

How can automated policies make sure enterprises will keep up the SLA?

<p>Automated scaling for application is done based on metrics such as response to SLO. It can scale up, scale down, scale in and scale out, while the cost is also automatically calculated.</p> Signup and view all the answers

In the real-world, do a enterprise need only one SLA?

<p>A customer can have multiple SLAs with different performance in costs structure.</p> Signup and view all the answers

In virtualization, what does SLA also take into account?

<p>Since virtualization affects the performance, additional SLA details has to be present based on virtualization performance.</p> Signup and view all the answers

Flashcards

Service Level Agreement (SLA)

A legal agreement guaranteeing a minimum quality of service, relating to system CPU, data storage and network for execution of applications at peak loads.

Provisioning

Involves deciding hardware configuration, determining the number of physical machines, and acquiring them upfront.

Capacity Planning

The activity of determining the number of servers and their capacity that could satisfactorily serve the application end-user requests at peak loads

Service-Level Objectives (SLOs)

Response time and throughput of the application end-user requests

Signup and view all the flashcards

Data Centers

Server rooms in organizations that became large as the number of web applications grew

Signup and view all the flashcards

SLA Example (Availability)

99.9% availability of server machine during key business hours

Signup and view all the flashcards

SLA Example (Response)

Responding to reported issues in <10 minutes during core time

Signup and view all the flashcards

Co-hosting

Deploying more than one application on a single server.

Signup and view all the flashcards

Performance Isolation

One application not stealing resources from other co-located applications.

Signup and view all the flashcards

Data Security

Guaranteeing data security to different co-hosted applications

Signup and view all the flashcards

Nonconserving Mode

Using spare resources not utilized by co-hosted virtual machines.

Signup and view all the flashcards

Conserving Mode

Virtual Machine demanding more system resources (CPU and memory) than the specified quota cannot be allocated the spare resources

Signup and view all the flashcards

Application Runtime Characteristics

ASPs allocate system resources efficiently to these applications so that application-level metrics can be monitored and met effectively.

Signup and view all the flashcards

Adoption of Virtualization

Required if enterprise desires more detailed data about application runtime and high availability with high accuracy

Signup and view all the flashcards

Cloud Platform

Providing resources dynamically from multiple sources, including other MSPs, if resources are scarce at their data centers

Signup and view all the flashcards

Service-Level Agreement

Providing a framework within which both seller and buyer of a service can pursue a profitable service business relationship.

Signup and view all the flashcards

Infrastructure SLA

Guarantees on availability of the infrastructure, namely, server machine, power, network connectivity, and so on.

Signup and view all the flashcards

Application SLA

Server capacity is available to the applications based solely on their resource demands

Signup and view all the flashcards

Challenges

A customer and the service provider mutually agree upon a set of SLAs with different performance and cost structure rather than a single SLA

Signup and view all the flashcards

Life Cycle of SLA

A sequence of steps starting from identification of terms, activation, monitoring, and eventual termination of contract

Signup and view all the flashcards

Contract Definition

Service providers define a set of service offerings and corresponding SLAs using standard templates.

Signup and view all the flashcards

Publication and Discovery

Service provider advertises base service offerings. Customers locate through the catalog.

Signup and view all the flashcards

Negotiation

Customer & provider agree on SLA terms before signing.

Signup and view all the flashcards

Operationalization

SLA monitoring, accounting, and enforcement.

Signup and view all the flashcards

De-Commisioning

SLA decommissioning involves termination of all activities performed under a particular SLA.

Signup and view all the flashcards

Phases of Cloud Management

A cloud management phase involving: Feasibility, On-boarding, Pre-production, Production, and Termination

Signup and view all the flashcards

Feasibility Analysis

A cloud management phase involving: Technical feasibility, infrastructure feasibility, and financial feasibility.

Signup and view all the flashcards

Financial Feasibility Study

approximate cost to be incurred by the MSP and the price the MSP charges the customer so that the hosting activity is profitable to both of them.

Signup and view all the flashcards

On-Boarding of Application

customer and the MSP agree in principle to host the application based on the findings of the feasibility study

Signup and view all the flashcards

Business Policies

Business policies help prioritize access to the resources in case of contentions

Signup and view all the flashcards

Operational Policies

Are the actions to be taken when different thresholds/conditions are reached.

Signup and view all the flashcards

Provisioning Policies

Help in defining a sequence of actions corresponding to external inputs or user requests.

Signup and view all the flashcards

Preproduction

The cost and terms are agreed upon and the customers runtime sign off is required.

Signup and view all the flashcards

Production

The application is made accessible to its end users under the agreed SLA.

Signup and view all the flashcards

Termination

All data related to the application are transferred to the customer and only the essential information is retained for legal compliance.

Signup and view all the flashcards

Operational Policies

The functional relationship between the system level infrastructural attributes and the business level SLA goals.

Signup and view all the flashcards

Study Notes

  • Study notes about Cloud Computing and Service Level Agreements (SLAs)

Cloud Computing Syllabus Overview:

  • Cloud computing encompasses definitions, characteristics, history, and various deployment models like Public, Private, Hybrid, and Community clouds.
  • Cloud computing include service models such as IaaS, PaaS, and SaaS, as well as cloud architecture.
  • Cost-benefit analysis of cloud adoption is also part of Cloud Computing
  • Virtual machine provisioning and migration services cover virtualization concepts, types, hypervisors, VM creation, and containerization (Docker, Kubernetes).
  • High availability, disaster recovery, cloud migration concepts, and techniques are covered.
  • SLA management, cloud security, and AWS services delve into Service Level Agreements (SLAs), their management in the cloud, and automated policy-based management.
  • Security fundamentals, cloud security challenges, vulnerability assessment, security, and privacy are explored, along with cloud computing security architecture.
  • Amazon Web Services (AWS), AWS services - Identity and Access Management (IAM), and Virtual Private Cloud (VPC) are covered.
  • Advanced topics include serverless computing, edge computing, managed databases (RDS, NoSQL), and data warehousing solutions like Redshift and BigQuery.
  • AI/ML services in the cloud, such as AWS SageMaker and Google AI Platform and real-world cloud computing case studies with a discussion on cloud adoption in various industries.

Services and Service Oriented Architectures:

  • In the early days of web app deployment, application performance at peak load was a key provisioning criterion.
  • Provisioning involved deciding hardware configuration, determining the physical machine count, and upfront acquisition.
  • Web applications were hosted on dedicated individual servers within enterprise server rooms.
  • SLOs for applications were typically response time and throughput of end-user requests.
  • Capacity buildup catered to estimated peak load and determining server and capacity that can serve peak load requests which is called capacity planning.
  • Two web applications, A and B, are housed on separate dedicated servers within enterprise server rooms.
  • Each application requires three servers to run effectively.
  • As web applications increased, server rooms became data centers owned and managed by companies themselves.
  • Companies realized it was more economical to outsource app hosting to third-party infrastructure providers.
  • Enterprises do not need to invest in expensive hardware without knowing viability.
  • Hardware and application maintenance became non-core part of business.
  • Managing growing number of web applications increased sophistication which increased cost of maintenance.

Service Level Agreement (SLA):

  • Third-party service providers get needed hardware and make it available to deployed web applications in the infrastructure.
  • Enterprises enter into a legal agreement with infrastructure providers to guarantee minimum quality of service (QoS).
  • QoS parameters pertain to system CPU availability, data storage, and network execution at peak loads.
  • A legal agreement is known as the service-level agreement (SLA).
  • SLAs state the application's server availability for 99.9% core time and 85% non-core time.
  • Service provider would respond to an issue in less than 10 minutes during core time, and in one hour during non-core time.
  • These SLAs are known as infrastructure SLAs.
  • Infrastructure service providers are known as Application Service Providers (ASPs).

Infrastructure SLA Scenario:

  • Enterprises applications are hosted on dedicated servers belonging to an ASP.
  • Tools for monitoring and measuring infrastructure availability were developed.
  • Availability of infrastructure doesn't guarantee app availability to end users.
  • Tools help in tracking SLA adherence.
  • Companies IT team performs capacity planning, and the infrastructure provider procures the same.
  • Dedicated hosting caused redundancies in ASP data centers because of server underutilization.
  • Applications were not fully using server capacity at nonpeak loads.
  • To maximize server utilization and reduce redundancies, ASPs began co-hosting apps with similar workload patterns.
  • Co-hosting involves deploying more than one application on a single server.
  • Co-hosting created cost advantage for ASPs and enterprises.
  • The enterprise and third parties perspective are shown before after co-location.
  • System is multiplexed between application A and B and capacity of server used by enterprise owing application A is total amount consumed.
  • The ASP's perspective of capacity use of application A and B is shown when their workloads are similar.

Challenges of Co-Hosting

  • Application performance isolation and security assurances have emerged.

  • Performance isolation implies an application should not take resources from co-located application.

  • For example, if application A need more from a resource, the amount of resource available to application B is reduced.

  • Application B performance affected.

  • One application should not destroy or access any information about co-located applications.

  • Guarantees for security and performance need appropriate measures.

  • ASPs cohosting benefits were limited as a result of these issues.

  • To overcome above challenges, virtualization technologies have been proposed.

  • ASPs exploit containerization for virtualization to guarantee application performance isolation and data security.

  • The applications are encapsulated using virtual machines instead of physical servers.

  • The virtual machines were mapped to the physical machines.

  • Conserving and noconserving modes can be used to make system resource allocation to vitual machines.

  • In conserving mode, a virtual machine that needs more resources than quota cannot be allocated more by un-utilized resources.

  • In nonconserving mode, the spare resources are fully used by virtual machine that need it.

  • Virtual machines are migrated to another physical device capable of more resource usage if resource requirements are not met.

  • ASPs can allocate system resources on demand because of new development.

  • Capacity planning becomes redundant because resources are allocated based on application need.

  • Enterprises and ASPs do not need to provision resources for peak load.

  • Adoption of virtualization technologies required ASPs to get insight into characteristics runtime patterns with high accuracy.

  • ASPs allocate system resources effectively to apps on demand and level metrics so the metrics can be monitored.

  • Request rates and response times are the level metrics.

  • Application SLAs are required because infrastructure SLAs aren't enough.

  • Managed Service Providers (MSP) service providers are reponsible for application availability.

  • Both Applications A and B are shown to share virtualized server.

  • SLOs of application SLA requires greater MSP understanding of its IT infrastructure which must be elastic.

  • Elasticity implies scaling up the IT infrastructure to accommodate increased workloads.

  • Billing is based on application usage of resources for a period only.

  • Infrastructure is augmented by sourcing resources from multiple MSPs if datacenter resources are limited.

  • Cloud platforms are a new infrastructure for hosting.

  • Difficulties in meeting SLOs occur because of cloud platforms, agreed upon by cloud and application owners.

  • Cloud owners treat customer application with third-party components like a black box because of the lack of available high-level design documents.

  • Service providers must follow a process for understanding runtime behavior.

Types of SLAs

  • Service-level agreements provide seller and buyer framework for profitable service-oriented business.
  • They outline the understanding between business and service consumer, forming a basis for relationship maintenance.
  • SLA that formally defines legal terms that binds service provider to provide consumer services with continuous access.
  • SLA modeled using web service-level agreement language specification.
  • WSLA is applicable for hosting applications despite being created to web services.

Key Components of WSLA

  • Service levels parameter metric- Observable property of a service whose value is measurable.
  • Definitions of values of properties that are computed or measured from a service.
  • Metrics that describe what SLA parameters mean when specifying how to compute or measure.
  • Function- Specifies how to compute metric values through values, other functions, and constants. Functions are central to describing exactly how SLA parameters are computed from resource metrics.
  • Measurement directives-How to measure the metric.
  • There are two types of SLAs from hosting perspectives:
  • Infrastructure SLA
  • Application SLA

Infrastructure SLA Details

  • The infrastructure SLA that providers manage and guarantee availability for server machine, server machine, power, and network connectivitiy, etc.
  • Enterprises that manage their application that is utilized on the server machine.
  • Machines that leased to customers are isolated from machines that served other customers.
  • Table 16.2. Key Contractual Elements of an Infrastructural SLA shows practical instances of assurances provided.
  • key elements include Hardware availability 99%, Power availability 99.99%, Data center network 99.99%, or Backbone network 99.999%
  • Refund of service credit prorated on downtime period and notification of customer within 1hr of complete downtime.
  • Internet latency not to exceed 60 msc or Packet loss that will exceed 1% in a calendar month.

Application SLA Details

  • In the application co-location hosting model, server availability is given for application that has high recourse request.
  • Services which are allocate or allocate can be flexible with co-located appliances.
  • Service providers that meet customers that have an customer application SLOs.
  • Enterprise application SLA is for a service that is shown in Table 16.3.
  • Key service-level include Web site response time, Latency of a web server (WS) or a DB, or an Average latency.
  • Measurement include DB latency available via http://mgmtserver/em/latency of WS latency available via http://mgmtserver/ws/instanceno/latency.
  • penalty will include service assurance or web site latency < 1 sec when concurrent connection < 1000 and 1000 USD for every minute while the SLO was breached.

Challenges

  • Customers that decide upon different SLAS and are cost effective, rather than a single SLA.
  • Customers have flexibility to choose any or multiple SLAS.
  • Customers at runtime can switch between them.
  • From SLA, there is a multi challenges for demand.
  • Black box, not know about application runtime parameters therefore proper computer components need to be determined for apps with various workflow.
  • The MSP needs to understand scalability and performance.
  • Operations enhancement by the update can impact the SLA.
  • Capacity planning is the responsibility of the service providers instead.
  • It may not be sufficient to meet obligations of the customers the grade may not be simultaneously selected.

Lifecycle of SLA

  • Identification starts form the identification of conditions that are stated, as well contract ends.
  • Following phases that include Contract definition, Publishing and discovery, Negotiation, Operationalization, De-commissioning.
  • SLAs can be generally defined through setting of templates and offerings of service.
  • This SLA has offering through templates is from catalog
  • Enterprise that customization derived from templates.
  • Through service media is advertized and is located by customer by searching of the catalog.
  • customers can search for that fulfill.
  • application that is for need and is signed that meets.
  • Application can be automated that is packaged.
  • Manual process for application in cloud and MSP needs to analyze performance.
  • At the end of customer and service that agree.
  • SLA uses the Specification for [8].

Operationalization

  • The three SLA aspects consist of SLA operation, SLA accounting, enforcing.
  • SLA monitoring includes measuring parameter values that determine value.
  • The parties that are on notification of deviations.
  • Adherence has compliance by SLA accounting.
  • Applications a s part that's actual is part that guaranteed.
  • Penalities is breach also is a apart form the data.
  • Action occurs by when monitors it detects.
  • other things that needs to be notified is that the sides need some needs actions that has concerned.
  • CIM [9] model open expresses management.

Commisoning

  • The particlaur happens in SLA to hosting that finishes.
  • termination and specifies to which providers that can be ended.

SLA Management In Cloud

  • Consist of Feasibility, On boarding, Pre- production, Production phases and termination.

Feasibility Phase

  • MSP analyzes application on cloud platform.
  • It includes technical infrastructure and financial feasibility (1, 2, 3).
  • technical feasibility, that ability need is that applications that scale output.
  • Application software's and platform are for compatibility in MSP data.
  • Software or hardware and need is available that require running those types of applications.
  • Met and preliminary the app and info

Infrastructure feasibility

  • Projection that availability to resources is sufficient.
  • Financial that customer must pay in the MSP and MSP determines cost approximate.
  • 3 studies are conducted that result.
  • The customer may agree to proceed.

Onboarding

  • Report and findings occur in this activity.
  • detailed runtime that are part.

Production

  • On agreement that application is that MSP makes of move to hosting as result.
  • Platform is moving that called [10] onboarding
  • that include profiles that are from part.
  • Customer to the to this SLA in offer.
  • That guarentee SLO has rules that require help and policies.
  • On finishing accessibility needs the applicAtion.
  • Onboarding is as follow

OVF standardization

  • On deploying there is application and packaging.
  • Validating functional has analyzing server's.
  • Performance values that non environment gives and provides point on expectation if SLA can provide .
  • Identification that intensive the performance needs is CPU to potential needs.
  • Virtualization needs characterization is important.
  • Characteristics have performances and are scale to bounds with output and up.
  • SLOs needed is the characteristics.
  • MSP starts set that different policy for automation.
  • system deallocating that automatically to set resource management and appropriate component.
  • business, operational, and provisional (1, 2,3) policy.

Operational Policies

  • Access that resources get in case it helps and prioritize. Weights form group that customers that in case policy.
  • conditions that are reached that are followed such logging.
  • Application tier is notified addit.
  • Actions representation is as policy
  • conditions that happen to action happen or has that action taken is for [OP = collection]. Scale as threshold needs of MSP to be greater and web for automatik.
  • The instances for such needs should take to increase the that application.

Provisioning Policies

  • Defined request and are external. Scale is an example of.
  • Actions represented is for PP and request that collection {request and action}
  • Provision start must need to server in to create site that contain web.
  • On identification with needs needs the.
  • That all application are in capturing is onboard.

Preproductiponn

  • Hosting starts that is from production.
  • Validate MSP has characteristic performance or application runs.
  • Agrees that have of that application and is successful.
  • Allows that phase or application.

Production Phase

  • Accessible from the on start up.
  • Different when has application, pre that environments have.
  • Terms can be of that breach a non requested or customer to new in include.
  • Analysis what respect there policies may or reanalyze.

Temrination Phase

  • Application is which to withdraw in end, the activity.
  • application related from initiation is to is customer
  • information is retention essential with transfer
  • It's ends what 2 applications a of end to with signature obtained

Automated Policy-Based Management

  • That explains detail and operationalization of the policy.
  • Action is specified under the different.
  • That functional with and system.
  • Relationship helps to identify amount that the quantom and quantity that resource that helps

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser