Chap 10 - 01 - Understand Virt Essential Concepts and OS Virt Security - 09_ocred.pdf
Document Details
Uploaded by barrejamesteacher
null
EG-Council
Tags
Related
- Chap 10 - 01 - Understand Virt Essential Concepts and OS Virt Security - 09_ocred_fax_ocred.pdf
- Cloud Computing Course Book PDF
- AWS Certified Cloud Practitioner v3 PDF
- AWS Lambda Knowledge Check - Modules 7-13 PDF
- Security Implications of Different Architecture Models PDF
- Chapter 8. Serverless Processing Systems PDF
Full Transcript
Certified Cybersecurity Technician Virtualization and Cloud Computing Exam 212-82 What is Serverless Computing? Q Serverless computing also known as serverless architecture or Function-as-a-Service (FaaS), is a cloud-based application architecture where application infrastructure and supporting serv...
Certified Cybersecurity Technician Virtualization and Cloud Computing Exam 212-82 What is Serverless Computing? Q Serverless computing also known as serverless architecture or Function-as-a-Service (FaaS), is a cloud-based application architecture where application infrastructure and supporting services are provided by the cloud vendor as they are needed QO Serverless computing simplifies the process of application deployment and eliminates the need for managing the server and hardware by the developers........ Content Delivery ~ Object Store with ‘% oNS Network Static Content 000 % Routing 7? ".............. > E \— L Cloud Server il & E €|..... Application s Client (©: — @ APl e, Data Store Serverless Functions aythentication What is Serverless Computing? Serverless computing, also known as serverless architecture or FaaS, has a cloud-based application architecture, where application infrastructure and supporting services are provided by the cloud vendor as needed. Serverless computing simplifies the process of application deployment and eliminates the need for managing the server and hardware by the developers. Serverless applications are not purely serverless; servers are required but not physically exposed to the developers. In the serverless architecture, the application code runs on the cloud-hosted infrastructure managed by a third-party service provider. The cloud service provider is responsible for provisioning, scaling, load balancing, and securing the serverless infrastructure. Furthermore, the cloud service provider is also responsible for patch management of the operating systems and underlying software and services. Advantages: = High scalability and flexibility = Faster deployment and updating = Reduced infrastructure cost * No server management * Pay-per-use = Reduced latency and scaling cost = Quicker provisioning of resources = Low risk of failure * No system administration Module 10 Page 1285 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Virtualization and Cloud Computing Exam 212-82 Disadvantages: = Increased security vulnerability = Vendor-lock-in = Difficulty in managing statelessness = Complex end-to-end application testing = Unsuitability of long-running processes for serverless computing @ W ~ Client Application % Sl J S.**" Content Delivery DNs Network Ll Object Store with Static Content. Routing OUuy D=. '-.,.. ‘e, Al , = : Cloud Server II..I..I...."I> ) ™ PN Session Store = u]-...llll.l.)r APl Gateway o ", IIIIIII-l>v — Data Store (N SERRnnnnn Serverless Functions > aythentication Figure 10.16: Serverless architecture Module 10 Page 1286 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Virtualization and Cloud Computing Exam 212-82 Serverless Vs. Containers A * * The developer is responsible for defining container * support serverless computing; the entire provisioning software, libraries, storage, and networking process is taken care of by the cloud service provider Once initiated, the container runs continuously until * the developer stops or destroys it * Acontainer needs server support even when the = There is no time restriction for the code running * inside the container Containers support running on a cluster of host * Timeout is enabled on serverless functions * Theunderlying host infrastructure is transparent to nodes developers Containers store data in temporary storage or * mapped storage volumes Serverless functions do not support temporary storage; instead, data is stored in the object storage medium Containers support both complex applications and * lightweight microservices * Serverless deployment charges only for the resources consumed * * Once completed running, the serverless function is automatically destroyed by the cloud environment container is not executing any programs * Thedeveloper only needs to develop and upload code to configuration files along with the operating system, Serverless functions are suitable only for microservices applications Developers can select their choice of language and runtime for applications running in a container * Language selection for serverless functions is restricted by the cloud service provider Copyright © by | L All Rights Reserved. Reproduction is Strictly Prohibited Serverless Vs. Containers The table below summarizes the differences between serverless computing and containers. Containers = = = The developer is responsible for defining the container configuration files along with the operating system, software, libraries, storage, and networking. Developer then creates an image from that file, pushes the image to a registry, and runs a container from that image. Once initiated, the container runs continuously until the developer stops or Serverless Computing = computing; the entire provisioning process is taken care of by the cloud service provider. = destroys it. = A container needs server support even when the container is not executing any programs. = There is no time restriction for the code S : = Containers support running on a cluster of host nodes. = Containers store data in temporary storage running inside the container. or mapped storage volumes. Module 10 Page 1287 The developer only needs to develop and upload the code to support serverless After it completes execution, the serverless function is automatically destroyed by the cloud environment. | = Serverless deployment charges only for the resources consumed. = Timeout is enabled on serverless functions. = The underlying host infrastructure is transparent to developers. = Serverless functions do not support temporary storage; instead, data is stored in the object storage medium. Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Virtualization and Cloud Computing Exam 212-82 = (Containers support both complex applications and lightweight microservices. = Developers can select the language and runtime for applications running in a container. = Serverless functions are suitable only for microservices applications. = Language selection for serverless functions is restricted by the cloud service provider. Table 10.2: Serverless Vs. Containers Module 10 Page 1288 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Virtualization and Cloud Computing Exam 212-82 Serverless Computing Frameworks : QO Microsoft Azure Functions is a serverless computing platform that allows users to run code without provisioning and managing servers :. func-green I - Application map P W Dinins v] Busese Oote e ‘.\ Sun Q Y T o :