Time
14 hours 28 minutes
Difficulty
Intermediate
CEU/CPE
15

Video Transcription

00:00
Hello, Siberians. Welcome to Lesson 3.4. Off Monetary Off. Discuss stated Microsoft Azure architect design.
00:08
Here are the objectives that will be covering in this lesson.
00:12
We'll start out by covering as your sequel design decisions from the scalability perspective.
00:18
Then we'll move on to cover design decisions from an availability perspective
00:23
and finally will cover as just sequel design decisions. From a monitoring perspective, let's get right into this. Let's talk about scalability and some of the information that we need to know when designing for scalability off. I just said, Quote database.
00:39
The compute size can go up to 80 virtual calls, regardless off the deployment model that we have. So whether that single database, elastic pool or manage instance, we can go up to 80 vigil costs
00:54
that also the paint on the tear that we select our we've specified that
00:59
when it comes to the size of our database
01:00
for single database on elastic food database,
01:06
we can go off to four terabytes if we're deploying the general propose or business critical service tears. If we're deploying the iPods killed here, we can go up to 100 terabytes
01:17
when it comes to the managed incense. The maximum size of the database is eight terabyte, and that has to be the general propose serviced here for the business critical service. Day Off Manage instance, we can only go up to fourth of a bite
01:34
when it comes to design in five Gullibility and Hodja
01:38
What you're looking at on the screen at the different options of the different features that are available for just sequel that can help us without designed for business continuity and disaster recovery.
01:52
For example, let's start with automatic backup automatic backups I enabled by default as as just secrets and managed service. This is a neighborhood for house automatically taken on. It's not something that we can disable.
02:07
This protects against things like accidental corruption off delish in where we can do point in time, restore to our database states at the previous point.
02:20
Also, the back of that are taken are protected in that their start on job redundant stoppage, which means storage that is spread across different regions in Hajer,
02:35
the back off happen transparently in the background without impacting on performance. Fullback offs are taken every week.
02:42
Differential backups happens twice a day every 12 hours transaction log backups or call every 5 to 10 minutes.
02:53
Did the fault retention period for the back office is seven days, but we can extend this. We can configure the so for the general proposed on the business critical service here we can extend this often, detective five days retention period so that if there were to be an accidental corruption or delusion, we can restore back
03:13
provided we gets to eat within 35 days. Otherwise, stand that gets
03:16
delete it.
03:21
We can use this backups to restore our database to a point in time in the past,
03:27
provided we do that within the retention period,
03:30
we can also use it to restore a deleted data base within the retention period if it databases accidentally deleted that fine.
03:39
However, we cannot use this to restore a data if the server is deleted.
03:47
If Ana Jossy core database, which is the administrative container for our databases and elastic pools, if that is deleted, we cannot use this automatic back off to restore that
04:03
when it comes to long term backup retention.
04:06
This is something that we can use as an extension of the automatic backups.
04:12
We have different complaints requirements to meet. We can extend our attention
04:18
for up to 10 years.
04:23
So this backups are also gonna be start on your redundant storage off with access job redundant storage. We can enable long term retention for single database for elastic pooed it basis. It's not yet available for managed instances.
04:40
It can be used to restart if the survives deleted. So that's one of the good use cases of days. If if you, the latest of either accidentally are maliciously,
04:50
you can go to your long term backup retention because that copied off to another stoppage on, then you can restore your databases back from there.
05:02
That's also a feature of our Jessica called active replication,
05:08
because while backups of Great
05:11
they're great for disaster recovery, it doesn't help us with downtime during on plant or temporary plan failures. What do I mean by that? Let's say you wanted to do some application upgrades, and you need to be able to fail over. If there were to be
05:29
a confusion of their way to be an issue, something goes wrong.
05:31
That's where backups men will be great for that
05:36
where replication can be a useful technology forced to use. So what active your application does? Is it leverages, Theo always on technology of C course ever
05:47
on. It s in Conus Live replicates committed transaction on a primary database with the country database. So essentially, we have province a country database that stays in sync.
06:00
Andi, we can have up to 4 600 databases for each primary database.
06:08
And if I intervene in our primary database feels
06:12
or it's needs to be taken off line. We can initiate a fan over to any of us A country databases that we'll have applications, huh?
06:19
And we can promote them, actually to the primary.
06:24
So because the secondary databases RV edible,
06:28
they can also be used to offload read on Lee workload like reporting jobs. So when once you configure activity replication on your neighbor days, you can actually take advantage off your replicated databases to secondary at once on then run your reporting against them.
06:47
So active job application is not yet supported by managed incense.
06:55
And finally, when it comes to availability stark about something called auto failure of a group. Now what a fan of a group.
07:01
Think about it as an extension off activity of application right, so active your application helps us to replicate at databases. But the thing is, when it comes time to initiate the fail over, that still has to be done by house. We still needs to get involved. Now. We cannot make statute to some other process that we have,
07:21
but that do something that needs to come from us. What active fell over group does? Is it as an extension to that
07:28
on it? Also so transparent fail over off our database to the secondary database.
07:38
So
07:39
auto fan of a group is supported by managed instance. So that's great. We can use that in this scenario.
07:48
Let's talk about monitoring off. I just sequel when we talk about monitoring off azure in general, or any service in Azure where main liver for into three men. Things
08:00
we're talking about metrics. Now metrics are defined as numerical values that describes some aspect of a system at a particular point in time. What does that mean? What that means is information about the service that, um, eat it by the as your platform,
08:16
for example, wants the CPU utilization. What's the memory? Installation was the star digitalization
08:24
those sorts of information that a meted, sort of like from the eye, provides a level or from the azure platform in this case, those I referred to as metrics.
08:33
You describe the state of a system at a point in time
08:37
so we can go ahead and view this information about metrics off our logistical data bases in the metrics Explorer. This is not something that we need to enable. Once we deploy service, metrics are automatically a meted every one minute for most metrics by, in some cases can be every five minutes.
08:56
Then we have the activity locks and activity logs that provide insight into subscription level event. What does that mean? We're talking about administrative event or administrative oppressions. Would did this action. When did they do this action? What action did they do? Right?
09:13
Dosa dosa, administrative activities Also coming from the platform.
09:18
When it comes to activity logs, there's nothing that we need to do house. So it's automatically emitted by. There's your platform so we don't need to do anything. In this case, we can just exploit each using the activity logs Explorer.
09:33
Then they come to diagnostic logs.
09:35
Now diagnostic logs refer to events that are coming with dinner system or with dinner service.
09:43
So while metrics comment from within the platform itself, diagnostic clocks are coming from within the adjusted course Service itself. Another what, what exactly at the different operations that are going on within the service, And that's where we can get a lot of insight into our databases.
10:03
So when it comes to diagnostic locks,
10:07
it's something that's my neighbor by default. As I mentioned, it's something that we have to enable
10:13
but on we have to enable this in as your sequel are Jessica managed Instance.
10:18
Now when we go to enable this, we have the option to send this data tow three destinations
10:24
it a storage account event up on log analytic walk space on their different use cases for this different destinations. For example, if you're gonna be sending this information to adjust a bit accounts the menus case for this is archive in. You wants to take all these diagnostics information on, then archived them.
10:43
You could collect them. Just incident, taught Pattie information, or you could just start them
10:48
at a very low price.
10:52
When you enable diagnostic settings,
10:56
you can configure it retention period for this information in the eye. Just storage account.
11:03
The other option.
11:05
It's a joint event. Hop
11:07
now the menus case for Joy Event hop is to integrate this information that's coming from within azure sequel service with custom monitoring solutions or ought pipelines. What that means that we can do near view Time analytics and insight
11:24
into our azure service on event ob
11:28
allows us to be able to do this.
11:33
Also, in this case, when we're nibble this option, we can configure the retention period
11:41
where where we can define our longer data is gonna be starting actually went up.
11:50
The corruption is log analytics workspace.
11:54
This option is mainly for the use case off getting intelligent monitoring or intelligent inside out off this information. So as your log analytics is and it's another service in Azure, where you have, like this Logan ITICs workspace where we can send this information into,
12:13
and then we can use something like to call the Cousteau query language
12:16
toe query, all the information that's inside this workspace, and then we can get insight
12:22
on dhe information. Useful information on trains out off this data that way, just passing into the workspace
12:31
we can either go down the path off, building out the queries and building out of a pot fire myself.
12:37
Oh, we can go down the path off as just equal analytics. Justin Quayle Analytics is unavailable Solution. A very made available solution in hasher that can layer on top off the Log Analytics workspace to extract insight about Ahjussi code
12:54
service from information that's in the log genetics workspace of I don't knows beauty In all these queries and reports on all these friends from scratch by ourselves, we could just leverage this solution.
13:09
There's a difference in this case because the retention period is not something that we coughing configure when we enable deception.
13:16
The retention period is based on what is configured for the walk space itself, which the default father Logan antics workspaces. That's one days, but something that can be extended to 7 30 days in Logan writings based on the option that's configured yet.
13:33
So why don't stop this recording this video for now, and I resent the next video with the other information about agile Seiko database design decisions.
13:43
See you

Up Next

AZ-301 Microsoft Azure Architect Design

This AZ-301 training covers the skills that are measured in the Microsoft Azure Architect Design certification exam. Learn strategies to plan for the exam, target your areas of study, and gain hands-on experience to prepare for the real world.

Instructed By

Instructor Profile Image
David Okeyode
Cloud Security Architect
Instructor