Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Proj4-final

Project 4: Postmigration Activities 
Step 1: Postmigration Activities Overview 

Like any software development project, migration projects require careful planning to ensure success. This planning includes the postmigration testing and maintenance phase. Start this project by researching and planning the 
postmigration activities that will be required to get BallotOnline’s migrated workloads in a production-ready state.

Engage in an online conversation with your colleagues to discuss the postmigration approaches and activities in the Discussion: Postmigration Approaches and Activities.

After discussing the approaches, you will move on to the next step, where you will consider prerequisites, the tasks to be completed before monitoring and management. 

Take Action

Follow these steps to access the discussion:

· Click My Tools in the top navigation bar.

· Click Discussions.

· Select the relevant discussion.

Once in the discussion, you can Start a New Thread, as well as respond to threads others have created. Use the discussion to develop awareness, share your thoughts, ask questions, and reflect. Remember that everyone brings a valuable and unique perspective, and treat everyone with respect.

Project 2: Programmatic Cloud Configuration and Deployment 
Step 2: Review and Compare Cloud Deployment Programmatic Tools 

In this step, you will learn about some of the leading cloud deployment programmatic tool sets for application and server management.

Review the 
Information Automation Tools provided by Microsoft Azure.

After reviewing and creating a feature comparison table for four most promising tools, you will submit your comparison using the 
Cloud Deployment Programmatic Tool Set Comparison Guide.

In the next step, you will take a detailed look at 
Azure Resource Manager template.

Take Action

Submit your assignment to your instructor for review and feedback.

Follow these steps to access the assignment:

· Click My Tools in the top navigation bar.

· Click Assignments.

· Select the relevant assignment.

Project 4: Postmigration Activities 
Step 3: Compare Monitoring/Management Options in AWS 

Now that you have explored CloudFormation, you will consider resource optimization. Controlling and optimizing the infrastructure can help BallotOnline reduce costs, improve security, and increase performance. The monitoring and management options and tools will help automate IT operations for BallotOnline in the cloud.

You’ve been asked to review two of the leading monitoring and management options available in AWS: 
AWS Trusted Advisor and 
AWS Systems Manager.

After your review, engage in an online conversation with your colleagues at BallotOnline in the Discussion: Evaluation of AWS Monitoring and Management Options.

After your discussion, compare the two options using the 
Cloud Monitoring and Management Comparison Template and submit it via the dropbox below.

Take Action

Follow these steps to access the discussion:

· Click My Tools in the top navigation bar.

· Click Discussions.

· Select the relevant discussion.

Once in the discussion, you can Start a New Thread, as well as respond to threads others have created. Use the discussion to develop awareness, share your thoughts, ask questions, and reflect. Remember that everyone brings a valuable and unique perspective, and treat everyone with respect.

Take Action

Submit your assignment to your instructor for review and feedback.

Follow these steps to access the assignment:

· Click My Tools in the top navigation bar.

· Click Assignments.

· Select the relevant assignment.

In the next step, you will work closely with AWS Trusted Advisor.

Project 4: Postmigration Activities 
Step 4: Evaluate and Configure AWS Trusted Advisor 

In the previous step, you compared two maintenance and management tools, AWS Systems Manager and AWS Trusted Advisor, to gain an understanding of the capabilities of both resources. Sophia has asked you to get started by evaluating and configuring 
AWS Trusted Advisor next.

Take Action

Explore 
AWS Trusted Advisor and then go to the 
Trusted Advisor dashboard and check each category with best practices:

1. Cost optimization

2. Fault tolerance

3. Services limits

4. Security

5. Performance

Recommend changes to the settings based on the results of the checks and document the results of each check with screenshots.

Once you’ve evaluated and configured AWS Trusted Advisor, you can proceed to the next step, where you will do the same for AWS Systems Manager.

Project 4: Postmigration Activities 
Step 6: Discuss and Review Final Cutover/Rollback Options 

You’ve evaluated and configured AWS Systems Manager and AWS Trusted Advisor. Now, it’s time to consider plans in case something goes awry and data becomes unavailable when the project goes live. In this step, you will discuss and review final 
cutover strategy and options to roll back the workloads to the original source in an event of any postmigration issues. You will include your cutover options and rollback plan as part of your final Cloud Migration Technical Report.

Before moving on to the next step, engage in an online conversation with your colleagues to discuss the final cutover/rollback options in the Discussion: Final Cutover and Rollback Options.

When you are finished, it’s time for the final step, the report on postmigration.

Take Action

Follow these steps to access the discussion:

· Click My Tools in the top navigation bar.

· Click Discussions.

· Select the relevant discussion.

Once in the discussion, you can Start a New Thread, as well as respond to threads others have created. Use the discussion to develop awareness, share your thoughts, ask questions, and reflect. Remember that everyone brings a valuable and unique perspective, and treat everyone with respect.

Project 4: Postmigration Activities 
Step 7: Write Cloud Postmigration Activity Report 

At this point, you should have a better understanding of the cloud postmigration activities and the services that are available to manage and monitor cloud infrastructure in AWS. In your Postmigration Activity Report, you will provide BallotOnline with postmigration activities options and tool sets that align with BallotOnline’s technical and business requirements.

The 10- to 12-page final document will consolidate the work that you have completed in the steps along with some additional elements (scope, executive summary, etc.) to create a comprehensive postmigration activity report. Sophia will present your work for approval at the executive meeting.

Use the 
Cloud Postmigration Report Guide to make sure that you have included all the elements. Submit your work after reading the instructions below.

Check Your Evaluation Criteria

Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.

· 9.1: Develop a plan for cloud implementation / migration.

· 9.5: Design virtualized network infrastructure to meet business needs.

· 9.6: Design cloud storage infrastructure to meet business needs.

· 10.2: Create and deploy virtual machines.

· 10.3: Configure cloud management tools and software.

· 10.4: Configure cloud orchestration and automation software.

· 10.7: Configure a public cloud infrastructure using industry leading provider(s).

· 11.1: Perform system auditing.

· 11.5: Perform system maintenance.

· 11.6: Troubleshoot system problems.

· 11.8: Prepare contingency plans when changing cloud providers or closing down a cloud architecture.

Take Action

Submit your assignment to your instructor for review and feedback.

Follow these steps to access the assignment:

· Click My Tools in the top navigation bar.

· Click Assignments.

· Select the relevant assignment.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

computering part 7

The goal of this project is to integrate your various components into polished, professional products. Follow the instructions below to ensure a successful submission: Apply Feedback: Review and incorporate all feedback received from previous submissions (Parts 2-6). Enhance and Improve: Refine any of the three required items (cover letter with

Discussion and Replies

Please see attachment for instructions     Discussion   In 250 words total, answer the questions below with 4 evidence base scholarly articles. APA format. Based on the readings this week, 1. Discuss some common strategies and pitfalls you have seen with business continuity. 2. Discuss some common strategies and

sociology

The goal of this project is to integrate your various components into polished, professional products. Follow the instructions below to ensure a successful submission: Apply Feedback: Review and incorporate all feedback received from previous submissions (Parts 2-6). Enhance and Improve: Refine any of the three required items (cover letter with

Python

  Instructions Create a simple Python application (Save as w5_firstname_lastname.py) . Create a Python script that takes two parameters to do the following:- 1) List all files names, size, date created in the given folder 2) Parameter1 = Root Folder name Parameter2= File size >>> to filter file size (

Python

  Instructions:  Describe methods for securing Python code. Pick at least ONE of the methods for securing node and deep dive into what it means and how it is used to secure code.   

Discussion 8 of 459

Follow the attach instruction to complete the work. 1. What is one specific technology you found the most intriguing throughout the course? 2. If you were to be a hacker, which building block vector would you choose to attack your selected technology and why?

WK 4 Discussion and Replies

Please see attachment for instructions     Discussion   In 250 words total, answer the questions below with 4 evidence base scholarly articles. APA format. Discussion on access control and physical security. These areas found to be one or more points of weakness in audit 1. Discuss some common points of

Node.js

  Instructions Create a simple Node.js server (Save as w4_firstname_lastname.js) . Create a restful application similar to the one in lesson 4 (ReSTFul Web Services). Document the routing table, and the application you created. Submit your week 4 work in w4_firstname_lastname.txt (Please save the file as a text file and

Computer Science- Python Gurobi assignment

I need the output following these steps: Put all of these files into the same folder, Open the python file, If there is any error, check if any file is missing, It has 105 counties and 4 districts, so it will take a while to finish running. I need it

Research Project

Please follow the instructions attached below:  I have choose the topic from the list is:   PROJECT TITLE Firm RTOS – Balancing Real-Time Performance and Flexibility Please check the abstract from my file and write the research project. 

provide me java based interview question.

Core Java Interview Questions (Basic Level) 1. What is Java? Java is a high-level, object-oriented, platform-independent programming language developed by Sun Microsystems. 2. What are the features of Java?  Object-Oriented  Platform Independent (via JVM)  Secure and Robust  Multithreaded  Architecture Neutral  High Performance (via JIT

Dynamons world Mod APK

 What are the best tips for playing RPG games like Dynamons World? I recently found a great resource at that offers a lot of insights and even MOD APKs for Dynamons World, but I’d love to hear personal strategies and gameplay advice from the community too! ???????? 

459 w7

Follow the attach instructions to complete this work. Questions: 1. What is Generative AI and how is it similar/different to Traditional AI? 2. Do you believe that work created by Generative AI (e.g. ChatGPT) is comparable in quality to human created content?  What challenges and opportunities  does Generative AI pose

Computer Science WK3 Assignment

Please see attachment for instructions ISSC680 Week 3 Homework Assignment Instructions: Please provide a one-page response to the following topic utilizing supporting documentation obtained from the attach books and the Internet. APA format and reference. Topic: Differentiate between the different types of cryptographic algorithms.

Discussion and Replies

Please see attachment for instructions     Discussion   In 250 words total, answer the questions below with 4 evidence base scholarly articles. APA format. Based on this weeks readings, 1. Discuss some effective strategies for Security Awareness in your organization or 2. What you would like to see implemented