Difference between revisions of "GC Enterprise Architecture/Framework/TechnologyGuide"
Jump to navigation
Jump to search
m |
|||
(One intermediate revision by one other user not shown) | |||
Line 1: | Line 1: | ||
− | + | {{OCIO GCEA Header}} | |
<multilang> | <multilang> | ||
− | @en| | + | @en|__TOC__ |
== Technology architecture == | == Technology architecture == | ||
− | Technology architecture is an important enabler of highly available and adaptable solutions that must be aligned with the chosen application architecture. Cloud adoption provides many potential advantages by mitigating the logistical constraints that often negatively impacted legacy solutions hosted “on premises.” However, the application architecture must be able to enable these advantages. | + | Technology architecture is defined as the management and organization of technical equipment and devices of a business. Technology architecture is an important enabler of highly available and adaptable solutions that must be aligned with the chosen application architecture. Cloud adoption provides many potential advantages by mitigating the logistical constraints that often negatively impacted legacy solutions hosted “on premises.” However, the application architecture must be able to enable these advantages. Therefore, objectives for cloud solutions must be implemented in a way that supports the application architecture. |
=== Use cloud first === | === Use cloud first === | ||
Line 137: | Line 137: | ||
− | @fr| | + | @fr|__TOC__ |
Latest revision as of 09:11, 3 February 2023
Technology architecture[edit | edit source]
Technology architecture is defined as the management and organization of technical equipment and devices of a business. Technology architecture is an important enabler of highly available and adaptable solutions that must be aligned with the chosen application architecture. Cloud adoption provides many potential advantages by mitigating the logistical constraints that often negatively impacted legacy solutions hosted “on premises.” However, the application architecture must be able to enable these advantages. Therefore, objectives for cloud solutions must be implemented in a way that supports the application architecture.
Use cloud first[edit | edit source]
- adopt the use of the GC Accelerators to ensure proper security and access controls
How to achieve: * Summarize which cloud usage profile does the architecture align to and why * Summarize which cloud connection pattern does the architecture align to and why
Tools: * Cloud Reference Architecture * Cloud Assessment Framework * Summary of Cloud Access Scenarios and Usage Profiles
- enforce this order of preference: software as a service (SaaS) first, then platform as a service (PaaS), and lastly infrastructure as a service (IaaS)
How to achieve: * Summarize how the architecture, based on the TBS Right Cloud Assessment Tool, allows for cloud service model of how: * The architecture can be implemented using a GC SaaS environment, which has been identified as a possible fit, or * The architecture can be implemented using a Public SaaS environment, which has been identified as a possible fit, or * The architecture can be implemented using a GC PaaS environment, which has been identified as a possible fit, or: * The architecture can be implemented using Public PaaS environment, which has been identified as a possible fit.
Tools: * Cloud Reference Architecture * Cloud Assessment Framework
- fulfill cloud services through SSC Cloud‑Brokering Services
How to achieve: * Confirm the Team is acquiring cloud services through SSC Cloud Brokering Services. Please include the SSC Request number
Tools: * Contact Cloud COE
- enforce this order of preference: public cloud first, then hybrid cloud, then private cloud, and lastly non‑cloud (on‑premises) solutions
How to achieve: * Summarize how the architecture, based on the TBS Right Cloud Assessment Tool, allows for public cloud, including: * The data, being managed by the architecture, is PBMM or lower, and stakeholders have not raised concerns about deployment to the public cloud. * A costing model / budget that is available to support an Operational Expense Model. The costs will rise and fall with the consumption of resources. * The implementation of application(s), which can operate in a cloud environment and any required virtualized or dedicated hardware, is available in a cloud environment. * The implementation of application(s) which can operate on the standardized offerings and SLAs of public cloud. * The implementation of applications are not susceptible to latency issues, which may arise due to traffic moving through an additional circuit. * The implementation of applications, which do not have voluminous transactions with an on-premises database or application.
Tools: * Cloud Reference Architecture * Cloud Assessment Framework
- design for cloud mobility and develop an exit strategy to avoid vendor lock‑in
How to achieve: * Summary how the architecture allows for the execution of an exit strategy to off-board from that vendor
Tools: * Solution Architecture * Refer YDG GC EARB
Design for performance, availability and scalability[edit | edit source]
- ensure response times meet user needs, and critical services are highly available
How to achieve: * Summarize how the architecture is able to meet the user response time requirements, and achieve the user response time objectives, including: * The ability to trace how the response time requirements and objectives will be met. * The capacity requirements (e.g. expected normal traffic, peak traffic, expected traffic grow, etc.) that the architecture needs to meet. * The ability to trace how the availability requirements and objectives will be met.
Tools: * non-functional requirements
- support zero‑downtime deployments for planned and unplanned maintenance
How to achieve: * Summarize how the architecture is able to support zero-downtime deployments for planned and unplanned maintenance, including: * The planned Windows maintenance for the solution to support backups and length of Windows maintenance. * The procedure for planning, scheduling and executing the planned downtime. * The ability to be deployed in a manner that minimizes or limits service disruption, and which is known as zero downtime deployments. * The acceptable measures for unplanned downtime.
Tools: * non-functional requirements
- use distributed architectures, assume failure will happen, handle errors gracefully, and monitor performance and behaviour actively
How to achieve: * Summarize how the architecture utilizes distributed architectures, which assume that a failure will happen, handle errors gracefully and monitor actively, including: * The ability to trace how the recoverability requirements and objectives will be met; and, * The ability to be deployed in a distributed environment.
Tools: * non-functional requirements
- establish architectures that supports new technology insertion with minimal disruption to existing programs and services
How to achieve: * Summarize how the architecture allows the insertion of new technology with minimal disruption
Tools: * non-functional requirements
- control technical diversity; design systems based on modern technologies and platforms already in use
How to achieve: * Summarize the technology standards’ state (emerging, baseline, containment or retirement) of the products required/recommended to implement the architecture. For those products in the containment or retired state please provide rational for selecting those products * Identify new technology standards required by the architecture
Tools: * non-functional requirements
Follow DevSecOps principles[edit | edit source]
- use continuous integration and continuous deployments
How to achieve: * Summarize how the architecture can be deployed following a continuous integration approach * Summarize how the architecture can be deployed following a continuous deployment approach.
Tools: * CICP mesh
- ensure automated testing occurs for security and functionality
How to achieve: * Summarize the automated security and functionality testing that will be/has been executed on the solution.
- include your users and other stakeholders as part of the DevSecOps process, which refers to the concept of making software security a core part of the overall software delivery process
How to achieve: * Summarize the role and responsibilities users and other stakeholders have in DevSecOps processes.
Tools: * Project Charter