SlideShare una empresa de Scribd logo
1 de 22
Descargar para leer sin conexión
Get to Know
Google Cloud Platform
Presented by Mark Pevec
© Global Knowledge Training LLC. All rights reserved. Page 2
Agenda
• Get to Know GCP: an introduction
• Cloud Computing and GCP Architectures
• Networks and Regions
• Pricing
• Security
• Core Services
• Use Cases
• Deploy a REST API
• Ingesting Big Data
• Using pre-built Machine Learning for API’s
• Demo: Deploy a RESTAPI
Get to Know GCP:
An Introduction
© Global Knowledge Training LLC. All rights reserved. Page 4
Computing trends toward pay-as-you-go, fully
automated services
Now
User-configured, managed, and maintained
Next
Fully automated
Physical/Colo Serverless
Storage Processing Memory Network
Virtualized
Storage Processing Memory Network
© Global Knowledge Training LLC. All rights reserved. Page 5
GCP offers a range of computing architectures
Compute
Engine
App
Engine
Kubernetes
Engine
Cloud
Functions
Managed
services
Toward managed
infrastructure
Toward dynamic
infrastructure
IaaS Hybrid PaaS Serverless
logic
Automated
elastic
resources
© Global Knowledge Training LLC. All rights reserved. Page 6
Google network: 100,000s of miles of fiber cable,
8 subsea cables
Unity (US, JP) 2010
Monet (US, BR) 2017
Tannat (BR, UY, AR) 2017
Junior (Rio, Santos)
2017
FASTER (US, JP, TW) 2016
PLCN (HK, LA) 2019
Indigo (SG, ID, AU)
2019
SJC (JP, HK, SG) 2013
Edge node
locations >1000
Edge points of
presence >100
Network
Network sea
cable investments
© Global Knowledge Training LLC. All rights reserved. Page 7
Google Cloud Platform is organized into regions
and zones
S Carolina
N Virginia
Oregon
Iowa
Montreal
Los Angeles
3
4
3
3
3
3
Frankfurt
Belgium
London
FinlandNetherlands
3
33
2
3
São Paulo
3
Taiwan
Singapore
Mumbai
Sydney
Tokyo
3
2
3
3
Future region and
number of zones
Current region and
number of zones
3
© Global Knowledge Training LLC. All rights reserved. Page 8
Google is committed to environmental responsibility
100% carbon neutral
since 2007
One of the world’s
largest corporate
purchasers of
renewable energy
First data centers to
achieve ISO 14001
certification
© Global Knowledge Training LLC. All rights reserved. Page 9
Google offers customer-friendly pricing innovations
Billing in sub-
hour increments
For virtual
machines and
containers in the
cloud; data
processing &
other services
Discounts for
sustained use
Automatically
applied to virtual
machine use over
25% of a month
Custom VM
instance types
Pay only for the
resources you
need for your
application
© Global Knowledge Training LLC. All rights reserved. Page 10
Open APIs and open source mean customers can
leave
Open APIs;
compatibility with
open-source
services
Open source
for a rich
ecosystem
Multi-vendor-
friendly
technologies
Cloud Bigtable Google Stackdriver
Cloud Dataproc
Kubernetes Engine
Forseti Security
Kubernetes
© Global Knowledge Training LLC. All rights reserved. Page 11
Security is designed into Google’s technical
infrastructure
Layer Notable security measures (among others)
Operational security Intrusion detection systems; techniques to reduce insider
risk; employee U2F use; software development practices
Internet
communication
Google Front End; designed-in Denial of Service
protection
Storage services Encryption at rest
User identity Central identity service with support for U2F
Service deployment Encryption of inter-service communication
Hardware
infrastructure
Hardware design and provenance; secure boot stack;
premises security
© Global Knowledge Training LLC. All rights reserved. Page 12
Google Cloud Platform offers services for getting
value from data
12
BigQuery
Big Data
Pub/Sub Dataflow Dataproc Datalab
Compute
Compute
Engine
App EngineKubernetes
Engine
Storage
Cloud
Storage
Cloud SQL Cloud
Datastore
Bigtable
Machine
Learning
Speech
API
Machine
Learning
Translate APIVision APINatural
Language API
Cloud
Functions
Cloud
Spanner
© Global Knowledge Training LLC. All rights reserved. Page 13
There are four ways to interact with GCP
Cloud Platform
Console
Web user
interface
Cloud Shell
and Cloud
SDK
Command-
line interface
Cloud
Console
Mobile App
For iOS and
Android
REST-
based API
For custom
applications
>_
© Global Knowledge Training LLC. All rights reserved. Page 14
Example use-case: Deploy REST API
App Engine is a PaaS for building scalable applications
● App Engine makes deployment, maintenance, and
scalability easy so you can focus on innovation
● Especially suited for building scalable web
applications and mobile backends
© Global Knowledge Training LLC. All rights reserved. Page 15
Example use-case: Deploy REST API
Project
App Engine
App Servers
Application
instances
Application
instances
Application
instances
App Engine can access a
variety of services using
dedicated APIs1 Develop & test the web
application locally
2
Use the SDK to deploy to
App Engine
3
App Engine automatically scales
& reliably serves your web
application
Task
queues
Scheduled
tasks
Search
Memcache
Logs
© Global Knowledge Training LLC. All rights reserved. Page 16
Example use-case: Ingesting Big data into BigQuery
and performing OLAP workloads
● Provides near real-time interactive analysis of
massive datasets (hundreds of TBs)
● Query using SQL syntax (SQL 2011)
● No cluster maintenance is required.
© Global Knowledge Training LLC. All rights reserved. Page 17
Example use-case: Ingesting Big data into BigQuery
and performing OLAP workloads
© Global Knowledge Training LLC. All rights reserved. Page 18
Example use-case: Ingesting Big data into BigQuery
and performing OLAP workloads
Example: Complex query over 100B Rows
Execution time: 21s
• 4 TB of data read
• 100 Billion regular expressions run
• 278 GB shuffled
• 3600 HDD (@ 100MB/s)
Serial Execution time:
• 11.6 Hours to read 4 TB from disk (@ 100 MBps)
• 27 hours to run 100 Billion regexps (@ 1 μsec each)
• 37 minutes to shuffle 278 GB across the network (@ 1Gbps)
• 8800 CPUs (@ 1 μsec each)
SELECT language, SUM(views) as views
FROM (
SELECT title, language, MAX(views) as
views
FROM [bigquery-
samples:wikipedia_benchmark.Wiki100B]
WHERE REGEXP_MATCH(title, "G.*o.*")
GROUP EACH BY title, language
)
GROUP EACH BY language
ORDER BY views desc
© Global Knowledge Training LLC. All rights reserved. Page 19
Example use-case: Using pre-built Machine
Learning APIs for image or speech processing
Open source tool to build and run neural network models
● Wide platform support: CPU or GPU; mobile, server, or
cloud
Fully managed machine learning service
● Familiar notebook-based developer experience
● Optimized for Google infrastructure; integrates with
BigQuery and Cloud Storage
Pre-trained machine learning models built by Google
● Speech: Stream results in real time, detects 80 languages
● Vision: Identify objects, landmarks, text, and content
● Translate: Language translation including detection
● Natural language: Structure, meaning of text
Cloud ML
Machine Learning APIs
© Global Knowledge Training LLC. All rights reserved. Page 20
Example use-case: Using pre-built Machine
Learning APIs for image or speech processing
For structured data
Classification and
regression
Recommendation
Anomaly detection
For unstructured data
Image and video
analytics
Text analytics
20
© Global Knowledge Training LLC. All rights reserved. Page 21
Demo: Deploy REST API
Via App Engine (PaaS)
© Global Knowledge Training LLC. All rights reserved. Page 22
Learn More
Recommended Global Knowledge Courses
 Google Cloud Fundamentals: Core Infrastructure
 Architecting with GCP: Infrastructure
 Developing GCP Applications
 View the entire GCP training portfolio
Request a Private Group Training Session
 We can deliver GCP classes on-site to a team or group of students
 Private classes can also be partially virtual (some students virtual, some on-prem)
Additional Resources
• GCP Learning Path & Certification Track
• GCP blogs
• GCP whitepapers

Más contenido relacionado

Más de Global Knowledge Training

Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7Global Knowledge Training
 
What’s Next For Your Azure Certification Journey
What’s Next For Your Azure Certification JourneyWhat’s Next For Your Azure Certification Journey
What’s Next For Your Azure Certification JourneyGlobal Knowledge Training
 
Cisco's Intent-Based Networking and the Journey to Software Defined Networks
Cisco's Intent-Based Networking and the Journey to Software Defined NetworksCisco's Intent-Based Networking and the Journey to Software Defined Networks
Cisco's Intent-Based Networking and the Journey to Software Defined NetworksGlobal Knowledge Training
 
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Global Knowledge Training
 
The Essence of DevOps: What it Can Mean for You and Your Organization
The Essence of DevOps: What it Can Mean for You and Your OrganizationThe Essence of DevOps: What it Can Mean for You and Your Organization
The Essence of DevOps: What it Can Mean for You and Your OrganizationGlobal Knowledge Training
 
How to Make Agile Project Management Work in Your Organization
How to Make Agile Project Management Work in Your OrganizationHow to Make Agile Project Management Work in Your Organization
How to Make Agile Project Management Work in Your OrganizationGlobal Knowledge Training
 
What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?Global Knowledge Training
 
How the Channel Can Break Down the Barriers to Cloud Success
How the Channel Can Break Down the Barriers to Cloud Success How the Channel Can Break Down the Barriers to Cloud Success
How the Channel Can Break Down the Barriers to Cloud Success Global Knowledge Training
 
Tackling 5 Taboo Topics in Cybersecurity People Management
Tackling 5 Taboo Topics in Cybersecurity People ManagementTackling 5 Taboo Topics in Cybersecurity People Management
Tackling 5 Taboo Topics in Cybersecurity People ManagementGlobal Knowledge Training
 
How the New PMP Exam and PDU Structure Impacts You
How the New PMP Exam and PDU Structure Impacts YouHow the New PMP Exam and PDU Structure Impacts You
How the New PMP Exam and PDU Structure Impacts YouGlobal Knowledge Training
 
The Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business CybersecurityThe Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business CybersecurityGlobal Knowledge Training
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireGlobal Knowledge Training
 

Más de Global Knowledge Training (20)

Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
 
What’s Next For Your Azure Certification Journey
What’s Next For Your Azure Certification JourneyWhat’s Next For Your Azure Certification Journey
What’s Next For Your Azure Certification Journey
 
Cisco's Intent-Based Networking and the Journey to Software Defined Networks
Cisco's Intent-Based Networking and the Journey to Software Defined NetworksCisco's Intent-Based Networking and the Journey to Software Defined Networks
Cisco's Intent-Based Networking and the Journey to Software Defined Networks
 
How to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity TeamHow to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity Team
 
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
 
How to Build a Web Server with AWS Lambda
How to Build a Web Server with AWS LambdaHow to Build a Web Server with AWS Lambda
How to Build a Web Server with AWS Lambda
 
The Essence of DevOps: What it Can Mean for You and Your Organization
The Essence of DevOps: What it Can Mean for You and Your OrganizationThe Essence of DevOps: What it Can Mean for You and Your Organization
The Essence of DevOps: What it Can Mean for You and Your Organization
 
How to Migrate a Web App to AWS
How to Migrate a Web App to AWSHow to Migrate a Web App to AWS
How to Migrate a Web App to AWS
 
How to Make Agile Project Management Work in Your Organization
How to Make Agile Project Management Work in Your OrganizationHow to Make Agile Project Management Work in Your Organization
How to Make Agile Project Management Work in Your Organization
 
What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?
 
How the Channel Can Break Down the Barriers to Cloud Success
How the Channel Can Break Down the Barriers to Cloud Success How the Channel Can Break Down the Barriers to Cloud Success
How the Channel Can Break Down the Barriers to Cloud Success
 
How to Avoid Cloud Migration Pitfalls
How to Avoid Cloud Migration PitfallsHow to Avoid Cloud Migration Pitfalls
How to Avoid Cloud Migration Pitfalls
 
Tackling 5 Taboo Topics in Cybersecurity People Management
Tackling 5 Taboo Topics in Cybersecurity People ManagementTackling 5 Taboo Topics in Cybersecurity People Management
Tackling 5 Taboo Topics in Cybersecurity People Management
 
Using Apache Spark with IBM SPSS Modeler
Using Apache Spark with IBM SPSS ModelerUsing Apache Spark with IBM SPSS Modeler
Using Apache Spark with IBM SPSS Modeler
 
How the New PMP Exam and PDU Structure Impacts You
How the New PMP Exam and PDU Structure Impacts YouHow the New PMP Exam and PDU Structure Impacts You
How the New PMP Exam and PDU Structure Impacts You
 
The Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business CybersecurityThe Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business Cybersecurity
 
What's New in Windows 10
What's New in Windows 10What's New in Windows 10
What's New in Windows 10
 
Aligning IT and Business for Better Results
Aligning IT and Business for Better ResultsAligning IT and Business for Better Results
Aligning IT and Business for Better Results
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and Sourcefire
 
Proving Project Value
Proving Project ValueProving Project Value
Proving Project Value
 

Último

Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 

Último (20)

Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 

Get to Know Google Cloud Platform

  • 1. Get to Know Google Cloud Platform Presented by Mark Pevec
  • 2. © Global Knowledge Training LLC. All rights reserved. Page 2 Agenda • Get to Know GCP: an introduction • Cloud Computing and GCP Architectures • Networks and Regions • Pricing • Security • Core Services • Use Cases • Deploy a REST API • Ingesting Big Data • Using pre-built Machine Learning for API’s • Demo: Deploy a RESTAPI
  • 3. Get to Know GCP: An Introduction
  • 4. © Global Knowledge Training LLC. All rights reserved. Page 4 Computing trends toward pay-as-you-go, fully automated services Now User-configured, managed, and maintained Next Fully automated Physical/Colo Serverless Storage Processing Memory Network Virtualized Storage Processing Memory Network
  • 5. © Global Knowledge Training LLC. All rights reserved. Page 5 GCP offers a range of computing architectures Compute Engine App Engine Kubernetes Engine Cloud Functions Managed services Toward managed infrastructure Toward dynamic infrastructure IaaS Hybrid PaaS Serverless logic Automated elastic resources
  • 6. © Global Knowledge Training LLC. All rights reserved. Page 6 Google network: 100,000s of miles of fiber cable, 8 subsea cables Unity (US, JP) 2010 Monet (US, BR) 2017 Tannat (BR, UY, AR) 2017 Junior (Rio, Santos) 2017 FASTER (US, JP, TW) 2016 PLCN (HK, LA) 2019 Indigo (SG, ID, AU) 2019 SJC (JP, HK, SG) 2013 Edge node locations >1000 Edge points of presence >100 Network Network sea cable investments
  • 7. © Global Knowledge Training LLC. All rights reserved. Page 7 Google Cloud Platform is organized into regions and zones S Carolina N Virginia Oregon Iowa Montreal Los Angeles 3 4 3 3 3 3 Frankfurt Belgium London FinlandNetherlands 3 33 2 3 São Paulo 3 Taiwan Singapore Mumbai Sydney Tokyo 3 2 3 3 Future region and number of zones Current region and number of zones 3
  • 8. © Global Knowledge Training LLC. All rights reserved. Page 8 Google is committed to environmental responsibility 100% carbon neutral since 2007 One of the world’s largest corporate purchasers of renewable energy First data centers to achieve ISO 14001 certification
  • 9. © Global Knowledge Training LLC. All rights reserved. Page 9 Google offers customer-friendly pricing innovations Billing in sub- hour increments For virtual machines and containers in the cloud; data processing & other services Discounts for sustained use Automatically applied to virtual machine use over 25% of a month Custom VM instance types Pay only for the resources you need for your application
  • 10. © Global Knowledge Training LLC. All rights reserved. Page 10 Open APIs and open source mean customers can leave Open APIs; compatibility with open-source services Open source for a rich ecosystem Multi-vendor- friendly technologies Cloud Bigtable Google Stackdriver Cloud Dataproc Kubernetes Engine Forseti Security Kubernetes
  • 11. © Global Knowledge Training LLC. All rights reserved. Page 11 Security is designed into Google’s technical infrastructure Layer Notable security measures (among others) Operational security Intrusion detection systems; techniques to reduce insider risk; employee U2F use; software development practices Internet communication Google Front End; designed-in Denial of Service protection Storage services Encryption at rest User identity Central identity service with support for U2F Service deployment Encryption of inter-service communication Hardware infrastructure Hardware design and provenance; secure boot stack; premises security
  • 12. © Global Knowledge Training LLC. All rights reserved. Page 12 Google Cloud Platform offers services for getting value from data 12 BigQuery Big Data Pub/Sub Dataflow Dataproc Datalab Compute Compute Engine App EngineKubernetes Engine Storage Cloud Storage Cloud SQL Cloud Datastore Bigtable Machine Learning Speech API Machine Learning Translate APIVision APINatural Language API Cloud Functions Cloud Spanner
  • 13. © Global Knowledge Training LLC. All rights reserved. Page 13 There are four ways to interact with GCP Cloud Platform Console Web user interface Cloud Shell and Cloud SDK Command- line interface Cloud Console Mobile App For iOS and Android REST- based API For custom applications >_
  • 14. © Global Knowledge Training LLC. All rights reserved. Page 14 Example use-case: Deploy REST API App Engine is a PaaS for building scalable applications ● App Engine makes deployment, maintenance, and scalability easy so you can focus on innovation ● Especially suited for building scalable web applications and mobile backends
  • 15. © Global Knowledge Training LLC. All rights reserved. Page 15 Example use-case: Deploy REST API Project App Engine App Servers Application instances Application instances Application instances App Engine can access a variety of services using dedicated APIs1 Develop & test the web application locally 2 Use the SDK to deploy to App Engine 3 App Engine automatically scales & reliably serves your web application Task queues Scheduled tasks Search Memcache Logs
  • 16. © Global Knowledge Training LLC. All rights reserved. Page 16 Example use-case: Ingesting Big data into BigQuery and performing OLAP workloads ● Provides near real-time interactive analysis of massive datasets (hundreds of TBs) ● Query using SQL syntax (SQL 2011) ● No cluster maintenance is required.
  • 17. © Global Knowledge Training LLC. All rights reserved. Page 17 Example use-case: Ingesting Big data into BigQuery and performing OLAP workloads
  • 18. © Global Knowledge Training LLC. All rights reserved. Page 18 Example use-case: Ingesting Big data into BigQuery and performing OLAP workloads Example: Complex query over 100B Rows Execution time: 21s • 4 TB of data read • 100 Billion regular expressions run • 278 GB shuffled • 3600 HDD (@ 100MB/s) Serial Execution time: • 11.6 Hours to read 4 TB from disk (@ 100 MBps) • 27 hours to run 100 Billion regexps (@ 1 μsec each) • 37 minutes to shuffle 278 GB across the network (@ 1Gbps) • 8800 CPUs (@ 1 μsec each) SELECT language, SUM(views) as views FROM ( SELECT title, language, MAX(views) as views FROM [bigquery- samples:wikipedia_benchmark.Wiki100B] WHERE REGEXP_MATCH(title, "G.*o.*") GROUP EACH BY title, language ) GROUP EACH BY language ORDER BY views desc
  • 19. © Global Knowledge Training LLC. All rights reserved. Page 19 Example use-case: Using pre-built Machine Learning APIs for image or speech processing Open source tool to build and run neural network models ● Wide platform support: CPU or GPU; mobile, server, or cloud Fully managed machine learning service ● Familiar notebook-based developer experience ● Optimized for Google infrastructure; integrates with BigQuery and Cloud Storage Pre-trained machine learning models built by Google ● Speech: Stream results in real time, detects 80 languages ● Vision: Identify objects, landmarks, text, and content ● Translate: Language translation including detection ● Natural language: Structure, meaning of text Cloud ML Machine Learning APIs
  • 20. © Global Knowledge Training LLC. All rights reserved. Page 20 Example use-case: Using pre-built Machine Learning APIs for image or speech processing For structured data Classification and regression Recommendation Anomaly detection For unstructured data Image and video analytics Text analytics 20
  • 21. © Global Knowledge Training LLC. All rights reserved. Page 21 Demo: Deploy REST API Via App Engine (PaaS)
  • 22. © Global Knowledge Training LLC. All rights reserved. Page 22 Learn More Recommended Global Knowledge Courses  Google Cloud Fundamentals: Core Infrastructure  Architecting with GCP: Infrastructure  Developing GCP Applications  View the entire GCP training portfolio Request a Private Group Training Session  We can deliver GCP classes on-site to a team or group of students  Private classes can also be partially virtual (some students virtual, some on-prem) Additional Resources • GCP Learning Path & Certification Track • GCP blogs • GCP whitepapers

Notas del editor

  1. The first wave of the trend towards cloud computing was colocation. Colocation gave users the financial efficiency of renting physical space, instead of investing in data center real estate. Virtualized data centers of today, the second wave, share similarities with the private data centers and colocation facilities of decades past. The components of virtualized data centers match the physical building blocks of hosted computing—servers, CPUs, disks, load balancers, and so on—but now they are virtual devices. Virtualization does provide a number of benefits: your development teams can move faster, and you can turn capital expenses into operating expenses. With virtualization you still maintain the infrastructure; it is still a user-controlled/user-configured environment. About 10 years ago, Google realized that its business couldn’t move fast enough within the confines of the virtualization model. So Google switched to a container-based architecture—a fully automated, elastic third-wave cloud that consists of a combination of automated services and scalable data. Services automatically provision and configure the infrastructure used to run applications. Today Google Cloud Platform makes this third-wave cloud available to Google customers.
  2. Virtualized data centers brought you infrastructure as a service (IaaS) and platform as a service (PaaS) offerings. IaaS offerings provide you with raw compute, storage, and network, organized in ways familiar to you from physical and virtualized data centers. PaaS offerings, on the other hand, bind your code to libraries that provide access to the infrastructure your application needs, thus allow you to focus on your application logic. In the IaaS model, you pay for what you allocate. In the PaaS model, you pay for what you use. As cloud computing has evolved, the momentum has shifted toward managed infrastructure and managed services.
  3. According to some publicly available estimates, Google’s network carries as much as 40% of the world’s internet traffic every day. Google’s network is the largest network of its kind on Earth. Google has invested billions of dollars over the years to build it. It is designed to give customers the highest possible throughput and lowest possible latencies for their applications. The network interconnects at more than 90 Internet exchanges and more than 100 points of presence worldwide. When an Internet user sends traffic to a Google resource, Google responds to the user's request from an Edge Network location that will provide the lowest latency. Google’s edge caching network sites content close to end users to minimize latency.
  4. Regions and zones Regions are independent geographic areas that consist of zones. Locations within regions tend to have round-trip network latencies of under 5 milliseconds on the 95th percentile. A zone is a deployment area for Google Cloud Platform resources within a region. Think of a zone as a single failure domain within a region. In order to deploy fault-tolerant applications with high availability, you should deploy your applications across multiple zones in a region to help protect against unexpected failures. To protect against the loss of an entire region due to natural disaster, you should have a disaster recovery plan and know how to bring up your application in the unlikely event that your primary region is lost. For more information on the specific resources available within each location option, see Google’s Global Data Center Locations. Google Cloud Platform's services and resources can be zonal, regional, or managed by Google across multiple regions. For more information on what these options mean for your data, see geographic management of data. Draw Hierarchy Zonal resources Zonal resources operate within a single zone. If a zone becomes unavailable, all of the zonal resources in that zone are unavailable until service is restored. Google Compute Engine VM instance resides within a specific zone. Regional resources Regional resources are deployed with redundancy within a region. This gives them higher availability relative to zonal resources. Multi-regional resources A few Google Cloud Platform services are managed by Google to be redundant and distributed within and across regions. These services optimize availability, performance, and resource efficiency. As a result, these services require a trade-off on either latency or the consistency model. These trade-offs are documented on a product-specific basis. The following services have one or more multi-regional deployments in addition to any regional deployments: Google App Engine and its features Google Cloud Datastore Google Cloud Storage Google BigQuery
  5. This image shows Google’s data center in Hamina, Finland. The facility is one of the most advanced and efficient data centers in the Google fleet. Its cooling system, which uses sea water from the Bay of Finland, reduces energy use and is the first of its kind anywhere in the world. Google is one of the world’s largest corporate purchasers of wind and solar energy. Google has been 100% carbon neutral since 2007, and will shortly reach 100% renewable energy sources for its data centers. The virtual world is built on physical infrastructure, and all those racks of humming servers use vast amounts of energy. Together, all existing data centers use roughly 2% of the world’s electricity. So Google works to make data centers run as efficiently as possible. Google’s data centers were the first to achieve ISO 14001 certification, a standard that maps out a framework for improving resource efficiency and reducing waste.
  6. Google was the first major cloud provider to deliver per-second billing for its Infrastructure-as-a-Service compute offering, Google Compute Engine. Per-second billing is offered for users of Compute Engine, Kubernetes Engine (container infrastructure as a service), Cloud Dataproc (the open-source Big Data system Hadoop as a service), and App Engine flexible environment VMs (a Platform as a Service). Google Compute Engine offers automatically applied sustained-use discounts, which are automatic discounts that you get for running a virtual-machine instance for a significant portion of the billing month. Specifically, when you run an instance for more than 25% of a month, Compute Engine automatically gives you a discount for every incremental minute you use for that instance. Custom virtual machine types allow Google Compute Engine virtual machines to be fine-tuned for their applications, so that you can tailor your pricing for your workloads. Try the online pricing calculator to help estimate your costs.
  7. Google gives customers the ability to run their applications elsewhere if Google becomes no longer the best provider for their needs. This includes: Using Open APIs. Google services are compatible with open-source products. For example, Google Cloud Bigtable, a horizontally scalable managed database: Bigtable uses the Apache HBase interface, which gives customers the benefit of code portability. Another example: Google Cloud Dataproc offers the open-source big data environment Hadoop as a managed service. Google publishes key elements of its technology, using open-source licenses, to create ecosystems that provide customers with options other than Google. For example, TensorFlow, an open-source software library for machine learning developed inside Google, is at the heart of a strong open-source ecosystem. Google provides interoperability at multiple layers of the stack. Kubernetes and Google Kubernetes Engine give customers the ability to mix and match microservices running across different clouds. Google Stackdriver lets customers monitor workloads across multiple cloud providers.
  8. Hardware design and provenance: Both the server boards and the networking equipment in Google data centers are custom-designed by Google. Google also designs custom chips, including a hardware security chip that is currently being deployed on both servers and peripherals. Secure boot stack: Google server machines use a variety of technologies to ensure that they are booting the correct software stack, such as cryptographic signatures over the BIOS, bootloader, kernel, and base operating system image. Premises security: Google designs and builds its own data centers, which incorporate multiple layers of physical security protections. Access to these data centers is limited to only a very small fraction of Google employees. Google additionally hosts some servers in third-party data centers, where we ensure that there are Google-controlled physical security measures on top of the security layers provided by the data center operator. Encryption of inter-service communication: Google’s infrastructure provides cryptographic privacy and integrity for remote procedure call (“RPC”) data on the network. Google’s services communicate with each other using RPC calls. The infrastructure automatically encrypts all infrastructure RPC traffic which goes between data centers. Google has started to deploy hardware cryptographic accelerators that will allow it to extend this default encryption to all infrastructure RPC traffic inside Google data centers. User identity: Google’s central identity service, which usually manifests to end users as the Google login page, goes beyond asking for a simple username and password. The service also intelligently challenges users for additional information based on risk factors such as whether they have logged in from the same device or a similar location in the past. Users also have the option of employing second factors when signing in, including devices based on the Universal 2nd Factor (U2F) open standard Encryption at rest: Most applications at Google access physical storage indirectly via storage services, and encryption (using centrally managed keys) is applied at the layer of these storage services. Google also enables hardware encryption support in hard drives and SSDs. Google Front End (“GFE”): Google services that want to make themselves available on the Internet register themselves with an infrastructure service called the Google Front End, which ensures that all TLS connections are terminated using correct certificates and following best practices such as supporting perfect forward secrecy. The GFE additionally applies protections against Denial of Service attacks. Denial of Service (“DoS”) protection: The sheer scale of its infrastructure enables Google to simply absorb many DoS attacks. Google also has multi-tier, multi-layer DoS protections that further reduce the risk of any DoS impact on a service running behind a GFE. Intrusion detection: Rules and machine intelligence give operational security engineers warnings of possible incidents. Google conducts Red Team exercises to measure and improve the effectiveness of its detection and response mechanisms. Reducing insider risk: Google aggressively limits and actively monitors the activities of employees who have been granted administrative access to the infrastructure. Employee U2F use: To guard against phishing attacks against Google employees, employee accounts require use of U2F-compatible Security Keys. Software development practices: Google employs central source control and requires two-party review of new code. Google also provides its developers libraries that prevent them from introducing certain classes of security bugs. Google also runs a Vulnerability Rewards Program where we pay anyone who is able to discover and inform us of bugs in our infrastructure or applications. For more information about Google’s technical-infrastructure security, see https://cloud.google.com/security/security-design/
  9. App Engine is a platform for building scalable web applications and mobile backends. It allows you to concentrate on innovating your applications by managing the application infrastructure for you. For example, App Engine manages the hardware and networking infrastructure required to run your code. App Engine provides you with built-in services and APIs such as NoSQL datastores, memcache, load balancing, health checks, application logging, and a user authentication API, common to most applications. App Engine will scale your application automatically in response to the amount of traffic it receives so you only pay for the resources you use. Just upload your code and Google will manage your app's availability. There are no servers for you to provision or maintain. Security Scanner automatically scans and detects common web application vulnerabilities. It enables early threat identification and delivers very low false-positive rates. You can easily set up, run, schedule, and manage security scans from the Google Cloud Platform Console. App Engine works with popular development tools such as Eclipse, IntelliJ, Maven, Git, Jenkins, and PyCharm. You can build your apps with the tools you love without changing your workflow.
  10. App engine will take care of managing your containers, autoscaling, and load balancing. Just deploy your code to GCP.
  11. BigQuery is Google's fully managed, petabyte scale, low cost analytics data warehouse. BigQuery is NoOps: there is no infrastructure to manage and you don't need a database administrator, so you can focus on analyzing data to find meaningful insights, use familiar SQL, and take advantage of our pay-as-you-go model. BigQuery is a powerful big data analytics platform used by all types of organizations, from startups to Fortune 500 companies. BigQuery’s features: Flexible Data Ingestion Load your data from Cloud Storage or Cloud Datastore, or stream it into BigQuery at 100,000 rows per second to enable real-time analysis of your data. Global Availability You have the option to store your BigQuery data in European locations while continuing to benefit from a fully managed service, now with the option of geographic data control, without low-level cluster maintenance. Security and Permissions You have full control over who has access to the data stored in BigQuery. If you share datasets, doing so will not impact your cost or performance; those you share with pay for their own queries. Cost Controls BigQuery provides cost control mechanisms that enable you to cap your daily costs at an amount that you choose. For more information, see Cost Controls. Highly Available Transparent data replication in multiple geographies means that your data is available and durable even in the case of extreme failure modes. Super Fast Performance Run super-fast SQL queries against multiple terabytes of data in seconds, using the processing power of Google's infrastructure. Fully Integrated In addition to SQL queries, you can easily read and write data in BigQuery via Cloud Dataflow, Spark, and Hadoop. Connect with Google Products You can automatically export your data from Google Analytics Premium into BigQuery and analyze datasets stored in Google Cloud Storage, Google Drive, and Google Sheets. BigQuery can make Create, Replace, Update, and Delete changes to databases, subject to some limitations and with certain known issues.
  12. Notes: Popular mobile games can attract millions of players and generate terabytes of game-related data in a short burst of time. This places extraordinary pressure on the infrastructure powering these games and requires scalable data analytics services to provide timely, actionable insights in a cost-effective way. To address these needs, a growing number of successful gaming companies use Google’s web-scale analytics services to create personalized experiences for their players. They use telemetry and smart instrumentation to gain insight into how players engage with the game and to answer questions like: At what game level are players stuck? What virtual goods did they buy? And what's the best way to tailor the game to appeal to both casual and hardcore players? A new reference architecture describes how you can collect, archive and analyze vast amounts of gaming telemetry data using Google Cloud Platform’s data analytics products. The architecture demonstrates two patterns for analyzing mobile game events: Batch processing: This pattern helps you process game logs and other large files in a fast, parallelized manner. For example, leading mobile gaming company DeNA moved to BigQuery from Hadoop to get faster query responses for their log file analytics pipeline. Real-time processing: Use this pattern when you want to understand what's happening in the game right now. Cloud Pub/Sub and Cloud Dataflow provide a fully managed way to perform a number of data-processing tasks like data cleansing and fraud detection in real-time. For example, you can highlight a player with maximum hit-points outside the valid range. Real-time processing is also a great way to continuously update dashboards of key game metrics, like how many active users are currently logged in or which in-game items are most popular. Some Cloud Dataflow features are especially useful in a mobile context since messages may be delayed from the source due to mobile Internet connection issues or batteries running out. Cloud Dataflow's built-in session windowing functionality and triggers aggregate events based on the actual time they occurred (event time) as opposed to the time they're processed so that you can still group events together by user session even if there's a delay from the source. But why choose between one or the other pattern? A key benefit of this architecture is that you can write your data pipeline processing once and execute it in either batch or streaming mode without modifying your codebase. So if you start processing your logs in batch mode, you can easily move to real-time processing in the future. This is an advantage of the high-level Cloud Dataflow model that was released as open source by Google. Cloud Dataflow loads the processed data into one or more BigQuery tables. BigQuery is built for very large scale, and allows you to run aggregation queries against petabyte-scale datasets with fast response times. This is great for interactive analysis and data exploration, like the example screenshot above, where a simple BigQuery SQL query dynamically creates a Daily Active Users (DAU) graph using Google Cloud Datalab.
  13. This is an example query running over 100 Billion rows (each Row describes one Wikipedia article in a particular language)
  14. Google Cloud Platform provides several ways to incorporate Machine Learning into your applications and services. You can either work with your own models or use pre-packaged APIs.
  15. Cloud Machine Learning has these use cases for structured data: Classification/Regression Customer churn analysis Product diagnostics Forecasting Recommendation Content personalization Product X-sells/up-sells Anomaly Detection Fraud detection Asset sensor diagnostics Log metric anomalies Cloud Machine Learning has these use cases for unstructured data: Image Analytics Identify damaged shipments Explicit content classification Identify “styles” in images Text Analytics Call center log analysis Language identification Topic classification Sentiment analysis
  16. I’ll deploy a simple set of REST API microservices to App Engine