Welcome!

Containers Expo Blog Authors: Liz McMillan, Pat Romanski, Zakia Bouachraoui, Elizabeth White, Yeshim Deniz

Related Topics: Containers Expo Blog, Microservices Expo, @CloudExpo

Containers Expo Blog: Article

Cloud Transition Methodology - Approach and Best Practices

A step-by-step approach from the datacenter to the cloud

Service Transition, which is one of the key  publications in the Service life cycle as defined by ITIL, has the following goals.

  • Transition Services from the current environment to new environment
  • Set customer expectations on how the changed service can be used
  • Ensure that there are minimal or no impact to the business

With this basic description about the service transition,  it is very important to plan for a Service Transition from ‘On Premise environment'  to a ‘Cloud Environment', and the below steps will ensure the success.

The following steps are for the transition of a ‘On Premise' application to a Public Cloud on a IaaS platform like EC2 or to a PaaS platform like Azure. However transition to SaaS is slightly different and will be covered in a different article.

Cloud Transition Scope

  • Existing ‘On Premise' application is transferred to a Public Cloud in an IaaS or PaaS model
  • Existing Support Staff will continue to Support the application after it is moved to Cloud
  • There will be reduction in Support from Infrastructure point of view
  • Application Support will continue to be done by existing support staff
  • There will be a External Cloud Consultant who will be part of the transition and provide knowledge transfer to the existing support staff
  • Existing Support Staff will continue with Application maintenance after the successful transition

Cloud Transition Steps
While  the Transition Methodology has been tailored to customized frameworks by several leading  IT service organizations, they basically  consist of four steps:

  1. Planning
  2. Implementation
  3. Verification
  4. Sign Off Or Closure

1. Cloud Transition Planning

  • Identify and form the Cloud Transition Management team which consists of a transition organization (enterprise) key staff in the applications , organization IT maintenance staff , SPOC from the Cloud Service Provider Organization and ideally external consultants with expertise on Cloud Computing principles and Virtualization
  • Establish infrastructure and network connectivity between the Transition organization to Cloud service provider, we should take decisions on , whether to use which data center region to choose, whether to use Virtual Private Cloud and other accounting related information with the Cloud Service Provider
  • Plan for Knowledge Transfer to your existing business users and support staff in a Cloud Managed environment
  • Plan for dynamic Scaling Options, on how much should be the initial Compute and Storage capacity and how to adapt to the dynamic infrastructure capabilities, what kind of load balancing scheme to be used.

2. Cloud Transition Implementation

  • Once the Cloud Provider platform options have been identified, there needs to be a pilot deployment of the application from ‘On Premise' to the cloud.
  • Training should be initiated to the business users for using the cloud-based system
  • Knowledge transfer activities for IT support staff with the help of an external cloud management consultant
  • KT Plans should target areas like
        • o General principles about Cloud Platforms
        • o Concept of Machines Images and Virtual Machines
        • o Concept of Virtual Storage
        • o Elastic IP and other static IP usage
        • o Dynamic Infrastructure and Elasticity
        • o Cloud Platform Monitoring Options
        • o Cloud Platform Management Options
  • As we will be having a parallel run of the application on the On Premise data center as well as the public cloud, Primary support for the Cloud Platform should be the external consultant and the secondary support will be the internal IT staff

Cloud Transition Verification

  • After the desired period of a parallel run, and with the primary support of an external consultant, there will be a ‘Reverse Knowledge Transfer' from the internal IT staff to assess the extent of knowledge imparted to them
  • There will be brief period of support, where the internal IT staff will be primary support and external consultant will be secondary support
  • Update the documentation, best practices and other artifacts so that the in house IT staff can continue with support on the cloud platform

Cloud Transition Signoff

  • At this time, the in-house IT staff are fully trained in managing the application on a cloud platform and the application is working as per the business needs
  • Shutdown the on-premise data center application and there is no need for a further parallel run
  • Archive the data from the on-premise data center application for legal and compliance needs
  • External Consultant for Cloud Monitoring and Management can be relived to be taken up the internal IT Staff

Best Practices

  • Moving to Cloud will be big paradigm shift for Business users, Support Staff and Senior Management
  • And hence the impact should be minimized and there should not be a sudden big bang change
  • Pilot run with parallel activities between ‘On Premise' and Cloud will be useful
  • The movement should be As per , ‘Lift and Shift Policy', so that we do not change any application change during the movement to Cloud
  • Follow the principle of ‘Make One Change At A Time' and do not get tempted to ‘Transformation' while the Transition is going on
  • Get the buy in from all the stake holders, so that it is sponsored with the top management
  • The Below diagram summarizes the Cloud Transition Methodology for the above given scenario.

More Stories By Srinivasan Sundara Rajan

Highly passionate about utilizing Digital Technologies to enable next generation enterprise. Believes in enterprise transformation through the Natives (Cloud Native & Mobile Native).

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
LogRocket helps product teams develop better experiences for users by recording videos of user sessions with logs and network data. It identifies UX problems and reveals the root cause of every bug. LogRocket presents impactful errors on a website, and how to reproduce it. With LogRocket, users can replay problems.
Data Theorem is a leading provider of modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere. The Data Theorem Analyzer Engine continuously scans APIs and mobile applications in search of security flaws and data privacy gaps. Data Theorem products help organizations build safer applications that maximize data security and brand protection. The company has detected more than 300 million application eavesdropping incidents and currently secu...
Rafay enables developers to automate the distribution, operations, cross-region scaling and lifecycle management of containerized microservices across public and private clouds, and service provider networks. Rafay's platform is built around foundational elements that together deliver an optimal abstraction layer across disparate infrastructure, making it easy for developers to scale and operate applications across any number of locations or regions. Consumed as a service, Rafay's platform elimi...
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
In today's enterprise, digital transformation represents organizational change even more so than technology change, as customer preferences and behavior drive end-to-end transformation across lines of business as well as IT. To capitalize on the ubiquitous disruption driving this transformation, companies must be able to innovate at an increasingly rapid pace.
Here are the Top 20 Twitter Influencers of the month as determined by the Kcore algorithm, in a range of current topics of interest from #IoT to #DeepLearning. To run a real-time search of a given term in our website and see the current top influencers, click on the topic name. Among the top 20 IoT influencers, ThingsEXPO ranked #14 and CloudEXPO ranked #17.
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, compared the Jevons Paradox to modern-day enterprise IT, examin...
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...