From the course: Design a Cloud Migration Strategy
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Building a plan of attack - Amazon Web Services (AWS) Tutorial
From the course: Design a Cloud Migration Strategy
Building a plan of attack
- [Instructor] One of the lessons learned through migrating various production workloads is that every migration, no matter how simple or complex it may be, really needs a migration plan. So I want to take the opportunity to talk about some of the key considerations that should go into the migration planning process. One of the first things that you need to do during the very early planning phases of the migration is to create a comprehensive application inventory. There are several things that this inventory needs to do. First and foremost, it needs to identify all of the applications that are being used throughout the organization. And if possible, the inventory should also document the owners of those applications. Additionally, the inventory should document application versions, system requirements for the applications. And one thing that's commonly overlooked, but is extremely important, is that your inventory should seek to document application dependencies, because very often…
Contents
-
-
-
-
-
-
-
-
-
(Locked)
Are your goals still relevant?3m 19s
-
(Locked)
Building a plan of attack5m 10s
-
(Locked)
Considerations for IT pros5m 48s
-
(Locked)
Why it is fine to leave some applications alone?4m 58s
-
(Locked)
What tools are available to assist with the migration?1m 21s
-
(Locked)
Making the case for a trial migration3m 53s
-
(Locked)
Additional considerations2m 30s
-
(Locked)
Where should I begin?2m 13s
-
(Locked)
-
-