A company currently has the following virtual machines in their on-premise data centre:
Name – Role – Database Size – Type – Destination on Azure
skillcertlab_sql1 – Microsoft SQL Server – 2 TB – Hyper-V – Azure SQL Database
skillcertlab_sql2 – Microsoft SQL Server – 2 TB – Hyper-V – Azure SQL Database
skillcertlab_sql3 – Microsoft SQL Server – 90 GB – Hyper-V – Azure Virtual Machine
skillcertlab_sap1 – SAP – 1 TB – VMWare – On-premise
skillcertlab_sap2 – SAP – 1 TB – VMWare – On-premise
Requirements:
The company wants to migrate the SQL server workloads to Azure. Below are the key requirements:
- The server skillcertlab_sql3 requires an initial IOPS of 35000
- The servers skillcertlab_sql1 and skillcertlab_sql2 must use the vCore model and should also use replicas. These servers must support an IOPS of 8000.
- The compute and storage resources must be scaled independently
- The data from the SQL Servers must use zone redundant storage
- The current applications running on the on-premise servers must be able to interact with the databases on Azure.
- A regional disaster recover strategy must also be in place
- The database backups must be retained for 7 years
- The server skillcertlab_sql1 contains sales data. Data analysis must be performed on this data. A solution must in place which would read data from the database, perform ETL and then output the results to Power BI. The solution must use managed clusters to minimize costs.
- The analytics solution which would be in place for the sales data must be available even in the event of a regional outage.
- All employee PII data must be encrypted in rest and in transit
- Keys must be in place using hardware security modules
- The server skillcertlab_sql3 must not be able to communicate over the default ports
- Data engineers must be able to set the compute resources for the Data warehouse to 250 DWUs
- The server costs for skillcertlab_sql2 must be reduced when it is not being used during non-peak hours
One of the databases is going to store sensitive data. You have to implement a solution that would be used to identify the sensitive data and monitor access to the data. Which of the following would you implement for this requirement? Choose 3 answers from the options given below
Select 3 option(s):