How do you approach designing a scalable and resilient technology architecture? Are there any guiding principles you follow?

3.4k viewscircle icon4 Comments
Sort by:
Director of ITa year ago

With foundation support from underlying storage we can develop patterns which enables HA, Site redundancy and disaster recovery for applications meeting RTO, RPO requirements.

1. The first step would be to ensure your organization has a defined Enterprise Storage and Data Protection Strategy which supports scalable and resilient technology architecture for applications and its data.

2. Design applications with each app tier highly available

3. Incorporate site redundant features using GSLBs as required based on app RTO/RPO requirements.

Lightbulb on1
VP of ITa year ago

Our strategy is to manage a set of proven patterns, then re-use those patterns as new solutions are needed.  Selecting the right pattern based on the requirements and roadmap becomes the critical decision point.

Lightbulb on1
Director of IT in Manufacturinga year ago

All starts with the functional and non-functional requirements, in particular the latter category is fundamental to guarantee the levels of services as per expectations, instead the former make sure that the right Architecture is built or better the one that does fulfil the business needs/requirements.

When it comes to scalability, non-functional requirements should expressly call it out when it comes to the different level of volumes that the infrastructure and platform implementing the Architecture should undergo during its operational lifecycle. Clearly, there are multiple ways to achieve it by design, like the principles of elastic scalability would require the Architecture to provision an orchestrator which is driven by active metadata and works on specific scale up/down rules according to specific expectations in terms of thresholds. 

When it comes to resiliency, again non-functional requirements should help with estimating the level of reliability and availability expected, as well as the disruption in case of downtimes. A resilient Architecture is one that is able to undergo failure without visible impacts on the service levels, therefore redundancy and ability to re-route traffic is fundamental to guarantee failure masking from an end user perspective. 

Worth mentioning that is of a vital importance to define specific indicators tracking the key metrics to measure scalability and resiliency to make sure that the Architecture has a companion with guaranteed SLI and SLO. 

Chief Information and Technology Officer2 years ago

Create a roadmap. Start with the requirements and build a plan based on business objectives — why do you need a resilient technology architecture if there's no requirement for it? Then you create strategies to achieve those goals. You might have multiple initiatives that come out of those strategies and the initiatives may be to find resilient technology architectures. In other cases, you might not need it, so it's a matter of understanding what is fit for purpose and how it aligns to the business objective. I can build the most redundant, resilient environment you want, but if there’s no business requirement for that, you're just spending money needlessly. 

Content you might like

I am very confident my organization would be able to both architect and deploy a virtual network using self-service tools/portals11%

I am confident my organization would be able to deploy a virtual network, but less confident we would be able to architect it ourselves72%

I am confident my organization would be able to architect a virtual network, but less confident on the ability to deploy it ourselves8%

I am somewhat confident, but may require some guidance from a consultant or our service provider3%

I am not confident and would expect to engage with a partner or service provider3%

View Results

Coordinating response efforts across departments26%

Managing third-party/supply chain risks56%

Adapting to rapidly evolving cyber threats61%

Securing executive buy-in/sufficient budget20%

Balancing user experience with security measures16%

Other (share yours below)

View Results