Apache: Traditional VS Cloud Configuration Course of Enterprise Digital Infrastructure 2014/2015
|
|
|
- Malcolm Walsh
- 10 years ago
- Views:
Transcription
1 Apache: Traditional VS Cloud Configuration Course of Enterprise Digital Infrastructure 2014/2015 Authors: Razim Aliyev Giacomo Bellazzi Nicolò Marchesi Paulin Tchonin Eric Villa 1
2 TABLE OF CONTENTS ABSTRACT SECTION 1: APACHE CONFIGURATION INTRODUCTION TO RASPERBERRY PI INSTALLATION OF APACHE, PHP AND MYSQL APACHE ENVIROMENT CACHING MECHANISM 7 SECTION 2: WORDPRESS BENEFITS OF USING WORDPRESS INSTALLATION LOGIN DASHBOARD 12 SECTION 3: ADVANCED CONFIGURATIONS FOR APACHE REGISTRATION OF A DOMAIN NAME HTTPS/SSL IMPLEMENTATION ADVANCED IMPROVEMENTS 19 SECTION 4: CLOUD CONFIGURATION LAUNCH OF AN AMAZON EC2 INSTANCE INSTALL REQUIRED SOFTWARE ON THE EC2 INSTANCE SETUP AMAZON RDS FOR THE WORDPRESS DB SETUP ELASTIC LOAD BALANCING TESTING ELASTIC LOAD BALANCING THROUGH APACHE JMETER BENEFITS OF AUTO SCALING 33 2
3 Abstract In this project we have installed a WordPress website in a single local machine and also in a Cloud infrastructure under Apache environment to perform a load test, to see how it works in terms of scalability. 3
4 Section 1: Apache Configuration In this first section, Apache installation and some settings will be discussed in deeper, in order to get an overview of the environment and to obtain possible improvements. We need consider following general configuration files and options that can be controlled within Apache when doing the project 1.1 Introduction to Raspberry PI 2 In this section, the installation of Apache on a Linux machine (Raspberry PI 2), will be discussed. Raspberry PI 2 used for the Linux machine. Raspberry Pi is good tool used in practice, mainly to develop projects, learn programming and purposes like these. From this point of view application of Raspberry PI 2 in the project can be very helpful. Regarding the specifications of the machine we can say that the machine has a CPU which is Quad-core and 900MHz. It has 1GB of RAM and SDRAM type of memory. As for other specifications, it is accompanied by 10/100 Ethernet in terms of networking, four USB 2 ports, Broadcom VideoCore IV Graphics card and so on. Moreover, its increased clock frequency and multiple cores make the Raspberry Pi 2 powerful tool to use for the project. 1.2 Installation of Apache, PHP and MySQL Installation of Apache, using the standard repo of Debian, is done by the following commands: sudo add-apt-repository ppa:ondrej/php5 sudo apt-get update sudo apt-get install apache2 sudo apt-get install php5 sudo apt-get install MySQL After these commands have been executed, the Apache web server will work, with the standard configuration. To test if the standard installation went good, it is necessary to open the browser 4
5 and type the local IP address of the machine. If a hello world page were displayed, the test would be fine. 1.3 Apache environment In this section, an overview of the Apache system will be involved, in particular all the main important files, which let the administrator to modify the settings of the web server. Apache2 folder is the main area where we work on because Apache keeps its main configuration files within the "/etc/apache2" folder. While doing the experiments we need to work with some files and sub-directories in this directory. Followings are the files and directories can be used for the configuration of the server: apache2.conf is the main configuration file for the server in which we configure defaults and this is the central point of access for the server to read configuration details. ports.conf file is used to specify the ports that virtual hosts should listen on. sites-available directory contains all of the files of configuration for virtual host that define different web sites. Now let's have a look at these files in a more detailed way: Apache2.conf File In this file we set configuration for the global Apache server process, configuration for the default server, and configuration of Virtual Hosts. In this project we will focus mainly on global configurations and modify them for testing and experiment purposes. Followings are the main configurations we will concentrate on: Timeout decides the amount of time server has to fulfill each request. By default, this parameter is set to "300", but we can modify according to our wish. KeepAlive means whether or not server allows persistent connections and more than one request per connection. By default it is on but we can turn it off for experiment purposes. If this is set to off, each request will have to establish a new connection, which can result in significant overhead. 5
6 MaxKeepAliveRequests controls how many separate request each connection will have before dying.if we leave this number high we can achieve maximum performance. By default it is 100, but we can change it for testing purposes. KeepAliveTimeout how many seconds we wait for the next request from the same client on the same connection. If we timeout limit is reached, then the connection will die and server will have to establish a new connection. By default it is 5, but again we can modify it to test. Ports.conf file As we said in this file we specify which ports the virtual hosts listen to, and we can do configurations for SSL. So it is also important for the implementation of HTTPS. We can change the ports or add more ports here. For example: NameVirtualHost *:80 Listen 80 NameVirtualHost *:443 Sites-available directory In sites-available directory we have files for virtual host declaration. Our configuration file fantacalciopizza.com.conf is located here and we can configure our parameters here. For example, we can decide parameters like: ServerAdmin: [email protected], ServerName: fantacalciopizza.com, ServerAlias: DocumentRoot /var/www/fantacalciopizza.com/public_html Document Root/var/www is one of the impotant directories because by default the document root folder for apache2 in Ubuntu is /var/www. This is where we can store our site documents. But we change the default site location to a different one if we wanted to. In our case our root file is located in /var/www/fantacalciopizza.com directory. This aspect is very important for Virtual Private Hosting. 6
7 1.4 Caching mechanism Caching is a very important task, because can improve the performance of the Apache web server.this operation can be done in different levels such as caching for files, key values or HTTP. File caching File caching is a basic caching strategy which simply opens files when the server starts and keeps them available to speed up access. It is mainly used improve performance of slow filesystems. The important module used here is mod_file_cache. To use this module, we need to enable the module. For example: sudo a2enmod file_cache Then we can set up file handle caching, using the CacheFile directive. This directive takes a list of file paths. Thus, when restarted apache will open the files listed and store their files in the cache for faster access. Key value caching Key value caching used mainly for storing SSL sessions or authentication details. For instance, it is used to avoid repeating expensive operations involved with setting up a client's access to content and so on. Primary modules used here are mod_socache_dbm, mod_socache_dc, mod_socache_memcache, mod_socache_shmcb. The handshake that must be performed to establish an SSL connection and this can be overhead. So caching the session data we can avoid this overhead. HTTP caching HTTP caching is used for caching general content. The Apache HTTP caching mechanism caches responses according to the HTTP caching policies. Primary modules involved in this part is mod_cache. In order to enable caching, we need to enable the mod_cache. We can enable these modules by typing: 7
8 sudo a2enmod cache sudo a2enmod cache_disk Most of the configuration for caching happen in virtual host definitions or in different location. However, enabling mod_cache_disk also enables a global configuration for some general attributes. We are more interested in virtual host part so to do this we go to following directory: sudo nano / etc/ apache2/sites-enabled One of the interesting concepts for us is cookies We can ignore cookies by telling Apache ignore Set-Cookie headers and not store them in the cache. So the Set-cookie header will be removed before the headers are cached. CacheIgnoreHeaders Set-Cookie We can enable caching for our virtual host by configuring directives such as CacheEnable disk CacheHeader on CacheDefaultExpire 600 CacheMaxExpire CacheLastModifiedFactor 0.5 We can modify Etags by using FileEtag directive. FileEtag All This will add "public" to the value our Cache already has and will include an Etag for our content. 8
9 Section 2: WordPress In this part we will see how to setup a website using a content management system WordPress. WordPress is an Open Source software system that can be used by everyone to create blogs and website. It s customizable by the use of themes and plugins that can be downloaded from the WordPress site or from other place on the web. WordPress started in 2003 and now is the largest hosted blogging tool also used by big company like Samsung or New York Times. 2.1 Benefits of using WordPress Here are some reason that led us to use WordPress: 1) it s easy to use We don t need a bachelor degree to setup a blog or a website using WordPress. 2) It s free 3) It s easy to perform a load test on a web server with a WordPress website using the tool BLAZEMETER 2.2 Installation To install WordPress we need essentially three thing: Web server Database MySQL The installation file of WordPress that can be easily downloaded from the website of WordPress. Once we have downloaded the latest version of WordPress, which is a zip file. we need to unzip it and move all the files on the web server. To upload all the file of WordPress on our web server, we need a software which can handle FTP connection. For this purpose, we used Cyberduck. 9
10 Cyberduck is an open source client for FTP and SFTP, WebDAV, and Amazon S3, available for Mac OS X and Windows. Now we can start the installation of WordPress with our browser, by going to the page The domain name of our website is fantacalciopizza.com. Step 1: the first thing we have to do, is to choose the language in which we want to continue the installation. 10
11 Step 2: provide information about our database, which will be used by WordPress to create some tables, which will be useful to manage our website. Step 3: now we just have to enter some information like username and password, which we will employed for the administration of our website and press the button "Install WordPress" to conclude the installation. 11
12 2.3 Login Before making any changes in our website, we will need to login using username and password, which we have defined during the installation process. To login for our website we can go to the following URL Dashboard Once we ve logged in, the WordPress dashboard appears. It s our main administration homepage. This homepage are subdivided into three parts: header area (at the very top of the 12
13 dashboard), menu options (at the left hand side of the dashboard), and main Panel (at the center part). In the dashboard menu option we can find all the options to update and configure our website. Here are some options: Posts This is where you can create a new Blog Post. You can also update your Categories and Post Tags. Media This is where all our uploaded images, documents or files are stored. Pages 13
14 This is where you create and maintain all our Pages. Comments We can manage all Comments within this section, including replying to comments or marking them as Spam. Appearance This menu is where we can control how our website will look. We can choose a new Theme, manage our site Widgets or Menus. Plugins Plugins extend and expand the functionality of WordPress. We can add or delete plugins within here as well as activate or deactivate them. 14
15 Section 3: Advanced configurations for Apache In this section, some important advanced configurations for Apache will be discussed, such as the registration of a domain name, the implementation of HTTPS and improvements about redirection in case of errors and security. 3.1 Registration domain name In this section, they will be discuss the procedures to follow, in order to register a domain name for the web site, implemented in the project and how to setup the Apache web server, to let it works correctly. The domain names are very important in the Internet infrastructure, for many reason; first of all, they're useful, because a name is more easily recognizable and memorizable by humans, instead of the IP address of a specific web server, where a web site is hosted. For the administrator of the web server, is more easy to deal with domain names, in case it is necessary to move to a different physical location, without any modification for the user's side. There are many layers/levels of domain names, for example top-level-domain, such as.com,.eu,.it, second-level, third-level and lower. All the regulations for domain names, are under authoritative by the company called ICANN, which defines rules, syntax etc... for this purpose. Due to the fact that there are many requests of registration for domain names, ICANN has delegated other companies to do that. On the web, there are a very large number of provides, which can offer the possibility to register a domain name, for a very cheap price. For this project, has been choosen one of the cheapest one, which is called GoDabby.com, which offers domain registration for 7.99 euro/years. In this project, has been bought a second-level domain, which has the following syntax: domain_name.extension. The first step to make, in order to register a domain name, is to check if is actually available. Onced checked that the domain name is free, is possible to buy different extension, for example mydomain.com, mydomain.it etc... After selected the domain name, it's required to fill some fields, with information of the owner of the service. It is very important to write the correct values, because in case of errors, the domain registration can fail. Also, in the case of the country code top level domain, some additional rules have to be agreed. For instance, for the.it case, the owner should has an Italian physical address. 15
16 Once all the data has been sent and the service has been paid, in less than one hour, the domain will be available to be used. Some additional services can be purchased, for example the one which let to improve the privacy, against the use of the command WHOIS, which let everyone to obtain some personal information, about the owner of the domain name. Now it's possible to configure the infrastructure, to be used with the DNS. First of all some, further information about the infrastructure should be issued. The web server has been installed into a residential ADSL network, where the ISP provides a static IP address. To let the web server be reached from outside the local network, some port forwarding is necessary. To make this operation, is necessary to have access to the page control of the main router and set, that every requests on port 80, which comes from the public IP of the router, should be forwarded to the local IP of the machine. To test if this operation has been done correctly, it is enough to open the browser from a different network and write the public IP address of the residential ADSL. If the page of the web site has been displayed, the configuration made was good. The next step, has the objective to setup the DNS server, to let translate the domain name, which has been registered, to IP address of the web server. Usually, two ways are possible: the first one is to register a record of type A or AAA in the authoritative web server of the ISP of the residential ADSL, which contains the IP address of the web server. In case of this procedure isn't available (for consumer contracts typically isn't possible), a kind of pointer operation is required. In this case, due to the fact that the first way isn't available, the second one has been followed; for this operation, it is necessary to go to the dashboard of GoDabby, to the section DNS Zone File. In the section for the record of type A, it is necessary to insert the public IP address of web server for the specific domain purchased and the DNS server of GoDabby, will manage any DNS queries to translate the hostname, to the correct IP address. It is also required to insert the TTL value for the record of type A, and this is very important for security reason; in this case the value has been setted to be 1/2 hour. The last step, is to set the domain name, as server name, in the configuration file in the folder /etc/apache2/sites-available. In this case, in the section of the VirtualHost for port number 80, it is necessary to add the following line: 16
17 ServerName Onced saved the file, it is necessary to reload the server Apache, by typing the following command, in the terminal: sudo service apache2 restart After completed all these operations and waited some hours for the initialization of the DNS server, it is possible to have access to the web site, hosted in the web server, by typing the domain name. 3.2 HTTPS/SSL implementation In this section, the HTTPS protocol and its implementation in the Apache web server will be discussed. In the standard configuration, Apache is only listening the traffic on port 80, where the HTTP stands. Due the fact that HTTP doesn t implement any sort of security, because all the packets sent are in plain text, it is possible to have a look them and for this reason, some credentials, can be sniffed in a very easy way, for instance with Wireshark. For this reason, the use of HTTPS is very important in a web server, especially in the case where the web site hosts some personal information or credentials. HTTPS is a combination of the use of the standard HTTP with the security capabilities of SSL and TLS. This protocol provides security and encryption, over the data exchanged between a client and the server. For this reason, the main motivation of the implementation of this protocol, is to provide authentication, to protect privacy and integrity of the information sent over the Internet. The key points of this mechanism are, the creation of a secure channel between the client and the server, the use of public/private key for the part of encryption and the use of certificate for the aspect of trust. Due to the fact that the HTTPS is very complex, the implementation on a web server, is not so easy, also because several steps are required, to configure it correctly. Let s summarize it: Creation of a private key for the web server for encryption Creation/acquisition of the certificate for trust Installation of the certificate on the web server Implementation of the VirtualHost over port 443 Port forwarding, in case is necessary Test if everything has been configured correctly 17
18 For this project, for testing, three different SSL certificate have been installed in the web server: 1. Self-signed 2. From StartSSL 3. From Comodo The first one, has been created using the following command within the Linux machine: sudo openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/apache2/ssl/the_apache_key.key -out /etc/apache2/ssl/the_apache_crt.crt After filling some information in the form, the two files will be generated in the machine. The second can be obtained, by logging on the web site startssl.com, from which is possible to get a free SSL certificate. The only requirement, is to have a domain name for the web site. In this case, it is necessary to create a private key, by inserting a password and the key will be displayed on the page. For Apache, it is necessary to export it as decrypted. After a few hours, the certificate will be delivered to the account inserted in the registration and then it will be possible to copy all the files required, into the web server. The way to obtain the third certificate, is very similar to the previously one. Also in this case it is necessary to have domain, but in this case, the certificate will be valid for just 90 days, then it will necessary to pay. By the way, there are some different between these certificates; all of them can be used to send data from client to server in an encrypted way, but not all can guarantee the trust condition. The first one, in fact, has been generated directly on the machine and no other has certificated it, so all the browsers will display an alert box, about the fact that it isn t trusted, so possible attack, such man-in-the-middle, can occurs. For this reason, this certificate is useful just for test about HTTPS encryption. The other two, can guarantee more security, due the fact that, are trusted by other companies. The only difference, is that the second one is displayed correctly in the browser, so the green logo will be showed, but Java doesn t recognize it as trusted, for security reason. The third one, is working perfectly with browser and also with Java environment, but it isn t free. After the acquisition of the certificate, the next step is to enable the port 443, the one for HTTPS, for the web server. 18
19 In this case, it is necessary to deal with the file with extension.conf, in /etc/apache2/sitesavailable/, for the web site hosted in the web server. The default one, is called default-ssl.conf. After the line of code, for the VirtualHost of port 80, it is necessary to add a new VirtualHost for port 443, with these lines: <VirtualHost *:443> SSLEngine on SSLCertificateFile /etc/apache2/ssl/ssl.crt SSLCertificateKeyFile /etc/apache2/ssl/private.key SSLCertificateChainFile /etc/apache2/ssl/sub.class1.server.ca.pem Of course, the file with extension.crt, key and.pem, must have the correct name. Also in this case, it is necessary to make some configuration, on port forwarding over the port 443 on the router configuration page. Once all these tasks have been completed, it is possible to test that the Apache web server, works correctly with HTTPS. Here are the results of the test: this logo has been displayed for the first certificate, the one which has been self- generated this logo has been displayed for the other two certificates; in this case, the HTTPS can encrypt the data and due to the fact that the certificate has been verified to be trusted, it is almost sure that the data send are safety exchanged with the correct server. 3.3 Advanced configuration In this section, some additional features available in Apache will be discussed, to improve security for the web server. By default, Apache will list all the file within a folder, if there is no any file named index. In this case, all the file available within that folder, will be listed. Of course, this can reduce the security of the web site, because all the files will be able to be downloaded. By the way, the file with extension.php, will be downloaded already compiled by the web server, so no PHP code can be downloaded. In all case, the fact that some files, which aren t linked in the web site, can be seen from everyone, of course isn t so good. 19
20 To modify this aspect, is necessary to open the main configuration file called apache2.conf, which is in the /etc/apache2/ path. Once opened, it is necessary to go the lines of code about <Directory> and replace them with: <Directory /var/www/> </Directory> Options FollowSymLinks AllowOverride None Require all granted The line of code, which block the listing of the files, is Options FollowSymLinks. Another improvement, can be done about the standard not found page displayed in Apache. In fact is possible to modify that the page, with another one, which has been customized by the user. To complete this operation, it is necessary to add the following line of code, to the VirtualHost section of the.conf file of the website: ErrorDocument 404 "ERROR MESSAGE" Of course is possible to insert an entire HTML file, which can be more confident for the user. It is also possible, to customize the other pages, for all types of HTTP codes. The last one advanced configuration discussed, is about the redirection mechanism. If the HTTPS protocol is enabled in the web server, it is better to use it respect to HTTP in the private are and don t let the user use the HTTP for that access. For this reason, it is a good idea to set up the redirection mechanism, to improve security for the user. In this case, it is necessary to modify the.conf file for the web site, and add the following line of code in virtualhost section for port 80: Redirect permanent / In this case, all the requests for the web site with the standard HTTP protocol, will be redirected to the secure HTTPS. Of course is possible to select just some redirection operation, for just some directory, such the one for the login. With all these operations, the web server will more secure for both the clients and the administrator of the infrastructure. 20
21 Section 4: Cloud configuration The next step in our project was to migrate the configuration of the Apache MySQL server and WordPress on the cloud. For this task we used the services provided by Amazon Web Services. In the next paragraphs we will explain the steps we did in order to design our cloud based architecture, what Amazon services we used and their features. 4.1 Launch an Amazon EC2 Instance Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides resizable compute capacity in the cloud. It s simple web service interface allows to obtain and configure capacity with minimal friction and provides complete control over the computing resources. Amazon EC2 reduces the time required to obtain and boot new servers instances to minutes, allowing to quickly scale capacity to better follow the variation in computing requirements, both up and down. Moreover it changes the economics of computing by allowing to pay only for the capacity that is actually in use. Amazon EC2 provides the tools to build failure resilient applications and block common failure scenarios. As the Raspberry PI, the Amazon EC2 instance will act as the web server hosting an Apache Web server, WordPress and MySQL Client installation. As we will examine in depth later, to guarantee the statelessness of each instance, there will be no MySQL server installation on the EC2 instance as the database will be hosted on a different service called RDS. For creating the EC2 instance we have to access the EC2 section on the Amazon Dashboard and click on Launch Instance; this will open up a Wizard that will guide us on the configuration of our machine in the cloud: 1. Choose an Amazon Machine Image (AMI) An Amazon Machine Image (AMI) provides the information required to launch an instance, which is a virtual server in the cloud. For what concernes us it is a template for the root volume of the instance (i.e. an operating system, an application server, and applications). We choose an Amazon Linux AMI (HVM) with an EBS-backed SSD. The default image includes AWS command line tools, Python, Ruby, Perl, and Java and the repositories include Docker, PHP, MySQL, PostgreSQL, and other packages. HVM AMIs are machines with a fully virtualized set of hardware so the virtualization type provides the ability to run an operating system directly on top of a virtual machine without any modification, as if it were run on the bare-metal hardware. The Amazon EC2 21
22 host system emulates some or all of the underlying hardware that is presented to the guest Example of AMI registration and instance launch 2. Choose an Instance Type Next we can select the hardware configuration of our instance. As the only one eligible for the free tier we choose a T2.micro istance that comes with 1 GB of RAM memory, 1 virtual processor with 2.5 Ghz clock frequency and backed with an EBS-storage of 8 GB. This kind of instance can be created only in a Virtual Private Cloud (VPC) 3. Select a Virtual Private Cloud (VPC) Amazon Virtual Private Cloud lets you provision a logically isolated section of the cloud where we can launch AWS resources in a defined virtual network. This gives complete control over the virtual networking environment like the selection of IP address range, creation of subnets, and configuration of route tables and network gateways. For launching the EC2 instance we have to create a new VPC that will contains all the required infrastructure. 4. Configure Security Groups A security group acts as a virtual firewall that controls the traffic for one or more instances. When we launch the instance we associate one or more security groups with the instance and add rules to each security group that allow traffic to or from its associated instances. We choose these rules for being able to access to the instance in a secure way through SSH: 22
23 4.2 - security groups configuration 5. Create a Key Pair Amazon EC2 uses public key cryptography to encrypt and decrypt login information. Public key cryptography uses a public key to encrypt a piece of data, such as a password, then the recipient uses the private key to decrypt the data. The public and private keys are known as a key pair. To log in to the instance, we must create a key pair, specify the name of the key pair when you launch the instance, and provide the private key when you connect to the instance. Linux instances have no password, and you use a key pair to log in using SSH. After creating the key pair in.pem format we have to download the key for later use. 6. Recap and Launch As the last step Amazon provide us with all the information entered so far as a quick recap and asks if we want to launch the EC2 instance with this configuration. In the Instance Dashboard we can see our newly created instance: EC2 instance status and description 23
24 4.2 Install Required Software on the EC2 Instance The AMI specification tells that the instance comes already with a set of preinstalled software but for setting up our WordPress installation we need to install Apache and MySQL Client, we don t need MySQL Server because, as previously stated, the database will not be hosted on the EC2 instance but on a separate service. We can access the EC2 instance through PuTTY, a free implementation of Telnet and SSH for Windows and Unix platform. As PuTTY does not natively support the private key format (.pem) generated by Amazon EC2 so PuTTY has a tool named PuTTYgen which can convert keys to the required PuTTY format (.ppk). We have to convert our private key into this format (.ppk) before attempting to connect to our instance using PuTTY: ppk key generation through PuTTyGen 24
25 With our newly generated key we can connect via SSH to the EC2 instance just specifying the IP address of the instance and the key for authentication. The default user created on any instance is ec2-user. We can now update all the packages installed on the instance and begin the installation of a LAMP web server. The method to achieve this is no different from any traditional Linux package installation: sudo yum update sudo yum install -y httpd24 php56 MySQL55 php56-mysqlnd Lastly we have to install the WordPress package by donwloading the packet from the official source and unzip the folder: wget tar -xzf latest.tar.gz As the configuration is identical to the traditional installation we will skip all the next part so take as reference the previous sections. 4.3 Setup Amazon RDS for the WordPress DB Amazon Relational Database Service (Amazon RDS) makes it easy to set up, operate, and scale a relational database in the cloud. It provides cost-efficient and resizable capacity while managing time-consuming database management tasks, freeing you up to focus on your applications and business. As we want to exploit all the features of the cloud we have to design our architecture to be stateless, this means that all the data needed by the instances that hosts the WordPress installation cannot be stored on the instance itself. In particular WordPress stores in the database the users and the actual content posted. The database will be instead placed on the RDS service and linked to WordPress during configuration. 25
26 For creating the RDS database we have to access the RDS section on the Amazon Dashboard and to Click Launch DB Instance, this will launch the DB Instance Wizard: 1. Select Engine Amazon RDS supports MySQL, Oracle, SQL Server, and PostgreSQL database engines. We proceed to select the MySQL engine. 2. Choose Multi-AZ deployment Amazon RDS Multi-AZ deployments provide enhanced availability and durability for Database (DB) Instances making optimal for production database workloads. When provisioning a Multi-AZ DB Instance, Amazon RDS automatically creates a primary DB Instance and synchronously replicates the data to a standby instance in a different Availability Zone (AZ). Each AZ runs on its own physically distinct, independent infrastructure, and is engineered to be highly reliable. In case of an infrastructure failure Amazon RDS performs an automatic failover for resuming database operations as soon as the failover is complete. Since the endpoint of the DB Instance remains the same after a failover, the application can resume database operation without needing a manual administrative intervention. Since this is a rather basic implementation we didn t exploit this feature, nonetheless it is worth saying that it could drastically improve the availability and durability of the DB, eliminating a configuration where a single point of failure can result in the unavailability of the service. 3. Specify Database Details For launching the DB are required some specifications that will define in more details the setup of the database architecture. The instance specification will define the setup of the machine that will run the database (the engine verision, the DB instance class for defining the computational power of the machine, the storage type...), the settings contains the instance identifier and the user with root access privilieges. In network and security we can define where in the cloud will be started the instance and the associated security group; as we aim to define a robust architecture the DB instance will be created inside the same VPC as the EC2 instance where WordPress is hosted, but will not be accessible from any point external of the VPC. Moreover the security group is configured for letting the DB instance accept request only by the WordPress instance, adding another layer of security to our architecture. 26
27 4.5 - database settings 4. Recap and Launch As the last step Amazon provide us with all the information entered so far as a quick recap and asks if we want to launch the RDSinstance with this configuration. We can see in the RDS dashboard the newly created instance: RDS instance status and description 27
28 4.4 Setup Elastic Load Balancing Our next goal was to set up a simple infrastructure in which you can automatically increase the number of EC2 instances you re using when the user demand goes up, and you can decrease the number of EC2 instances when demand goes down. As Auto Scaling dynamically adds and removes EC2 instances, you need to ensure that the traffic coming to your web application is distributed across all of your running EC2 instances. AWS provides the Elastic Load Balancing service to distribute the incoming web traffic, called the load, automatically among all the EC2 instances that you are running. Elastic Load Balancing uses load balancers to monitor traffic and handle requests that come through the Internet and routes them among EC2 instances inside an Auto Scaling Group. To use Elastic Load Balancing with your Auto Scaling group, you first create a load balancer and then register your Auto Scaling group with the load balancer. Your load balancer acts as a single point of contact for all incoming traffic. You can find Load Balancers under the NETWORK & SECURITY section of AWS Management Console. Clicking Create Load Balancer, a Wizard for the configuration of your Load Balancer will start. In the first step of the wizard we defined: name of the load balancer; VPC which was the same defined for the EC2 instance; listener configuration; subnets of the VPC for Availability Zones. For what concerns the listener configuration, we decided to make the Load Balancer able to receive HTTP traffic from port 80 and to forward the same to port 80 of EC2 istances. About VPC subnets, we created three subnets of the same VPC, associated to three different availability zones. The incoming HTTP traffic will be routed by the Load Balancer to these subnets; creating more than one subnet, thus distributing EC2 instances over different availability zones, we provide higher availability for the Load Balancer. The next step of the WIzard was characterized by the creation of an Ad-Hoc security group for the Load Balancer; a virtual firewall, which allows to receive only HTTP traffic from anywhere. Anywhere means that there is no IP address filtering in the incoming HTTP traffic. 28
29 The load balancer will automatically perform health checking on EC2 instances and route traffic only to those which passed the health check test. The Wizard allowed us also to specify Health Checks configuration. We were able to define the ping protocol, the ping port, the ping path and other advanced settings such as response timeout, health check interval, unhealty threshold and healthy threshold. We define as ping protocol HTTP at port 80 with path /health_check.txt ; this means that the Load Balancer will perform a GET to obtain a file called health_check.txt inside the Web Server root directory. Obvioulsy, the objective is not to get the file but to verify the availability of the EC2 instance. We didn t add the EC2 instance previously configured to the Load Balancer since we wanted to create an Auto Scaling Group which launches the instances and then attaches the group to the Load Balancer. Before creating an Auto Scaling Group, we had to create a Launch Configuration. A launch configuration is a template for the EC2 instances launched into an Auto Scaling group. The first thing we had to define was the AMI; since an AMI includes a template for the root volume (for example, operating system, applications, web server, application server), creating an AMI from the EC2 instance in which we have installed Apache, php, MySQL client and WordPress, allowed us to include in the Auto Scaling Group different machine with the same root volume template. The second thing we had to define was the Instance Type; it provides a description of the hardware configuration of the instances in the Auto Scaling Group. We choose, as Instance Type, t2.micro. The last thing we defined for launch configuration was the Security Group; we created a Security Group for the Auto Scaling Group. Since we created the Launch Configuration for the EC2 instances, our next step was to create the Auto Scaling Group. We assigned to the Auto Scaling Group a Launch Configuration and a name. Than we defined the starting number of EC2 inside the Auto Scaling Group. We defined also the VPC where the EC2 instances will be launched. Inside the advanced details, we assigned the Load Balancer, previously created, to the Auto Scaling Group. 29
30 In order to allow the number of EC2 instances to increase or decrease automatically with a certain logic, we add scaling policies. A scaling policy is a set of instructions to add or remove a specific number of instances in response to an Amazon CloudWatch alarm that you assign to it. When the alarm triggers, it will execute the policy and adjust the size of your group accordingly. We based our scaling policies on the Network Out metric. This metric identifies the volume of outgoing network traffic to an application on a single instance. The units of this metric are bytes. Concerning the DECREASE policy, we defined that one instance will be removed if the Network Out is less than bytes for 60 seconds. In the INCREASE policy we defined that one instance will be added if the Network Out is greater than bytes for 60 seconds. At this point, to access the website on our back-end instances, we paste the DNS name, which the load balancer received by default, into the address field of a web browser. 4.5 Testing Elastic Load Balancing through Apache JMeter Since we set up our scaled and load balanced website, we exploited the load test functionality of a Java application called Apache JMeter. The first step we did to create our load test plan, was to add a Thread Group element which tells JMeter the number of users to simulate, how often the users should send requests, and the how many requests they should send. 30
31 As we can see from the figure, we decided to simulate 500 users. Since we set Loop Count to 1, the number of users represents the number of requests to be sent. The interval between two requests issues is defined in the Ramp-Up period. Since we specified a Ramp_Up Period of 1 second, every minute 60 requests are sent. In the second step we define the tasks that they had to perform: send HTTP requests to the Load Balancer. We specified the default settings for the HTTP requests: Name; Server Name; Port Number. We left the remaining fields with their default values. As Server Name, we specified the DNS name which the load balancer received by default. In the next step we created the HTTP request element which represented the request sent by a simulated user. The HTTP request method was already set to GET by default; we only specified the name of the HTTP request element and the Path. As Path, we specified the Web Server s Root: /. 31
32 After the load test started, we noticed, through AWS Cloud Watch Monitoring service, that the number of instances within the Auto Scaling Group, scaled from one, which was the initial and minimum number of machines in the Auto Scaling Group configuration, up to three. Since the size of the WordPress index page is, roughly, 30KByte and JMeter issued 60 HTTP GET request in a minute, in the same time the load balancer send out, roughly, 1.8 MByte. As we described before, we set the NetworkOut Policy Threshold to 1MByte per minute. Thus, the result we obtained, in terms of EC2 instanced scaling, was what we expected it to be. Since the load test finished, the number of instances progressively decreased to one CloudWatch showing how the number of EC2 instances scales 32
33 4.6 Benefits of Auto Scaling Implementing this kind of infrastructure, our Website gained the following benefits: Better fault tolerance. Auto Scaling can detect when an instance is unhealthy, terminate it, and launch an instance to replace it. Better availability. Using multiple Availability Zones, if one Availability Zone becomes unavailable, Auto Scaling can launch instances in another one to compensate. Better cost management. Auto Scaling can dynamically increase and decrease capacity as needed. Because you pay for the EC2 instances you use, you save money by launching instances when they are actually needed and terminating them when they aren't needed. 33
Installing an SSL certificate on the InfoVaultz Cloud Appliance
Installing an SSL certificate on the InfoVaultz Cloud Appliance This document reviews the prerequisites and installation of an SSL certificate for the InfoVaultz Cloud Appliance. Please note that the installation
Getting Started with AWS. Computing Basics for Linux
Getting Started with AWS Computing Basics for Linux Getting Started with AWS: Computing Basics for Linux Copyright 2014 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. The following
Eucalyptus 3.4.2 User Console Guide
Eucalyptus 3.4.2 User Console Guide 2014-02-23 Eucalyptus Systems Eucalyptus Contents 2 Contents User Console Overview...4 Install the Eucalyptus User Console...5 Install on Centos / RHEL 6.3...5 Configure
Alfresco Enterprise on AWS: Reference Architecture
Alfresco Enterprise on AWS: Reference Architecture October 2013 (Please consult http://aws.amazon.com/whitepapers/ for the latest version of this paper) Page 1 of 13 Abstract Amazon Web Services (AWS)
Getting Started with AWS. Hosting a Web App
Getting Started with AWS Hosting a Web App Getting Started with AWS: Hosting a Web App Copyright 2015 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. The following are trademarks
Opsview in the Cloud. Monitoring with Amazon Web Services. Opsview Technical Overview
Opsview in the Cloud Monitoring with Amazon Web Services Opsview Technical Overview Page 2 Opsview In The Cloud: Monitoring with Amazon Web Services Contents Opsview in The Cloud... 3 Considerations...
CentOS. Apache. 1 de 8. Pricing Features Customers Help & Community. Sign Up Login Help & Community. Articles & Tutorials. Questions. Chat.
1 de 8 Pricing Features Customers Help & Community Sign Up Login Help & Community Articles & Tutorials Questions Chat Blog Try this tutorial on an SSD cloud server. Includes 512MB RAM, 20GB SSD Disk, and
19.10.11. Amazon Elastic Beanstalk
19.10.11 Amazon Elastic Beanstalk A Short History of AWS Amazon started as an ECommerce startup Original architecture was restructured to be more scalable and easier to maintain Competitive pressure for
Amazon Web Services EC2 & S3
2010 Amazon Web Services EC2 & S3 John Jonas FireAlt 3/2/2010 Table of Contents Introduction Part 1: Amazon EC2 What is an Amazon EC2? Services Highlights Other Information Part 2: Amazon Instances What
1. Product Information
ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such
Web Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
Online Backup Client User Manual Linux
Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based
Getting Started with AWS. Web Application Hosting for Linux
Getting Started with AWS Web Application Hosting for Amazon Web Services Getting Started with AWS: Web Application Hosting for Amazon Web Services Copyright 2014 Amazon Web Services, Inc. and/or its affiliates.
Creating an ESS instance on the Amazon Cloud
Creating an ESS instance on the Amazon Cloud Copyright 2014-2015, R. James Holton, All rights reserved (11/13/2015) Introduction The purpose of this guide is to provide guidance on creating an Expense
Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway
Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...
RecoveryVault Express Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
ArcGIS 10.3 Server on Amazon Web Services
ArcGIS 10.3 Server on Amazon Web Services Copyright 1995-2015 Esri. All rights reserved. Table of Contents Introduction What is ArcGIS Server on Amazon Web Services?............................... 5 Quick
Online Backup Client User Manual
Online Backup Client User Manual Software version 3.21 For Linux distributions January 2011 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have
Online Backup Linux Client User Manual
Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might
Deployment and Configuration Guide
vcenter Operations Manager 5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions
Online Backup Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
Introduction to Mobile Access Gateway Installation
Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure
Installing and Configuring vcenter Support Assistant
Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
INSTALLING KAAZING WEBSOCKET GATEWAY - HTML5 EDITION ON AN AMAZON EC2 CLOUD SERVER
INSTALLING KAAZING WEBSOCKET GATEWAY - HTML5 EDITION ON AN AMAZON EC2 CLOUD SERVER A TECHNICAL WHITEPAPER Copyright 2012 Kaazing Corporation. All rights reserved. kaazing.com Executive Overview This document
Zend Server Amazon AMI Quick Start Guide
Zend Server Amazon AMI Quick Start Guide By Zend Technologies www.zend.com Disclaimer This is the Quick Start Guide for The Zend Server Zend Server Amazon Machine Image The information in this document
KeyControl Installation on Amazon Web Services
KeyControl Installation on Amazon Web Services Contents Introduction Deploying an initial KeyControl Server Deploying an Elastic Load Balancer (ELB) Adding a KeyControl node to a cluster in the same availability
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Deploy Remote Desktop Gateway on the AWS Cloud
Deploy Remote Desktop Gateway on the AWS Cloud Mike Pfeiffer April 2014 Last updated: May 2015 (revisions) Table of Contents Abstract... 3 Before You Get Started... 3 Three Ways to Use this Guide... 4
Moving Drupal to the Cloud: A step-by-step guide and reference document for hosting a Drupal web site on Amazon Web Services
Moving Drupal to the Cloud: A step-by-step guide and reference document for hosting a Drupal web site on Amazon Web Services MCN 2009: Cloud Computing Primer Workshop Charles Moad
Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10
Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10 Document version 1.0 10.6.2.378-13/03/2015 Important Notice Cyberoam Technologies Pvt. Ltd. has supplied this Information believing it
VXOA AMI on Amazon Web Services
2013 Silver Peak Systems, Inc. QUICK START GUIDE VXOA AMI on Amazon Web Services A Silver Peak Virtual Appliance (VX) can be deployed within an Amazon Web Services (AWS) cloud environment to accelerate
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
Virtual Data Centre. User Guide
Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10
Installing an open source version of MateCat
Installing an open source version of MateCat This guide is meant for users who want to install and administer the open source version on their own machines. Overview 1 Hardware requirements 2 Getting started
TECHNOLOGY WHITE PAPER Jan 2016
TECHNOLOGY WHITE PAPER Jan 2016 Technology Stack C# PHP Amazon Web Services (AWS) Route 53 Elastic Load Balancing (ELB) Elastic Compute Cloud (EC2) Amazon RDS Amazon S3 Elasticache CloudWatch Paypal Overview
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
DEPLOYMENT GUIDE Version 1.1. Deploying F5 with Oracle Application Server 10g
DEPLOYMENT GUIDE Version 1.1 Deploying F5 with Oracle Application Server 10g Table of Contents Table of Contents Introducing the F5 and Oracle 10g configuration Prerequisites and configuration notes...1-1
Creating a DUO MFA Service in AWS
Amazon AWS is a cloud based development environment with a goal to provide many options to companies wishing to leverage the power and convenience of cloud computing within their organisation. In 2013
FortiGate-AWS Deployment Guide
FortiGate-AWS Deployment Guide FortiGate-AWS Deployment Guide September 25, 2014 01-500-252024-20140925 Copyright 2014 Fortinet, Inc. All rights reserved. Fortinet, FortiGate, FortiCare and FortiGuard,
Every Silver Lining Has a Vault in the Cloud
Irvin Hayes Jr. Autodesk, Inc. PL6015-P Don t worry about acquiring hardware and additional personnel in order to manage your Vault software installation. Learn how to spin up a hosted server instance
CDH installation & Application Test Report
CDH installation & Application Test Report He Shouchun (SCUID: 00001008350, Email: [email protected]) Chapter 1. Prepare the virtual machine... 2 1.1 Download virtual machine software... 2 1.2 Plan the guest
vcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
VMware vcenter Log Insight Getting Started Guide
VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
Pertino HA Cluster Deployment: Enabling a Multi- Tier Web Application Using Amazon EC2 and Google CE. A Pertino Deployment Guide
Pertino HA Cluster Deployment: Enabling a Multi- Tier Web Application Using Amazon EC2 and Google CE A Pertino Deployment Guide 1 Table of Contents Abstract... 2 Introduction... 3 Before you get Started...
Tutorial: Using HortonWorks Sandbox 2.3 on Amazon Web Services
Tutorial: Using HortonWorks Sandbox 2.3 on Amazon Web Services Sayed Hadi Hashemi Last update: August 28, 2015 1 Overview Welcome Before diving into Cloud Applications, we need to set up the environment
How To Deploy Sangoma Sbc Vm At Amazon Cloud Service (Awes) On A Vpc (Virtual Private Cloud) On An Ec2 Instance (Virtual Cloud)
Sangoma VM SBC AMI at AWS (Amazon Web Services) SBC in a Cloud Based UC/VoIP Service. One of the interesting use cases for Sangoma SBC is to provide VoIP Edge connectivity between Soft switches or IPPBX's
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
Amazon EC2 Product Details Page 1 of 5
Amazon EC2 Product Details Page 1 of 5 Amazon EC2 Functionality Amazon EC2 presents a true virtual computing environment, allowing you to use web service interfaces to launch instances with a variety of
Chapter 9 PUBLIC CLOUD LABORATORY. Sucha Smanchat, PhD. Faculty of Information Technology. King Mongkut s University of Technology North Bangkok
CLOUD COMPUTING PRACTICE 82 Chapter 9 PUBLIC CLOUD LABORATORY Hand on laboratory based on AWS Sucha Smanchat, PhD Faculty of Information Technology King Mongkut s University of Technology North Bangkok
RDS Migration Tool Customer FAQ Updated 7/23/2015
RDS Migration Tool Customer FAQ Updated 7/23/2015 Amazon Web Services is now offering the Amazon RDS Migration Tool a powerful utility for migrating data with minimal downtime from on-premise and EC2-based
Introduction to the EIS Guide
Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment
How to: Install an SSL certificate
How to: Install an SSL certificate Introduction This document will talk you through the process of installing an SSL certificate on your server. Once you have approved the request for your certificate
Deploying F5 with Microsoft Active Directory Federation Services
F5 Deployment Guide Deploying F5 with Microsoft Active Directory Federation Services This F5 deployment guide provides detailed information on how to deploy Microsoft Active Directory Federation Services
Rally Installation Guide
Rally Installation Guide Rally On-Premises release 2015.1 [email protected] www.rallydev.com Version 2015.1 Table of Contents Overview... 3 Server requirements... 3 Browser requirements... 3 Access
Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20
Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup
How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (
WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Hardware Setup Instructions... 3 QNAP TS-409... 3 Netgear ReadyNas NV+... 5 Drobo rev1...
Installing and Using the vnios Trial
Installing and Using the vnios Trial The vnios Trial is a software package designed for efficient evaluation of the Infoblox vnios appliance platform. Providing the complete suite of DNS, DHCP and IPAM
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
Amazon Web Services Primer. William Strickland COP 6938 Fall 2012 University of Central Florida
Amazon Web Services Primer William Strickland COP 6938 Fall 2012 University of Central Florida AWS Overview Amazon Web Services (AWS) is a collection of varying remote computing provided by Amazon.com.
MassTransit 6.0 Enterprise Web Configuration for Macintosh OS 10.5 Server
MassTransit 6.0 Enterprise Web Configuration for Macintosh OS 10.5 Server November 6, 2008 Group Logic, Inc. 1100 North Glebe Road, Suite 800 Arlington, VA 22201 Phone: 703-528-1555 Fax: 703-528-3296 E-mail:
Laptop Backup - Administrator Guide (Windows)
Laptop Backup - Administrator Guide (Windows) Page 1 of 86 Page 2 of 86 Laptop Backup - Administrator Guide (Windows) TABLE OF CONTENTS OVERVIEW PREPARE COMMCELL SETUP FIREWALL USING PROXY SETUP FIREWALL
EZblue BusinessServer The All - In - One Server For Your Home And Business
EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.11 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan
Deployment Guide AX Series with Active Directory Federation Services 2.0 and Office 365
Deployment Guide AX Series with Active Directory Federation Services 2.0 and Office 365 DG_ADFS20_120907.1 TABLE OF CONTENTS 1 Overview... 4 2 Deployment Guide Overview... 4 3 Deployment Guide Prerequisites...
Load Balancing Microsoft Sharepoint 2010 Load Balancing Microsoft Sharepoint 2013. Deployment Guide
Load Balancing Microsoft Sharepoint 2010 Load Balancing Microsoft Sharepoint 2013 Deployment Guide rev. 1.4.2 Copyright 2015 Loadbalancer.org, Inc. 1 Table of Contents About this Guide... 3 Appliances
SyncThru TM Web Admin Service Administrator Manual
SyncThru TM Web Admin Service Administrator Manual 2007 Samsung Electronics Co., Ltd. All rights reserved. This administrator's guide is provided for information purposes only. All information included
A SHORT INTRODUCTION TO BITNAMI WITH CLOUD & HEAT. Version 1.12 2014-07-01
A SHORT INTRODUCTION TO BITNAMI WITH CLOUD & HEAT Version 1.12 2014-07-01 PAGE _ 2 TABLE OF CONTENTS 1. Introduction.... 3 2. Logging in to Cloud&Heat Dashboard... 4 2.1 Overview of Cloud&Heat Dashboard....
Linux VPS with cpanel. Getting Started Guide
Linux VPS with cpanel Getting Started Guide First Edition October 2010 Table of Contents Introduction...1 cpanel Documentation...1 Accessing your Server...2 cpanel Users...2 WHM Interface...3 cpanel Interface...3
NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
System Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
Deploying Windows Streaming Media Servers NLB Cluster and metasan
Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................
Load Balancing. Outlook Web Access. Web Mail Using Equalizer
Load Balancing Outlook Web Access Web Mail Using Equalizer Copyright 2009 Coyote Point Systems, Inc. Printed in the USA. Publication Date: January 2009 Equalizer is a trademark of Coyote Point Systems
User s guide. APACHE 2.0 + SSL Linux. Using non-qualified certificates with APACHE 2.0 + SSL Linux. version 1.3 UNIZETO TECHNOLOGIES S.A.
User s guide APACHE 2.0 + SSL Linux Using non-qualified certificates with APACHE 2.0 + SSL Linux version 1.3 Table of contents 1. PREFACE... 3 2. GENERATING CERTIFICATE... 3 2.1. GENERATING REQUEST FOR
VMware Identity Manager Connector Installation and Configuration
VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document
Secure Web Browsing in Public using Amazon
Technical White Paper jwgoerlich.us Secure Web Browsing in Public using Amazon J Wolfgang Goerlich Written July 2011 Updated August 2012 with instructions for Mac users by Scott Wrosch. Abstract The weary
Kollaborate Server Installation Guide!! 1. Kollaborate Server! Installation Guide!
Kollaborate Server Installation Guide 1 Kollaborate Server Installation Guide Kollaborate Server is a local implementation of the Kollaborate cloud workflow system that allows you to run the service in-house
Talari Virtual Appliance CT800. Getting Started Guide
Talari Virtual Appliance CT800 Getting Started Guide March 18, 2015 Table of Contents About This Guide... 2 References... 2 Request for Comments... 2 Requirements... 3 AWS Resources... 3 Software License...
Rstudio Server on Amazon EC2
Rstudio Server on Amazon EC2 Liad Shekel [email protected] June 2015 Liad Shekel Rstudio Server on Amazon EC2 1 / 72 Rstudio Server on Amazon EC2 Outline 1 Amazon Web Services (AWS) History Services
Enterprise AWS Quick Start Guide. v8.0.1
Enterprise AWS Quick Start Guide v8.0.1 rev. 1.1.4 Copyright 2002 2016 Loadbalancer.org, Inc Table of Contents Introduction... 4 About Enterprise AWS... 4 Main Differences to the Non-Cloud Product... 4
Pharos Control User Guide
Outdoor Wireless Solution Pharos Control User Guide REV1.0.0 1910011083 Contents Contents... I Chapter 1 Quick Start Guide... 1 1.1 Introduction... 1 1.2 Installation... 1 1.3 Before Login... 8 Chapter
TECHNOLOGY WHITE PAPER Jun 2012
TECHNOLOGY WHITE PAPER Jun 2012 Technology Stack C# Windows Server 2008 PHP Amazon Web Services (AWS) Route 53 Elastic Load Balancing (ELB) Elastic Compute Cloud (EC2) Amazon RDS Amazon S3 Elasticache
Guide to the LBaaS plugin ver. 1.0.2 for Fuel
Guide to the LBaaS plugin ver. 1.0.2 for Fuel Load Balancing plugin for Fuel LBaaS (Load Balancing as a Service) is currently an advanced service of Neutron that provides load balancing for Neutron multi
Comodo MyDLP Software Version 2.0. Installation Guide Guide Version 2.0.010215. Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013
Comodo MyDLP Software Version 2.0 Installation Guide Guide Version 2.0.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.About MyDLP... 3 1.1.MyDLP Features... 3
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
VMware vcenter Log Insight Getting Started Guide
VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
Reliable Data Tier Architecture for Job Portal using AWS
Reliable Data Tier Architecture for Job Portal using AWS Manoj Prakash Thalagatti 1, Chaitra B 2, Mohammed Asrar Naveed 3 1,3 M. Tech Student, Dept. of ISE, Acharya Institute of Technology, Bengaluru,
A Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
ManageEngine IT360. Professional Edition Installation Guide. [[email protected]]
ManageEngine IT360 (Division of ZOHO Corporation) ) www.manageengine.com/it360 ManageEngine IT360 Professional Edition Installation Guide [[email protected]] [This document is a guideline for installing
Asia Web Services Ltd. (vpshosting.com.hk)
. (vpshosting.com.hk) Getting Started guide for VPS Published: July 2011 Copyright 2011 Table of Contents Page I. Introduction to VPS 3 II. Accessing Plesk control panel 4 III. Adding your domain in Plesk
BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
Server Installation Manual 4.4.1
Server Installation Manual 4.4.1 1. Product Information Product: BackupAgent Server Version: 4.4.1 2. Introduction BackupAgent Server has several features. The application is a web application and offers:
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.0 July 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing Disaster Recovery Version 7.0 July
JAMF Software Server Installation and Configuration Guide for Linux. Version 9.2
JAMF Software Server Installation and Configuration Guide for Linux Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide
Penetration Testing LAB Setup Guide
Penetration Testing LAB Setup Guide (External Attacker - Intermediate) By: magikh0e - [email protected] Last Edit: July 06 2012 This guide assumes a few things... 1. You have read the basic guide of this
2X SecureRemoteDesktop. Version 1.1
2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious
insync Installation Guide
insync Installation Guide 5.2 Private Cloud Druva Software June 21, 13 Copyright 2007-2013 Druva Inc. All Rights Reserved. Table of Contents Deploying insync Private Cloud... 4 Installing insync Private
Tibbr Installation Addendum for Amazon Web Services
Tibbr Installation Addendum for Amazon Web Services Version 1.1 February 17, 2013 Table of Contents Introduction... 3 MySQL... 3 Choosing a RDS instance size... 3 Creating the RDS instance... 3 RDS DB
REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series
How To Set Up Egnyte For Netapp Sync For Netapp
Egnyte Storage Sync For NetApp Installation Guide Introduction... 2 Architecture... 2 Key Features... 3 Access Files From Anywhere With Any Device... 3 Easily Share Files Between Offices and Business Partners...
FileMaker Server 14. FileMaker Server Help
FileMaker Server 14 FileMaker Server Help 2007 2015 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks
Single Node Hadoop Cluster Setup
Single Node Hadoop Cluster Setup This document describes how to create Hadoop Single Node cluster in just 30 Minutes on Amazon EC2 cloud. You will learn following topics. Click Here to watch these steps
