Reference Architecture

Size: px
Start display at page:

Download "Reference Architecture"

Transcription

1 Reference Architecture Or get in touch: 1

2 Introduction This reference describes an ideal Linux infrastructure designed to cover the majority of application deployments. It is infuenced heavily by our experience in working with both large and small customers, and represents what we believe to be current best practice. We primarily use open-source and free tools, believing them to be the best choice in most cases, however some are also available under commercial support from their vendor if that is required. The approaches described here are applicable whether hosting on co-located servers, dedicated servers from a managed service provider, or using cloud servers. We believe that good infrastructure is: Scalable able to grow horizontally or vertically as required by the operational demands put on it by the business. Standards-based uses standard protocols, software and processes so as to be unsurprising to anyone working on it. Or get in touch: info@scalefactory.com 2

3 Supplier agnostic not tied to products or services of any organisation (including The Scale Factory), allowing portability between hosting suppliers or service organisations. Cost efective no more expensive than it needs to be, either in capital or operational expenditure. Current using modern tools and techniques, though without being too experimental about it. Repeatable easily repeated, so new server builds or secondary datacentre rollouts are straightforward. Available meets availability requirements for the business. Performant delivers resources quickly and efficiently. Responsive to change can deal with changing business requirements rapidly. Manageable easy to operate centrally, and without the requirement of heavy staffing levels. Operationally visible provides monitoring, logging and Or get in touch: 3

4 other tools so that it's clear what the platform is doing. Secure protected from external and internal attackers. Auditable transparent in process, and easy to see who has changed what and when Every design decision we make is pursuant to one or more of these goals. Or get in touch: 4

5 Basic Design The standard Scale Factory architecture is based around one or more hosting sites. Each site contains a set of supporting infrastructure for central control and observation purposes. This supporting infrastructure enables the operation of service hosts (either physical or virtual) arranged into clusters. These clusters run applications which are then arranged into platforms. Multi-site operation In this fgure, there are three sites dc1, dc2 and of1. Each of these contains support services. The site dc1 houses live and Or get in touch: info@scalefactory.com 5

6 staging platforms, which contain web and database services. There are no cross-site dependencies each site can work in isolation from the others. The live platform in dc2 might be a replica of that in dc1, with some global load balancing solution balancing traffic between the two for reasons of availability or geographic distribution. Or get in touch: info@scalefactory.com 6

7 Location The Scale Factory Reference Architecture is designed to be agnostic of where it is hosted, and can be built out in colocation suites, on managed servers or in fully cloud-hosted environments. Depending on your application's constraints, one or more of these options may not suit. If building out an infrastructure on your own hardware in a colocation suite, you get the highest level of control over how things are put together, and this may be desirable in the case of specialist application requirements, or for reasons of compliance. With this level of control comes an increased level of responsibility. If a RAID array throws a disc in the middle of the night, you'll need to be monitoring for and responding to that eventuality in some way. When co-locating, there will be a high up-front capital expenditure as you must buy servers, storage, network devices and cabling. Power constraints must be taken into account a modern rack is likely to run out of power before it is full and lower power devices are often more expensive. Server costs are often surprising to people who are used to buying consumer-grade hardware per-server costs of up to 4000 are Or get in touch: info@scalefactory.com 7

8 not uncommon. Lead times on hardware orders can sometimes take you by surprise too it's not completely unknown for a server order to take six weeks to be fulflled, particularly when adverse weather conditions cause RAM or hard disc manufacturing difficulties. An alternative to colocation is to take servers from a managed service provider. These organisations have hardware and network specialists on staf, and will take responsibility for keeping servers up, replacing failed discs, etc. In exchange for this, you may lose an element of control things like network layout and server specifcation are likely to be constrained to some extent. Managed server hosting costs vary widely across the industry, and most are open to negotiation. Some hosts charge higher setup fees in exchange for a lower monthly rate. Some ofer discounts if you pay for a whole year up-front. Providers who can sell access to both physical servers and virtual (or cloud) servers, with a private network between the two are ideal. Some have short billing terms on their cloud servers, allowing you to add and remove capacity as required by seasonal demand. Or get in touch: info@scalefactory.com 8

9 Fully cloud-hosted solutions (such as Amazon EC2 or Linode) are currently very popular. They are best suited to applications whose components all scale horizontally, and/or have extremely peaky levels of demand. Applications which require predictable performance can be problematic on cloud servers, as sharing resources with other customers means you get no guarantee of resource availability. The cheaper, smaller instances can be heavily CPU contended at times, and larger instances are more expensive month-onmonth than equivalent dedicated servers with a managed hosting supplier. We usually recommend that organisations who run applications centred around standard relational databases do so from managed or co-located hardware, but consider using cloud servers to deal with peaks in demand or to accelerate highly parallelisable jobs like data processing. Or get in touch: info@scalefactory.com 9

10 Supporting Infrastructure In a Scale Factory architecture, we install supporting infrastructure at each site. These provide services to the rest of the network, including confguration management, monitoring and backups, as well as central identity, time and naming services. This simplifes server management and ensures consistency across the network. The following diagram shows how individual server nodes use the supporting services. Or get in touch: info@scalefactory.com 10

11 Core servers are provided in a high-availability pair, with some services provided in an active/active model, and some in active/passive using a foating IP address: DHCP and TFTP services are only required in co-located sites where network confguration and automated system install is not performed by the supplier. Package repository mirrors may not need to be provided locally except as an optimisation in larger networks, or where more strict change control is a requirement. Or get in touch: info@scalefactory.com 11

12 Or get in touch: 12

13 Naming Sensible naming of hosts and services is more important than it appears. A good naming scheme represents the location and purpose of a device, as well as alluding to its membership of a platform, cluster or service tier. Poor or badly-implemented naming leads to administrative complexity, and increases the likelihood of operator error. We defne a consistent naming standard for all infrastructure components, ensure all hosts have forward and reverse DNS mappings and confgure them to report their hostname correctly. As DNS is laid out in a hierarchy, we assign a DNS search path so that inside any platform, referencing a hostname like 'db' will always fnd the most local service by that name for example in the 'live' platform, 'db' always means the 'live' database. This minimises the number of changes that need to be made to confguration fles between platform. Or get in touch: info@scalefactory.com 13

14 Identity Identity management is crucial to the operation of even a small systems infrastructure. Identity management systems are used to authenticate and authorise users. Authentication is used to establish that a user is who they claim to be. The most obvious example of this is the use of passwords. Authorisation is the system of checks that ensure your authenticated user can only access the resources and privileges that they need to do their jobs. We use 389 Directory Server 1 to provide central identity services to our infrastructure. All authentication and authorisation tasks can be performed this one system, which means each user only needs to learn one set of access credentials for all systems in the organisation. This includes access to servers, VPN services, web administration panels and so forth. 1 Or get in touch: info@scalefactory.com 14

15 Centralised identity management also means that when new employees start, or old employees leave, there is just a single place where their credentials need to be registered or removed, keeping complexity to a minimum. Administrative users have standard user accounts like everyone else. Their superuser access is then limited to the minimum set of privileged activities required to do their job. This has the advantage that there is no need to share account passwords. The root password can then be locked away in case of emergencies. Activities performed by these privileged users can then by logged against their identity for audit purposes. Batch processes and automated jobs are also assigned their own users, and have minimal access to superuser resources just as a human user would. System users (UIDs below 1000) are still managed in password and group fles. Or get in touch: info@scalefactory.com 15

16 Configuration Management When you install an operating system on a host, only the very basics of that environment are confgured. Before that host is usable in any real sense, other software needs installing, confguration fles need to be updated, and services need to be started. The traditional, naïve approach to this problem is to make these confguration changes by hand. This approach doesn't scale well to an infrastructure of more than a couple of servers, and isn't advisable even then. We use Puppet 2 to automate this type of confguration. Given a description of the desired server state, Puppet installs packages, updates confguration fles and starts services in order to reach that state. Throughout the lifetime of a server, other administrative changes are occasionally required. Puppet can make these too, and will only make the minimum set of changes required to reach the new desired state. Puppet's confguration is stored as plain text fles, and we use a version control system to manage these. As well as the 2 Or get in touch: info@scalefactory.com 16

17 benefts this lends to collaborative working, this also means all infrastructure changes beneft from an automated audit trail, showing which individual made changes and when. Confguration management minimises diferences between diferent systems and environments by using a standard set of tools for building all environments. It is an important part of ensuring parity between development and production environments. Disaster recovery and host rebuild becomes extremely straightforward when no manual confguration activity is required. All Scale Factory infrastructures are deployed from a common base set of Puppet manifests. These undergo constant development, and beneft from an automated test suite. We make then available to customers under a license which permits use and modifcation, but not redistribution. Or get in touch: info@scalefactory.com 17

18 Availability For most infrastructures, availability is important. In the most straightforward view of the world, this simply means that in order to cope with failure you need at least two of everything. For services which maintain no local state, such as web or content servers, it is generally possible to place two or more of these behind a network load balancer. In the case of services which hold their own state data, most provide their own approaches to high availability. For example, MySQL or SOLR database hosts can be confgured to replicate to one or more slave hosts. Memcache servers can be run as a cluster, as long as your application has a list of every node in the cluster. Where a service or resource can only exist on a single host at a time, cluster software exists to allow multiple hosts to negotiate with each other for the right to own that service or resource, and we regularly do this to allow fail-over of master IP addresses for services. Finally, application code should be able to cope gracefully if some resources are missing. Services should not need to be restarted if resources migrate to other hosts in a failover group. Or get in touch: info@scalefactory.com 18

19 High availability can come with associated cost, and so we look at each system's availability requirements in turn. For example in a standard Scale Factory infrastructure, we ensure that confguration management, identity, time and naming services are highly available as their unavailability can afect live service. Observational services such as monitoring and logging can run without failover to keep costs down, and largely without afecting live system availability. We use tools from the Linux Virtual Server Project 3 to provide IP load balancing and failover. In addition, in the case of load balancing, we can use load balancing services provided by our hosting providers, or managed hardware load balancers in the case of applications requiring a throughput greater than 10Mbps. 3 Or get in touch: info@scalefactory.com 19

20 Backups and Disaster Recovery Every infrastructure has important data which needs to be reliably backed up. For most web applications, this tends to be application code, database content and media assets. We design infrastructure so that the data you want to back up is held in a small number of well-defned places. In our standard design, we provide at least one host with plenty of (RAID mirrored) storage at each site. We run Bacula 4 on this host, confgured to back up important data on a nightly schedule. This backup can then be replicated of-site, with encryption where required for security. We run backups in a way which minimises service disruption. For example, with MySQL databases, this usually means taking snapshot backups from an otherwise unused replication slave. A backup is only as good as your ability to restore it, and so we provide methods by which restoration tests can be performed. We design infrastructure in such a way that, in a disaster recovery scenario where bare-metal recovery is required (such 4 Or get in touch: info@scalefactory.com 20

21 as loss of a complete data centre), it is possible to get up and running again on new hardware using nothing but operating system media, and backups. Or get in touch: info@scalefactory.com 21

22 Monitoring A hosting infrastructure is a large and often complicated beast, and in an environment that can, thanks to fail-over, cope with individual node failure it isn't possible to tell how healthy the platform is by simply testing whether a website is available to the outside world. We solve this problem by installing a monitoring system. A good monitoring system can monitor the health and performance of individual applications; the host operating system; the network; and hardware devices. The data collected is then usable for capacity planning, availability monitoring, performance analysis and troubleshooting. We install Zabbix 5 for this purpose, and provide a set of custom templates and data collectors for all of our standard pieces of software. 5 Or get in touch: info@scalefactory.com 22

23 Log Aggregation Systems often generate a lot of log data, and attempting to troubleshoot problems in a distributed system without centralised log aggregation is a painful exercise. Individual application servers shouldn't need huge amounts of space for log storage, and should ideally keep log data for only a limited amount of time. We use rsyslog 6 to ship live logging data from individual hosts to a single log server, where administrators can log in and view the logging output of the whole platform in a single place. Centralised logs make for easier troubleshooting, and software such as Splunk 7 (not free) or Graylog 8 can make this troubleshooting easier by ofering an easy to use interface for querying log data. Automated fltering and querying can also drive data collection or monitoring events, to help improve operational visibility. We're currently working on adding Graylog to our standard platform design Or get in touch: info@scalefactory.com 23

24 Architecture As an infrastructure grows, it pays to have thought about the architecture of the systems and software in advance. Certain architectural decisions can limit the potential for growth by making scalability difficult. Diferent parts of a system scale at diferent rates for example, on a photo sharing site such as Flickr, the infrastructure responsible for storage of photographs will be the fastest-growing part of the system; storage for the comments will scale at a diferent rate (probably more slowly); and the system which stores a username/password pair for each user will scale more slowly still. Our standard infrastructure design allows us to build service clusters of diferent sizes with this sort of variable growth in mind, though typically an application needs development work in order to break it into components which can be scaled that way. We can ofer consultancy on this activity. Or get in touch: info@scalefactory.com 24

25 Security Diferent infrastructures require diferent levels of security, but we always work with a sensible minimum set of requirements in mind. Using either physical frewalls or per-host iptables rules (depending on what the hosting provider can ofer), we ensure that administration is only possible from local core servers, or any trusted networks connected to the infrastructure by VPN. This includes access to SSH as well as any internal web-based admin or monitoring dashboards. When services provide methods by which to control access, we ensure that this is granted to consumers of this service on a least privilege basis, granting only as much access is required, and no more. Human operators are treated in the same way, with superuser access being limited to the minimum set of permissions required by that user to do their job. More complex infrastructures may require more interesting frewall provision, and may require physical frewall devices to completely separate hosts from each other on the network. This will help inform the hosting location debate, and will need to be discussed during the architecture phase. Or get in touch: info@scalefactory.com 25

26 Use of confguration management tools and least-privilege superuser access, along with centralised logging and monitoring provides an audit trail for all system activities. Use of automated testing in combination with confguration management tools means system software can rapidly and easily be upgraded. Accurate development and staging environments mean these upgrades can be tested in a preproduction environment before they're pushed live, removing most of the risk surrounding upgrade activities. Or get in touch: info@scalefactory.com 26

27 Development / launch process As a code base grows, rigorous manual testing becomes impossible. When testing is seen as a large time overhead, it is often skipped in order to meet deadlines, and a code base without tests becomes a place where developers fear to tread, slowing future progress. Automated testing should be considered mandatory for any modern software project. Continuous integration where tests are run every time code changes can be tricky to set up, but pays dividends over time. In an ideal world, if you have a broad suite of tests in which you trust, code launches can be automated, and happen continuously whenever changes are made. In a modern web application, change should be considered the norm, not the exception and we attempt to engineer our systems to cope with this view. We make use of the Jenkins 9 CI tool to automate test and deployment, and provide auditable visibility of the process. The testing approach itself will depend on language environment, but the following broad categories of test will no doubt be relevant: Unit testing 9 Or get in touch: info@scalefactory.com 27

28 BDD style scenario testing Integration testing Performance testing Penetration testing As well as running tests, Jenkins can be used to trigger automated deployment of application software using tools such as Capistrano 10 or Fabric 11 which removes the margin for error that software deployment can otherwise entail. We follow many of the best practise guidelines described in Continuous Delivery 12 by Jez Humble and David Farley Or get in touch: 28

Hosting Options. White paper last updated January 2013 For more information: www.scalefactory.com Or get in touch: info@scalefactory.

Hosting Options. White paper last updated January 2013 For more information: www.scalefactory.com Or get in touch: info@scalefactory. Hosting Options Or get in touch: info@scalefactory.com 1 Introduction When building an infrastructure for your web application, choosing a hosting provider is an important part of the process. This decision

More information

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008 Course 50400A: Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008 Length: 5 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology:

More information

High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach

High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach Introduction Email is becoming ubiquitous and has become the standard tool for communication in many

More information

MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008

MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008 MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008 Table of Contents Introduction Audience At Completion Prerequisites Microsoft Certified Professional Exams Student Materials

More information

When talking about hosting

When talking about hosting d o s Cloud Hosting - Amazon Web Services Thomas Floracks When talking about hosting for web applications most companies think about renting servers or buying their own servers. The servers and the network

More information

BeBanjo Infrastructure and Security Overview

BeBanjo Infrastructure and Security Overview BeBanjo Infrastructure and Security Overview Can you trust Software-as-a-Service (SaaS) to run your business? Is your data safe in the cloud? At BeBanjo, we firmly believe that SaaS delivers great benefits

More information

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server

More information

Alfresco Enterprise on AWS: Reference Architecture

Alfresco Enterprise on AWS: Reference Architecture Alfresco Enterprise on AWS: Reference Architecture October 2013 (Please consult http://aws.amazon.com/whitepapers/ for the latest version of this paper) Page 1 of 13 Abstract Amazon Web Services (AWS)

More information

Preparing for the cloud: Understanding the infrastructure impacts Eight essential tips for a successful cloud migration

Preparing for the cloud: Understanding the infrastructure impacts Eight essential tips for a successful cloud migration Eight essential tips for a successful How a The move to the cloud is happening and it s happening now. But before you jump start your cloud migration project, be sure you understand how to adequately prepare

More information

Webrecs IT infrastructure. The Webrecs IT backend explained and how we store, backup, protect and deliver your documents to you

Webrecs IT infrastructure. The Webrecs IT backend explained and how we store, backup, protect and deliver your documents to you Webrecs IT infrastructure The Webrecs IT backend explained and how we store, backup, protect and deliver your documents to you Sunday, April 21, 2013 Contents Introduction... 3 Data storage... 3 Data Centres...

More information

Click Studios. Passwordstate. High Availability Installation Instructions

Click Studios. Passwordstate. High Availability Installation Instructions Passwordstate High Availability Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed,

More information

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2 DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.

More information

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such

More information

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical Radware ADC-VX Solution The Agility of Virtual; The Predictability of Physical Table of Contents General... 3 Virtualization and consolidation trends in the data centers... 3 How virtualization and consolidation

More information

Establishing Environmental Best Practices. Brendan Law Blaw@td.com.au @FlamerNZ Flamer.co.nz/spag/

Establishing Environmental Best Practices. Brendan Law Blaw@td.com.au @FlamerNZ Flamer.co.nz/spag/ Establishing Environmental Best Practices Brendan Law Blaw@td.com.au @FlamerNZ Flamer.co.nz/spag/ Agenda Active Directory Service Accounts Database Platform Windows Platform Data Storage Planning Virtualisation

More information

Click Studios. Passwordstate. High Availability Installation Instructions

Click Studios. Passwordstate. High Availability Installation Instructions Passwordstate High Availability Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed,

More information

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document

More information

Cloud Based Application Architectures using Smart Computing

Cloud Based Application Architectures using Smart Computing Cloud Based Application Architectures using Smart Computing How to Use this Guide Joyent Smart Technology represents a sophisticated evolution in cloud computing infrastructure. Most cloud computing products

More information

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between

More information

High Availability of VistA EHR in Cloud. ViSolve Inc. White Paper February 2015. www.visolve.com

High Availability of VistA EHR in Cloud. ViSolve Inc. White Paper February 2015. www.visolve.com High Availability of VistA EHR in Cloud ViSolve Inc. White Paper February 2015 1 Abstract Inspite of the accelerating migration to cloud computing in the Healthcare Industry, high availability and uptime

More information

A SURVEY OF POPULAR CLUSTERING TECHNOLOGIES

A SURVEY OF POPULAR CLUSTERING TECHNOLOGIES A SURVEY OF POPULAR CLUSTERING TECHNOLOGIES By: Edward Whalen Performance Tuning Corporation INTRODUCTION There are a number of clustering products available on the market today, and clustering has become

More information

Implementing Microsoft Windows Server Failover Clustering (WSFC) and SQL Server 2012 AlwaysOn Availability Groups in the AWS Cloud

Implementing Microsoft Windows Server Failover Clustering (WSFC) and SQL Server 2012 AlwaysOn Availability Groups in the AWS Cloud Implementing Microsoft Windows Server Failover Clustering (WSFC) and SQL Server 2012 AlwaysOn Availability Groups in the AWS Cloud David Pae, Ulf Schoo June 2013 (Please consult http://aws.amazon.com/windows/

More information

Top 10 Reasons why MySQL Experts Switch to SchoonerSQL - Solving the common problems users face with MySQL

Top 10 Reasons why MySQL Experts Switch to SchoonerSQL - Solving the common problems users face with MySQL SCHOONER WHITE PAPER Top 10 Reasons why MySQL Experts Switch to SchoonerSQL - Solving the common problems users face with MySQL About Schooner Information Technology Schooner Information Technology provides

More information

Active Directory Infrastructure Design Document

Active Directory Infrastructure Design Document Active Directory Infrastructure Design Document Written By Sainath KEV Microsoft MVP Directory Services Microsoft Author TechNet Magazine, Microsoft Operations Framework Microsoft Speaker - Singapore Document

More information

Best Practices for Architecting Your Hosted Systems for 100% Application Availability

Best Practices for Architecting Your Hosted Systems for 100% Application Availability Best Practices for Architecting Your Hosted Systems for 100% Application Availability Overview Business Continuity is not something that is implemented at the time of a disaster. Business Continuity refers

More information

Cloud computing is a marketing term that means different things to different people. In this presentation, we look at the pros and cons of using

Cloud computing is a marketing term that means different things to different people. In this presentation, we look at the pros and cons of using Cloud computing is a marketing term that means different things to different people. In this presentation, we look at the pros and cons of using Amazon Web Services rather than setting up a physical server

More information

Building Storage Service in a Private Cloud

Building Storage Service in a Private Cloud Building Storage Service in a Private Cloud Sateesh Potturu & Deepak Vasudevan Wipro Technologies Abstract Storage in a private cloud is the storage that sits within a particular enterprise security domain

More information

Configuring Advanced Windows Server 2012 Services

Configuring Advanced Windows Server 2012 Services Course 20412D: Configuring Advanced Windows Server 2012 Services Course Details Course Outline Module 1: Implementing Advanced Network Services In this module students will be able to configure advanced

More information

Quorum DR Report. Top 4 Types of Disasters: 55% Hardware Failure 22% Human Error 18% Software Failure 5% Natural Disasters

Quorum DR Report. Top 4 Types of Disasters: 55% Hardware Failure 22% Human Error 18% Software Failure 5% Natural Disasters SAP High Availability in virtualized environments running on Windows Server 2012 Hyper-V Part 1: Overview Introduction Almost everyone is talking about virtualization and cloud computing these days. This

More information

Migration Scenario: Migrating Backend Processing Pipeline to the AWS Cloud

Migration Scenario: Migrating Backend Processing Pipeline to the AWS Cloud Migration Scenario: Migrating Backend Processing Pipeline to the AWS Cloud Use case Figure 1: Company C Architecture (Before Migration) Company C is an automobile insurance claim processing company with

More information

Websense Support Webinar: Questions and Answers

Websense Support Webinar: Questions and Answers Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user

More information

a Disaster Recovery Plan

a Disaster Recovery Plan Construction of a Disaster Recovery Plan David Godwin, Sr. Sales Engineer March 18, 2014 Objectives Understand What Disaster Recovery is? Why is Disaster Recovery Needed? Effectively assist customers or

More information

How to Set Up Disaster Recovery for HP OO

How to Set Up Disaster Recovery for HP OO HP OO 10 OnBoarding Kit Community Assistance Team How to Set Up Disaster Recovery for HP OO Various global and sector-specific regulations, as well as standards such as COBIT DS4, ISO 2031 and others,

More information

Can Cloud Database PaaS Solutions Replace In-House Systems?

Can Cloud Database PaaS Solutions Replace In-House Systems? Can Cloud Database PaaS Solutions Replace In-House Systems? Abstract: With the advent of Platform-as-a-Service as a viable alternative to traditional database solutions, there is a great deal of interest

More information

Application Note 116: Gauntlet System High Availability Using Replication

Application Note 116: Gauntlet System High Availability Using Replication Customer Service: 425-487-1515 Technical Support: 425-951-3390 Fax: 425-487-2288 Email: info@teltone.com support@teltone.com Website: www.teltone.com Application Note 116: Gauntlet System High Availability

More information

ScaleArc idb Solution for SQL Server Deployments

ScaleArc idb Solution for SQL Server Deployments ScaleArc idb Solution for SQL Server Deployments Objective This technology white paper describes the ScaleArc idb solution and outlines the benefits of scaling, load balancing, caching, SQL instrumentation

More information

HyperQ DR Replication White Paper. The Easy Way to Protect Your Data

HyperQ DR Replication White Paper. The Easy Way to Protect Your Data HyperQ DR Replication White Paper The Easy Way to Protect Your Data Parsec Labs, LLC 7101 Northland Circle North, Suite 105 Brooklyn Park, MN 55428 USA 1-763-219-8811 www.parseclabs.com info@parseclabs.com

More information

Course 2788A: Designing High Availability Database Solutions Using Microsoft SQL Server 2005

Course 2788A: Designing High Availability Database Solutions Using Microsoft SQL Server 2005 Course Syllabus Course 2788A: Designing High Availability Database Solutions Using Microsoft SQL Server 2005 About this Course Elements of this syllabus are subject to change. This three-day instructor-led

More information

Cloud economics and flexibility with local choice and control

Cloud economics and flexibility with local choice and control Cloud economics and flexibility with local choice and control Schools are expected to operate in a hybrid IT environment for the foreseeable future, part on-premise and part cloud service. Schools require

More information

Database Resilience at ISPs. High-Availability. White Paper

Database Resilience at ISPs. High-Availability. White Paper Database Resilience at ISPs High-Availability White Paper Internet Service Providers (ISPs) generally do their job very well. The commercial hosting market is segmented in a number of different ways but

More information

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between

More information

ArcGIS 10.3 Server on Amazon Web Services

ArcGIS 10.3 Server on Amazon Web Services ArcGIS 10.3 Server on Amazon Web Services Copyright 1995-2015 Esri. All rights reserved. Table of Contents Introduction What is ArcGIS Server on Amazon Web Services?............................... 5 Quick

More information

Table of Contents. Overview... 1 Introduction... 2 Common Architectures... 3. Technical Challenges with Magento... 6. ChinaNetCloud's Experience...

Table of Contents. Overview... 1 Introduction... 2 Common Architectures... 3. Technical Challenges with Magento... 6. ChinaNetCloud's Experience... Table of Contents Overview... 1 Introduction... 2 Common Architectures... 3 Simple System... 3 Highly Available System... 4 Large Scale High-Performance System... 5 Technical Challenges with Magento...

More information

Legalesign Service Definition Electronic signature and contract management service

Legalesign Service Definition Electronic signature and contract management service Legalesign Service Definition Electronic signature and contract management service Legalesign Limited UN House, 4 Hunter Square, Edinburgh, EH1 1QW Tel: 0131 463 9099 Email: email@legalesign.com Overview

More information

Using Emergency Restore to recover the vcenter Server has the following benefits as compared to the above methods:

Using Emergency Restore to recover the vcenter Server has the following benefits as compared to the above methods: Executive Summary This document provides certain best practices with regards to the Emergency Restore feature in vsphere Data Protection 5.5 release. It also describes the methods and processes to be used

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Open Directory. Apple s standards-based directory and network authentication services architecture. Features Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data

More information

IM and Presence Disaster Recovery System

IM and Presence Disaster Recovery System Disaster Recovery System, page 1 Access the Disaster Recovery System, page 2 Back up data in the Disaster Recovery System, page 3 Restore scenarios, page 9 Backup and restore history, page 15 Data authentication

More information

CA Cloud Overview Benefits of the Hyper-V Cloud

CA Cloud Overview Benefits of the Hyper-V Cloud Benefits of the Hyper-V Cloud For more information, please contact: Email: sales@canadianwebhosting.com Ph: 888-821-7888 Canadian Web Hosting (www.canadianwebhosting.com) is an independent company, hereinafter

More information

Authentication as a Service (AaaS): Creating A New Revenue Stream with AuthAnvil

Authentication as a Service (AaaS): Creating A New Revenue Stream with AuthAnvil Authentication as a Service (AaaS): Creating A New Revenue Stream with AuthAnvil SaaS, PaaS, IaaS Powered by advancements in cloud technology, the X as a Service model has become exceptionally popular

More information

Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module

Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module WHITE PAPER May 2015 Contents Advantages of NEC / Iron Mountain National

More information

White Paper. Using Universal Platform TM to Facilitate Disaster Recovery Projects

White Paper. Using Universal Platform TM to Facilitate Disaster Recovery Projects White Paper Using Universal Platform TM to Facilitate Disaster Recovery Projects Page 2 of 9 Common challenges faced by companies during a Disaster Recovery project Controlling and brokering access to

More information

Inside Track Research Note. In association with. Enterprise Storage Architectures. Is it only about scale up or scale out?

Inside Track Research Note. In association with. Enterprise Storage Architectures. Is it only about scale up or scale out? Research Note In association with Enterprise Storage Architectures Is it only about scale up or scale out? August 2015 About this The insights presented in this document are derived from independent research

More information

www.basho.com Technical Overview Simple, Scalable, Object Storage Software

www.basho.com Technical Overview Simple, Scalable, Object Storage Software www.basho.com Technical Overview Simple, Scalable, Object Storage Software Table of Contents Table of Contents... 1 Introduction & Overview... 1 Architecture... 2 How it Works... 2 APIs and Interfaces...

More information

Multi-Datacenter Replication

Multi-Datacenter Replication www.basho.com Multi-Datacenter Replication A Technical Overview & Use Cases Table of Contents Table of Contents... 1 Introduction... 1 How It Works... 1 Default Mode...1 Advanced Mode...2 Architectural

More information

Managing Your Microsoft Windows Server Fleet with AWS Directory Service. May 2015

Managing Your Microsoft Windows Server Fleet with AWS Directory Service. May 2015 Managing Your Microsoft Windows Server Fleet with AWS Directory Service May 2015 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational

More information

IT SERVICE MANAGEMENT FAQ

IT SERVICE MANAGEMENT FAQ IT SERVICE MANAGEMENT FAQ Version: 1.3 Date: February 2011 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Data Stewardship... 4 2.1 Where is the data stored?... 4 2.2 Who controls the data?... 4 2.2

More information

Astaro Deployment Guide High Availability Options Clustering and Hot Standby

Astaro Deployment Guide High Availability Options Clustering and Hot Standby Connect With Confidence Astaro Deployment Guide Clustering and Hot Standby Table of Contents Introduction... 2 Active/Passive HA (Hot Standby)... 2 Active/Active HA (Cluster)... 2 Astaro s HA Act as One...

More information

SAP BusinessObjects Business Intelligence Suite Document Version: 4.1 Support Package 3-2014-05-07. Patch 3.x Update Guide

SAP BusinessObjects Business Intelligence Suite Document Version: 4.1 Support Package 3-2014-05-07. Patch 3.x Update Guide SAP BusinessObjects Business Intelligence Suite Document Version: 4.1 Support Package 3-2014-05-07 Table of Contents 1 Document History....3 2 Introduction....4 2.1 About this Document....4 2.1.1 Constraints....4

More information

High Availability with Postgres Plus Advanced Server. An EnterpriseDB White Paper

High Availability with Postgres Plus Advanced Server. An EnterpriseDB White Paper High Availability with Postgres Plus Advanced Server An EnterpriseDB White Paper For DBAs, Database Architects & IT Directors December 2013 Table of Contents Introduction 3 Active/Passive Clustering 4

More information

CLOUD DEVELOPMENT BEST PRACTICES & SUPPORT APPLICATIONS

CLOUD DEVELOPMENT BEST PRACTICES & SUPPORT APPLICATIONS whitepaper CLOUD DEVELOPMENT BEST PRACTICES & SUPPORT APPLICATIONS - Cloud Development Best Practices and Support Applications CLOUD DEVELOPMENT BEST PRACTICES 1 Cloud-based solutions are increasingly

More information

Threat Modelling for Web Application Deployment. Ivan Ristic ivanr@webkreator.com (Thinking Stone)

Threat Modelling for Web Application Deployment. Ivan Ristic ivanr@webkreator.com (Thinking Stone) Threat Modelling for Web Application Deployment Ivan Ristic ivanr@webkreator.com (Thinking Stone) Talk Overview 1. Introducing Threat Modelling 2. Real-world Example 3. Questions Who Am I? Developer /

More information

Configuring Advanced Windows Server 2012 Services

Configuring Advanced Windows Server 2012 Services Course Code: M20412 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Configuring Advanced Windows Server 2012 Services Overview Get hands-on instruction and practice configuring advanced Windows

More information

MANAGED DATABASE SOLUTIONS

MANAGED DATABASE SOLUTIONS Page 0 2015 SOLUTION BRIEF MANAGED DATABASE SOLUTIONS NET ACCESS LLC 9 Wing Drive Cedar Knolls, NJ 07927 www.nac.net Page 1 Table of Contents 1. Introduction... 2 2. Net Access Managed Services Solution

More information

DataCentred Cloud Storage

DataCentred Cloud Storage Service Description DataCentred Michigan Park Michigan Avenue Salford Quays M50 2GY United Kingdom Tel: 0161 870 3981 enquiries@datacentred.co.uk www.datacentred.co.uk Contents Service Description... 2

More information

Glassfish Architecture.

Glassfish Architecture. Glassfish Architecture. First part Introduction. Over time, GlassFish has evolved into a server platform that is much more than the reference implementation of the Java EE specifcations. It is now a highly

More information

Our Cloud Offers You a Brighter Future

Our Cloud Offers You a Brighter Future Our Cloud Offers You a Brighter Future Qube Global Software Cloud Services are used by many diverse organisations including financial institutions, international service providers, property companies,

More information

1. Management Application (or Console), including Deferred Processor & Encryption Key 2. Database 3. Website

1. Management Application (or Console), including Deferred Processor & Encryption Key 2. Database 3. Website This document answers the question: What are the disaster recovery steps for Enterprise Random Password Manager (ERPM) and how can the solution be made highly available? Disaster Recovery Preparation As

More information

Syslog Analyzer ABOUT US. Member of the TeleManagement Forum. info@ossera.com +1-916-290-9300 http://www.ossera.com

Syslog Analyzer ABOUT US. Member of the TeleManagement Forum. info@ossera.com +1-916-290-9300 http://www.ossera.com Syslog Analyzer ABOUT US OSSera, Inc. is a global provider of Operational Support System (OSS) solutions for IT organizations, service planning, service operations, and network operations. OSSera's multithreaded

More information

High Availability with Windows Server 2012 Release Candidate

High Availability with Windows Server 2012 Release Candidate High Availability with Windows Server 2012 Release Candidate Windows Server 2012 Release Candidate (RC) delivers innovative new capabilities that enable you to build dynamic storage and availability solutions

More information

WHITE PAPER RUN VDI IN THE CLOUD WITH PANZURA SKYBRIDGE

WHITE PAPER RUN VDI IN THE CLOUD WITH PANZURA SKYBRIDGE WHITE PAPER RUN VDI IN THE CLOUD WITH PANZURA What if you could provision VDI in the cloud as a utility, colocating ondemand VDI instances and data next to each other and close to your users, anywhere

More information

Barracuda Load Balancer Online Demo Guide

Barracuda Load Balancer Online Demo Guide Barracuda Load Balancer Online Demo Guide Rev 1.3 October 04, 2012 Product Introduction The Barracuda Networks Load Balancer provides comprehensive IP load balancing capabilities to any IP-based application,

More information

Simplifying Storage Operations By David Strom (published 3.15 by VMware) Introduction

Simplifying Storage Operations By David Strom (published 3.15 by VMware) Introduction Simplifying Storage Operations By David Strom (published 3.15 by VMware) Introduction There are tectonic changes to storage technology that the IT industry hasn t seen for many years. Storage has been

More information

Disaster Recovery White Paper

Disaster Recovery White Paper Introduction Remote access plays a critical role in successfully executing a business recovery plan both in terms of providing access for existing remote users and accommodating the potential increase

More information

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב ע"ש ספיר

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב עש ספיר מודולות הלימוד של מייקרוסופט הקורס מחולק ל 4 מודולות כמפורט:.1Configuring Microsoft Windows Vista Client 70-620 Installing and upgrading Windows Vista Identify hardware requirements. Perform a clean installation.

More information

Assignment # 1 (Cloud Computing Security)

Assignment # 1 (Cloud Computing Security) Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual

More information

Colocation, Cloud and Managed Services

Colocation, Cloud and Managed Services Colocation, Cloud and Managed About Node4 At Node4 our growing team of passionate individuals are dedicated to delivering the most effective application of technology to optimise business performance.

More information

Bridging the gap between local IT and Cloud services, keeping you in control

Bridging the gap between local IT and Cloud services, keeping you in control Bridging the gap between local IT and Cloud services, keeping you in control The majority of Small and Mid-Sized Businesses (SMB s) are expected to operate in a hybrid IT environment (part on-premise,

More information

Web Application Deployment in the Cloud Using Amazon Web Services From Infancy to Maturity

Web Application Deployment in the Cloud Using Amazon Web Services From Infancy to Maturity P3 InfoTech Solutions Pvt. Ltd http://www.p3infotech.in July 2013 Created by P3 InfoTech Solutions Pvt. Ltd., http://p3infotech.in 1 Web Application Deployment in the Cloud Using Amazon Web Services From

More information

Bridging the gap between local IT and Cloud services, keeping you in control

Bridging the gap between local IT and Cloud services, keeping you in control Bridging the gap between local IT and Cloud services, keeping you in control The majority of Small and Mid-Sized Businesses (SMB s) are expected to operate in a hybrid IT environment (part on-premise,

More information

COMLINK Cloud Technical Specification Guide DEDICATED SERVER

COMLINK Cloud Technical Specification Guide DEDICATED SERVER COMLINK Cloud Technical Specification Guide DEDICATED SERVER Updated June 13, 2014 *Subject to Change* Table of Contents 1 Overview of Cloud Dedicated Server 2 Why Choose Dedicated Servers? 2-4 Features

More information

Security Information/Event Management Security Development Life Cycle Version 5

Security Information/Event Management Security Development Life Cycle Version 5 Security Information/Event Management Security Development Life Cycle Version 5 If your enterprise is like most, you are collecting logs from most every device with security relevance. The flood of events

More information

Parallels Cloud Server 6.0

Parallels Cloud Server 6.0 Parallels Cloud Server 6.0 Getting Started Guide March 17, 2015 Copyright 1999-2015 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen

More information

Bridging the gap between local IT and Cloud services, keeping you in control

Bridging the gap between local IT and Cloud services, keeping you in control Bridging the gap between local IT and Cloud services, keeping you in control The majority of Small and Mid-Sized Businesses (SMB s) are expected to operate in a hybrid IT environment (part on-premise,

More information

Nine Considerations When Choosing a Managed Hosting Provider

Nine Considerations When Choosing a Managed Hosting Provider Nine Considerations When Choosing a Managed Hosting Provider Selecting the right managed hosting provider for your business is a critical part of your success. This white paper provides a roadmap for companies

More information

Informix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11

Informix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11 Informix Dynamic Server May 2007 Availability Solutions with Informix Dynamic Server 11 1 Availability Solutions with IBM Informix Dynamic Server 11.10 Madison Pruet Ajay Gupta The addition of Multi-node

More information

Backup Exec Private Cloud Services. Planning and Deployment Guide

Backup Exec Private Cloud Services. Planning and Deployment Guide Backup Exec Private Cloud Services Planning and Deployment Guide Chapter 1 Introducing Backup Exec Private Cloud Services This chapter includes the following topics: About Backup Exec Private Cloud Services

More information

Microsoft 70-414 Exam

Microsoft 70-414 Exam Volume: 92 Questions Topic 1, Contoso Ltd Overview Contoso, Ltd. is a recruiting and staffing company that has offices throughout North America. The company has a main office and six branch offices. The

More information

Hosted SharePoint. OneDrive for Business. OneDrive for Business with Hosted SharePoint. Secure UK Cloud Document Management from Your Office Anywhere

Hosted SharePoint. OneDrive for Business. OneDrive for Business with Hosted SharePoint. Secure UK Cloud Document Management from Your Office Anywhere OneDrive for Business with Hosted SharePoint Secure UK Cloud Document Management from Your Office Anywhere Cloud Storage is commonplace but for businesses that want secure UK Cloud based document and records

More information

Leveraging Radware s ADC-VX to Reduce Data Center TCO An ROI Paper on Radware s Industry-First ADC Hypervisor

Leveraging Radware s ADC-VX to Reduce Data Center TCO An ROI Paper on Radware s Industry-First ADC Hypervisor Leveraging Radware s ADC-VX to Reduce Data Center TCO An ROI Paper on Radware s Industry-First ADC Hypervisor Table of Contents Executive Summary... 3 Virtual Data Center Trends... 3 Reducing Data Center

More information

dxw s WordPress Platform

dxw s WordPress Platform dxw s WordPress Platform G-Cloud lot 2 (PaaS) service definition Version 2 4th July 2012 Page 1 of 12 Overview dxw s WordPress Platform is a highly managed Platform as a Service for hosting WordPress websites.

More information

Networking and High Availability

Networking and High Availability TECHNICAL BRIEF Networking and High Availability Deployment Note Imperva appliances support a broad array of deployment options, enabling seamless integration into any data center environment. can be configured

More information

All Clouds Are Not Created Equal THE NEED FOR HIGH AVAILABILITY AND UPTIME

All Clouds Are Not Created Equal THE NEED FOR HIGH AVAILABILITY AND UPTIME THE NEED FOR HIGH AVAILABILITY AND UPTIME 1 THE NEED FOR HIGH AVAILABILITY AND UPTIME All Clouds Are Not Created Equal INTRODUCTION Companies increasingly are looking to the cloud to help deliver IT services.

More information

Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services Course OutlineModule 1: Introducing Active Directory Domain Services This module provides an overview

More information

Cloud Computing Disaster Recovery (DR)

Cloud Computing Disaster Recovery (DR) Cloud Computing Disaster Recovery (DR) Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Need for Disaster Recovery (DR) What happens when you

More information

Cloud Service Model. Selecting a cloud service model. Different cloud service models within the enterprise

Cloud Service Model. Selecting a cloud service model. Different cloud service models within the enterprise Cloud Service Model Selecting a cloud service model Different cloud service models within the enterprise Single cloud provider AWS for IaaS Azure for PaaS Force fit all solutions into the cloud service

More information

High Availability for Citrix XenApp

High Availability for Citrix XenApp WHITE PAPER Citrix XenApp High Availability for Citrix XenApp Enhancing XenApp Availability with NetScaler Reference Architecture www.citrix.com Contents Contents... 2 Introduction... 3 Desktop Availability...

More information

RSA Authentication Manager 7.1 to 8.1 Migration Guide: Upgrading RSA SecurID Appliance 3.0 On Existing Hardware

RSA Authentication Manager 7.1 to 8.1 Migration Guide: Upgrading RSA SecurID Appliance 3.0 On Existing Hardware RSA Authentication Manager 7.1 to 8.1 Migration Guide: Upgrading RSA SecurID Appliance 3.0 On Existing Hardware Contact Information Go to the RSA corporate website for regional Customer Support telephone

More information

ScaleArc for SQL Server

ScaleArc for SQL Server Solution Brief ScaleArc for SQL Server Overview Organizations around the world depend on SQL Server for their revenuegenerating, customer-facing applications, running their most business-critical operations

More information