High availability in the Cloud: Legacy cloud application design
This is a continuation of the previous blog post High availability in the Cloud: Pan-Net Cloud concepts. Still, we are trying to focus here on VM-based (legacy) deployed applications.
In the topic’s context, we talk about the physical architecture of the application, leaving out the logical architecture as it does not directly map to infrastructure objects. So, when designing the physical architecture of the application, architects incorporate concepts of fault tolerance and resiliency right at the beginning.
Squeezing the most out of argparse
In this post, I would like to argue that Python’s argparse is often the right tool for the job, and you do not need to install additional CLI argument parsers. The straightforward reason to choose it might be that you want to write a simple script that you pass to your colleagues, and you do not want to bother them with the installation of dependencies. You want to make it as portable as possible.
High availability in the Cloud: Pan-Net Cloud concepts
High availability is one of the most essential and desirable metrics for all cloud services. Pan-net’s activities are focused on the development, delivery, and operations of cloud and cloud applications for external and internal customers. This means that high availability and fault tolerance topics are relevant for absolutely all areas of our activity - from internal development to large-scale vendor software solutions deployed on Pan-Net infrastructure.
The consistency of application technical design with the high availability concepts of the infrastructure - is a factor directly affecting the availability indicators of the final system.
New Boron cloud release from Pan-Net up and running in Salzburg and Vienna!
We are happy to announce that we have successfully upgraded our cloud in Bijelo Polje, Podgorica, Budapest and Salzburg to Boron and deployed a new Boron datacenter in Vienna, so we have production applications already successfully running on the new infrastructure version!
Boron is a new Common Infrastructure Team (CIT) cloud release from Pan-Net, designed for both IT and NT workloads – dedicated compute with carrier grade acceleration for NT and cost-effective scalable shared compute for IT.
Public Cloud for Telco Applications - A Sales Guide
How to sell public cloud for Telco Applications? Over the past year the focus of Hyperscalers (AWS, Google, Microsoft) on cloud solutions for core Telco applications has intensified. This has many reasons: Telco application suppliers are in the process to re-design their software to a more cloud-native architecture - driven for example by new 5G stand-alone (SA) core software releases. Furthermore, edge cloud is getting more relevant and the disaggregation of applications and platform will also happen at the edge with initiatives like O-RAN.
Hygiene in identity and access management
As all complex systems need to maintain a certain level of sustainability, transparency and cleanliness, we at IAM care about these buzzwords quite a lot. Furthermore, we try to bring them to practice as well. Why is this theme so important to us? What do you mean by system hygiene? I’ll try to explain in this article. I’ve written about IAM, IDM and IGA in the last article in case you’d need to refresh memory on what field of security I’m talking about.
Step into cloud security
Some of you may say that cloud is nothing new and it is just someone else’s computer, and it is there for decades. While there is grain of truth in this point of view, but not nowadays, when cloud comes in its overall orchestrated, highly available and elastic form. Cloud is almost unavoidable in this day projects, that’s why it comes with the extra price in terms of security.
In this article we will try to explain with simple analogies and easy to grasp parallels, how approach to information security in the cloud is slightly different from the standard way of securing services deployed on-premises.
Cloudified solutions can preserve necessary level of security in comparison with themselves but deployed inside on-premise data centers or even deliver higher level of it. To achieve this, we should adapt our way of thinking, use different approaches, and apply best practices to the type of cloud we are on-boarding our application.
We DO need Sales!
But why? Your customers are also in DT group?! Pan-Net is providing cloud services for the DT group, so we mainly deal with internal customers within the Group, and we are frequently asked “Why would you need sales department, when your main customers are internal?”. The question comes from the “legacy” understanding of sales person being somebody like a used car seller, a guy with a wide smile trying to sell you a lemon, haggling with you and forcing to buy something what you may not need for a higher price to get better profit margin.
Directions Of The Cybersecurity Industry
Photo by Jon Moore
Covid crisis and the forced work-from-home comes with the rapid transformation of a traditional established company to an online only business with most of the work force working remote. Even the software houses struggle to keep up with this rapid transformation. Lots of companies are finding out that they don’t have control over the digital assets they are owning or managing. Security teams, when there is any, struggle how to inventarise all the assets that are exposed to the internet and have to be protected from the outside threats.
Ceph-to-Ceph migration for Openstack leveraging RBD mirroring
Introduction In IT, we use the term migration when we move stuff from A to B, where stuff = data + metadata.
Translating this to Cloud Infrastructure, data is the virtual machine’s image/volume (blocks of data), metadata is the virtual machine’s attributes: cpu, memory, interfaces, ip addresses, ownership, etc. (Let me ignore now the Object Storage scenario where we have a similar approach to distinguish data/metadata - but the migration strategy/solution is different.