Cloud Services Part 2

 General description

Cloud-based approach to the storage and management of structured data. Good point of using og DBaaS are
  • The same functionalities as in RDBMSes (like SQL Server, MySQL, OracleSQL)
  • Flexible and scalable
  • On-demand
  • Easy management and provisioning
  • No need to install, configure or maintain hardware or software
But we have too still remember about:
  • Lack of control over network performance issues
Understanding DBaaS roles
To understand DBaaS we have to find answer for following questions:
  • „Could we have a temporary copy of the database to use for a few days?”
Over time, companies created 100s or 1000s of hardly used copies of databases that sit idle on servers and cost millions. With the growth of data, database infrastructure management has become complicated and introduced many risks.

  • “We can finish faster doing it ourselves with a PC under someone’s desk.”
When the demand for infrastructure outpaced the ability for IT to deliver, people found answers by putting a server underneath someone’s desk to “serve themselves” or by going to an external service provider. With this trend, compliance, risk, and security have had a hard time keeping up.

  • “Didn’t we just buy a bunch of new database licenses?”
Virtualization has cut billions of dollars of costs from IT and has billions to go as more workloads get virtualized. Ironically, companies are seeing up to 40-50% cost reduction in infrastructure budgets, while database budgets continue to increase.

  • “I have to test this with production data.”
Every workgroup and department is using applications to improve business operations and companies want to better understand customer usage of the internet and apps. As we use data more to power our businesses through analytics, “real production data” becomes more and more important.

  • “It would be crazy to put two databases on the same server.”
While people are using applications and data more than ever, the traditional database/infrastructure model has been expensive to scale at an enterprise level of SLAs. For example, growth in data often leads to new and expensive orders for both hardware and software, and there is too much expense and complexity to make Tier 2 databases highly available.

 General description

NaaS describes services for network transport connectivity. NaaS involves the optimization of resource allocations by considering network and computing resources as a unified whole. NaaS goal is more efficient use of the network infrastructure.
NaaS functionality
  • Network visibility
    • Optimising the mapping between the logical and physical topologies
  • Custom forwarding
    • Controlls packet forwarding at switches
    • Custom routing protocols
  • In-network processing
    • Providing in-network packet processing capabilities as part of the cloud computing platform
    • In-network data aggregation helps to reduce the overall traffic sent over the network

 Some NaaS services

Most of us already knows some NaaS services as
  • Virtual Private Network (VPN)
    • Extends a private network across networks like the public Internet. It enables a host computer to send and receive data across shared or public networks as if it were a private network with the functionality and policies of the private network.
  • Bandwidth on demand (BoD)
    • Technique by which network capacity is assigned based on requirements between different nodes or users.
  • Mobile network virtualization
    • Telecommunications manufacturer or independent network operator builds and operates a network (wireless, or transport connectivity) and sells its communication access capabilities to third parties (commonly mobile phone operators – mobile virtual network operator) charging by capacity utilization.

 NaaS requirements

We have to remember that NaaS has several requirements
  • Integration with current DC hardware
    • For Naas to be successful Data Centre must not require expensive, non-commodity, networking hadware
  • High-level programming model
    • Naas should expose a programming model that is natural for software developers to use, hiding low-level details of network packet processing and not exposing the full complexity of the network topology in the DC
  • Scalability and multi-tenat isolation
    • NaaS model requires strong isolation of the different network resources offered to tenants.

General description

SECaaS is the other kind of service that we may provide of:
  • detection,
  • remediation and
  • governance
of security infrastructure to a trusted third party with the proper tools and expertise. From user point of view we have benefits dedicated expertise and cutting edge technology.
_
_
_

Variant of Software as a Service
Anti-virus software delivered over the Internet
Or non-cloud:
Security management service provided in-house by an external organization.
SECaaS benefits
  • Constant virus definition updates
  • Greater security expertise
  • Faster user provisioning
  • Outsourcing of administrative task
  • A web-interface allowing in-house administration and monitoring
_

 All in one monitoring SaaS

Fig. 3.6/1
Fig. 3.6/1
All in one monitoring SaaS for all your applications, servers…
  • NewRelic  see - one product, one view across your entire stack. (Real User, Application, Server Monitoring)
  • DatadogHQ  see - servers, clouds, metrics, apps, team.
  • Circonus  see - organization wide monitoring.
  • Velvet Metrics  see - tracking and monitoring. Simple. Realtime. Cloud based.
  • CopperEgg  see - server monitoring. Website performance. Application metrics.
  • App First  see - Get full-stack visibility into your systems, apps, & business metrics!
  • Librato  see - Measure everything. Instantly.
  • Chartio  see - makes the complex process of data visualization easy.
  • HostedGraphite  see - powerful open-source application metrics system
  • ServerDensity  see - easy server monitoring
But in this service we may also think about monitoring on applications. The one you may need for tracking errors and performance problems in your applications.
  • Boundary  see - cloud application performance monitoring.
  • StatHat  see - track data in your apps instantly with StatHat.
  • Air Brake  see - collects errors generated by other applications, and aggregates the results for review.
  • Union Station App  see - gorgeous web app monitoring and analysis for everyone. Ruby web app monitoring.
  • Wormly  see - downtime Hurts. Wormly Doesn’t.
  • Sematext  see - scalable performance monitoring
Fig. 3.6/2: Wormly
Fig. 3.6/2: Wormly

 Log monitoring examples

If you believe that Truth is in log messages, you may find helpfull one of the following.
  • Splunk>Storm  see get intelligence on your cloud applications in real time.
  • Loggly  see simplify log management. There is a partnership with NewRelic.
  • PaperTrail  see - hosted log management for servers, apps, and cloud services.
  • Get Sentry  see notifies you when your users experience errors in your web and mobile apps.
  • ScoutApp  see - server monitoring built for developers.
  • Gecko Board  see - it’s your key data, in one place.
  • Proby App  see - cron tasks monitoring.
  • Logentries  see - logs collected in real time, analyzed, stored, and presented in a meaningful way. Anywhere. Anytime.
  • Belogik - all sources log indexing.
Fig. 3.6/3
Fig. 3.6/3

 Alerting & notifications

It’s good to be notified when problems occur. These ones are just made for that.
  • AlertGrid  see - instant notifications for events received from your systems.
  • PagerDuty  see provides SaaS IT on-call schedule management, alerting and incident tracking.
  • Ops Genie  see - notifications made easy.

 Website monitoring

Even if Google Analytics is a great tool, you may ask for real time website monitoring. Here’s your chance to get one.
  • Gauges  see - analyze all your traffic in seconds. A Google Analytics interpretation by Github.
  • ChartBeat  see - website analysis.
  • Cedexis Radar  see - the only way to measure the performance of every cloud provider on the planet.

 General description

IDaaS is management of identities in the cloud, apart from the applications and providers that use them
IDaaS includes services for : 
  • software,
  • platform and
  • infrastructure
in both the private and public cloud.
Fig. 3.6/4
Fig. 3.6/4

Apart of Cloud IDaaS can refer to

  • Managed Identity Services (MIS):
    in MIS Managed Service Provider (MSP) provides on- or off-site services to customers. It may include provisioning, directory management, or the operation of a single sign-on service (SSO).
  • implementation of Identity and Access Management (IAM) functionality predominantly as web services, within a SOA in an enterprise.
Identity-as-Service (IDaaS) solutions are cloud-based services that broker identity and access management functions to target systems on customers' premises and/or in the cloud.
IDaaS functionality includes
  • Identity governance and administration ("IGA") — this includes the ability to provision identities held by the service to target applications.
  • Access — this includes user authentication, single sign-on, and authorization enforcement.
  • Intelligence — this includes logging events and providing reporting that can answer questions such as who accessed what and when?

 General description

A whole desktop environment available from the Internet, from various devices.
Fig. 3.6/5
Fig. 3.6/5
Desktop as a Service (DaaS) is a cloud service in which the back-end of a virtual desktop infrastructure (VDI) is hosted by a cloud service provider.
The service provider manages the back-end responsibilities of:
  • data storage,
  • backup,
  • security and
  • upgrades
Data is copied to and from  virtual desktop during logon/logoff
access to the desktop is device, location and network independent
Provider handles all the back-end infrastructure
  • costs and
  • maintenance.
Customers usually manage their own
  • desktop images,
  • applications and
  • security,
Those desktop management services may be also a part of the subscription.