ESDS Cloud infrastructure comes with the 7 Layers of Security
We provide Layer 4 & 7 Firewalls that filter traffic based on IP addresses and ports while enhancing security through application-level inspection.
Our Layer 4 & 7 Load Balancers ensure efficient distribution of network traffic, optimizing application performance at both network and application layers.
Utilizing HIDS/NIDS, we monitor individual system activities and network traffic, detecting and preventing security threats in real-time.
Rights Management is implemented to control user access, ensuring proper authorization and preventing unauthorized actions on our systems.
For data protection, we implement Data Privacy measures to safeguard sensitive information and employ Data Encryption to secure data during transmission and storage.
Our commitment to industry standards and regulations is demonstrated through Certifications & Compliance, showcasing our adherence to best practices and security requirements.
Authentication & Authorization processes verify user identities and grant access based on authenticated roles, ensuring secure system interactions.
To maintain transparency and accountability, our systems undergo Auditing & Accounting, providing a comprehensive audit trail for analysis and compliance verification.
The ESDS eNlight cloud is based on three essential security architecture components.
Confidentially - Prevent unauthorized access to data to protect and safeguard it.
Integrity - Prevent unauthorized alterations to ensure data integrity and correctness.
Availability - Make sure authorized users can access the data by using redundancy and resilience.
Although security is required, advanced security is voluntary. In order to earn your complete trust, we have implemented advanced and managed security through a multi-layered security environment that is entirely managed and maintained in our datacenter.
eNlight 360°, the Data Center Infrastructure Management (DCIM) tool by ESDS, provides a single sign-on module as IAM, which takes care of Identity and Access Management, User management and encryption keys, and session sharing with add-on token-based security.
Web Application Firewall and DDoS Prevention
Automated Patch Management and Cyber threat Prevention
VTMScan - A complete web-application scanning tool
CAPACITIES AND FEATURES
Application Delivery
Authentication
Management and Reporting
All types of online threats and cyberattacks, including the OWASP Top-10 Vulnerabilities, SQL Injections, and Cross-Site Scripting, are scanned for and detected by VTMScan. Through a thorough evaluation of the website security, VTMScan users receive total protection for their web assets. When a threat is imminent, VTMScan provides a comprehensive scanning solution with immediate alerts.
CSP must provide native service for security like Identity & access management, manage user access and encryption keys, Single sign on service for cloud and a Centralize Governance and Compliance Management
We provide detailed logs of all user activity within a CSP account, including API caller identity, timestamps, source IP addresses, request parameters, and response elements, to support security analysis, resource change tracking, and compliance auditing.
Our fully managed service in India helps identify potentially fraudulent online activities, such as online payment fraud and the creation of fake accounts, ensuring robust protection for your business.
HSMHSM as a service are being provided as managed shared infrastructure-based or dedicated infrastructure-based model, ensuring that dedicated HSM is exclusively for each subscription where Data encryption is default, with flexible options for managing encryption keys and data access. VM’s are also provided that ensure encryption of data in transit, at rest (using CMEK and CSEK), and while in use.
Customers can use eNlight Cloud to develop templates of their necessary configuration. The Add Template option allows users to add templates. User-specific templates are only visible to that user or administrator. Users can upload a template that meets their needs and use it to generate VMs.
A project is given to each user. Both of the projects include a variety of eNlight 360° devices. Users can assign their projects to different groups and execute CRUD actions. This includes mass deleting/enabling/disabling project activities, adding or removing members from projects with various roles, etc.
eNlight 360° keeps track of a device's entire resource usage, including RAM, CPU, and other components. The user can add a custom threshold for each of the many Health check metrics, such as RAM and CPU. As a result, the user is informed of future actions if the parameter's usage in the system exceeds the predetermined threshold.
eNlight cloud Inventory provides visibility into your eNlight 360° computing environment. eNlight 360° offers an easy way for customers to track their resources and the associated configurations.
Customers can monitor various resources through eNlight Cloud; the monitoring module shows server, network, and administration dashboards. Each box is shown as a separate device with its Name and IP in a server dashboard, which is a graphical representation of the Server, VM, and Storage Heat Map. The alert's severity is shown by the heat map box's colour based on the monitoring parameter for that particular device. The Router, Switch, and Firewall Heat Map is depicted graphically on a network dashboard, and each box is represented as a distinct device with its Name and IP. The alert's severity is shown by the heat map box's colour based on the monitoring parameter for that particular device. The hardware, deployment type, and device count are all graphically represented on the management dashboard.
Customers can build a virtual machine with the configuration they need using eNlight Cloud. The VM Add option allows users to add a VM. Instead of using a template created by CSP, this capability enables customers to create VMs as needed. Customers of eNlight can use this to pinpoint resources and cut costs. Customers can create virtual machines using as few or as many resources as they need with eNlight, depending on the type of hypervisor they use, such as VMware, XEN, Hyper-V, or Nutanix.
In eNlight 360°, the user can select the modules he wants to enable/disable the notifications. In addition, it will notify the user which modules are under maintenance mode. This functionality eNlight 360° provides an easy way to monitor various resources; a server dashboard is the graphical representation of the Server, VM, and Storage Heat Map. Each box is represented as a single device with its Name and IP. The heat map box's color represents the alert's severity according to its monitoring parameter for that specific device. A network dashboard is the graphical representation of the Router, Switch, and Firewall Heat Map, and each box is represented as a single device with its Name and IP. The heat map box's color represents the alert's severity according to its monitoring parameter for that specific device. Finally, the management dashboard is the graphical representation of Device count, Deployment Type, and Hardware.
eNlight monitoring provides details of cloud resources and the applications running on the cloud, It collects and track metrics, collects and monitor log files, and set alarms. and also provides SQL based reporting
eNlight is capable of providing the guidelines for provisioning, configuring, and continuously monitoring the complete cloud infrastructure
A centralized and independent infrastructure (Client wise) patch management system is part of the eNlight cloud management platform and has features like patch test, live patch, schedule and concurrent patching.
In eNlight 360°, a cloud advisor acts like your customized cloud expert and recommends improving system performance and saving money.
eNlight monitoring allows to enable auditing, security monitoring, and operational troubleshooting by tracking user activity and API usage.
eNlight cloud allows to enforce client organization level security compliacnes and governance. In case of non conformance the system trigger events and alerts as defined by the prganization
eNlight cloud provides template,JSON-format,text-based file describing the resources required by the client application
To automatically build, test, distribute, deploy, and monitor applications on any operating system, you can utilize a combination of various Devops tools and practices. Largely, this involves:
Code Repository:Cloud-based Integrated Development Environment (IDE) services that enable developers to collaborate in real-time. These cloud IDE services provide a web-based development environment accessible from anywhere, facilitating collaboration and streamlining the software development process. It comes with features like:
Web-Based IDE:Sr No. | Features and Operations Supported by ESDS DevOps Service | Solution Integrated | Details |
---|---|---|---|
1. | Automatically build, test, distribute, deploy and monitor iOS, Android, Windows and macOS apps—all in one place | Jenkins | Jenkins is a CI/CD tool which is best practices for automatically build, test, distribute & deploy purpose |
2 | Developers can regularly merge their code changes into a central repository, after which automated builds and tests are run. | Gitlab | Gitlab tool can be used for Central Repository purpose to manage and integrate the code regularly. With Gitlab developers can share their code. |
3 | Must provide fully managed service to implement end to end CI CD (Continuous Integration & Continuous Deployment) pipeline | Jenkins | Jenkins is a CICD tool which can be used for building & deploying the application code. |
4 | Should securely store and version application's source code and automatically build, test, and deploy the application | Gitlab & Jenkins | Gitlab stores the version of source code uploaded by developer to meet the versioning. On other hand, Jenkins automatically builds test & deploy the application |
5 | Cloud Service Provider should offer a managed service to analyze and debug applications | SonarQube | SonarQube helps developers and teams analyze and improve the quality of their codebase by detecting code smells, bugs, security vulnerabilities, and other issues. |
6 | The manage service to analyse and debug applications should have Filtering capability and interactive capability to interpret trace data | ELK Stack | Elastic Stack helps to collect, analyze, and visualize log data from applications. It enables us to filter and search logs based on various criteria, including timestamps, log levels, keywords, and custom fields & trace the data. |
7 | Cloud Service Provider should offer a Cloud based IDE (Integrated Development Platform) service to collaborate with the developers in real time | VS Code | Visual Studio Code (VS Code) allows to share workspaces with others, facilitating collaboration and concurrent editing of code. Workspace sharing in VS Code enables multiple developers to work on the same project simultaneously, making it easier to collaborate and coordinate efforts. |
8 | Cloud Service Provider should offer a managed source control service to store code in Private Git Repositories | Gitlab, Bitbucket | Gitlab offers a managed service to store the code in Private Git Repositories. |
The architecture of Docker consists of several key components working together:
The working of Kubernetes can be understood through the following key steps:
i. eNlight Cloud enables customers to create a virtual machine of their required configuration. Users can add a VM using the VM Add option. This feature allows customers to create a VM as required instead of a template defined by CSP. This helps eNlight customers to define precise resources and save cost. eNlight enables customers to create VM of minimum possible or maximum possible resources based on the type of hypervisors like VMware, XEN, Hyper – V and Nutanix. Before proceeding with VM creation, it should be ensured that the required quota of resources is available for the respective group. The Compute layer in eNlight cloud consists of latest Intel® Xeon® Scalable Processors with built-in accelerators and advanced security technologies for the most in-demand workload requirements.
ii. Horizontal scaling is the conventional scaling methodology that is based on load balancing. eNlight 360° also provides horizontal Scaling based on software-defined load balancing, with which virtual machines automatically scale out or scale in depending upon workloads.
iii. Vertical Auto- scaling is a patented (US 9176788) and unique eNlight Cloud orchestration software feature. eNlight automatically scales virtual machine resources on the fly. The resources of a virtual machine are scaled between the minimum and maximum resources assigned to it in proportion to the load over it. This is done by an intelligent algorithm that monitors its resources and scales them up or down accordingly. This helps in cutting down the cloud expenses while providing consistent performance to users. This makes eNlight a cost-effective and one of its kind Cloud Orchestration software.
iv. Storage services are Virtual representations of Physical Storage for flexibility of customized allocation/deallocation of storage capacity to VMs. eNlight provides the tools and technologies to abstract the underlying Storage infrastructure in an easy and standardized consumption model. eNlight 360° is a scalable, high-speed, web–based cloud storage service that allows your on-premises applications to use eNlight 360° cloud storage seamlessly.
v. eNlight 360° monitoring allows you to track cloud resources' health, performance, uptime, and downtime. eNlight 360° server dashboard helps to identify, collect and display the resource utilization such as VM, Disk, server, etc.
vi. Our physical core-to-vCPU ratio is 1:2 for all Virtual Machines. This is the standard practice we follow for all hypervisors.
vii. eNlight 30° provides a free trial of 30 days to the users so that they can access the application for the respective time period. However, once the trial period is over, access for all the modules will be disabled; the user needs to enter the license key in order to access desired modules.
viii. Customers can create new VMs using eNlight 360° through its UI interface or the CLI, enabling them to create a virtual machine of their required configuration.
ix. Over the years, Cloud computing has become more of an ingenious business model that provides organizations with agility and efficiency as a significant part of this digital transformation era. Digitization has undoubtedly transformed the Indian economy, and many industries have jumped onto this trend to grow their business; embracing the cloud is only a smart move. The cloud offers flexibility and a pay-as-you-go service model, which received wide traction during the peak COVID period when the demand was highest, and the cloud was able to help businesses in distress. Amongst other services, security services offered by the cloud are another factor for businesses to consider since cyber security is one of the grave concerns faced worldwide.
x. Operating systems with Virtual Machines are offered supporting both BYOL (Bring Your Own License) and PAYG (Pay As You Go) models, including continuous updates and upgrades for the entire contract duration.
xi. Cloud services feature simple pay-as-you-go pricing, allowing customers to pay for compute capacity by the hour without any long-term commitments.
xii. Virtual Machines with flexible storage size are provided to meet your extensive storage and computing needs.
xiii. Virtual Machines should not have console access.
xiv. Providing consolidated view of the availability, integrity and consistency of the Web/App/DB tiers.
Disk IOPS can be applied to new or existing virtual machines with eNlight 360°. Disk IOPS manages storage performance efficiency. In addition, it improves service quality and handles disk I/O, preventing VMs from using too many disk operations and creating I/O bottlenecks. eNlight 360° currently offers Disk IOPS in three levels: Gold, Platinum, and Silver
Data Security at storage layer:SSD-backed block storage are offered with low latencies, high durability, and support for annual failure rates of less than 0.01%.
Storage allows flexible volume size increases in small increments, supports high random read operations, and provides secure data controls within the Storage Area Network to restrict client access to allocated storage.
managed secure cloud file storage service. In eNlight 360°, while adding a master compute, the user needs to enter the URL, username, and password. Then, the system will verify those credentials and proceed further.
Data Security at storage layerESDS Storage provides the protects against unauthorized access to lost, stolen, or failed drives by ensuring all sensitive user data on the system is encrypted as it is written to disk. It does this through hardware-based encryption modules located in the SAS controllers and SAS IO modules which encrypt data as it is written to the backend drives, and decrypt data as it is retrieved from these drives.
Additionally, controller-based method has minimal performance impact for typical mixed workloads, and no impact to other storage service services due to the level at which the encryption is performed.
For key generation and management, ESDS Storage by default uses an internal, fully-automated key manager. This key manager has several responsibilities including generating keys using AES-256 ,storing keys in a secure key-store, monitoring drive status changes that result in key creating/deletion, and encryption of all data encryption keys prior to moving them within the array for all encryption operations.
ESDS Stored data security is achieved through the combined use of several encryption keys, which together ensure that neither the drives themselves, nor the keys which encrypt these drives, can be read by unauthorized parties finding themselves in possession of drives that have been removed from the storage system.
Data encryption in-transit For in transit data encryption, IPSEC VPN can be utilized between Ports to client and cloud services.
Enterprise cloud storage allows to scalibility to Petabyte which can be accessed by thousands of concurrent NFS users
Depending on the selection of the storage categories and IOPs latency varies from 2 milli seconds to 15 milliseconds
All ESDS data centers are connected with multi Gbps fiber connectivity which allows seamless replication and data redundancy for the client at enterprise cloud storage layer
eNlight enterprise cloud storage provides read after write consistency where each read-and-write operation is guaranteed to return the most recent version of the data)
ESDS Cloud Service unlocks the potential of business with a Virtual LAN Infrastructure and Static IP Addresses. A virtual LAN (VLAN) infrastructure allows to partition client's network into separate virtual networks, enhancing security and optimizing performance. Coupled with static IP addresses, which provide consistent and reliable access. This ensures seamless communication and efficient network management. With non-internet routable addresses, internal network remains secure from external threats.
Provides flexibility to Deploy Virtual Machines (VMs) in multiple security zones tailored to project's requirements, all through network isolation layers. With this capability, we can create distinct security zones within infrastructure, ensuring that sensitive data and applications remain isolated and protected. Whether the need to segregate Development, Testing, and Production Environments or establish separate zones for different projects, the ability to deploy VMs in multiple security zones allows for efficient resource allocation, enhanced security, and streamlined management.
Provides private connectivity between Client's network and CSP's (Cloud Service Provider) Data Centre facilities through Direct Connection or Express Route. This dedicated and secure connection enables seamless communication and data transfer between organization's network and the CSP's infrastructure. Bypassing the public internet allows enhanced network performance, improved latency, and increased reliability. Private connectivity ensures optimal access to cloud services, facilitates data migration, and enables robust disaster recovery solutions.
ESDS offers a versatile infrastructure that enables the provision of external IPv6 Address termination for applications hosted on the cloud. With the growing adoption of IPv6, it is crucial for businesses to support this next-generation Internet protocol. By providing external IPv6 address termination, applications hosted on the cloud can seamlessly communicate with IPv6-enabled networks and devices.
ESDS ensures seamless connectivity to the Wide Area Network (WAN) by leveraging high-bandwidth links of suitable capacity at both the data center and disaster recovery data center facilities. The infrastructure accommodates the varying requirements of users while maintaining segregation of access paths among different user categories. This segregation ensures secure and optimized network performance, allowing efficient data transfer and smooth communication across the organization. With a scalable and segregated access path framework, reliable connectivity can be provisioned to meet the specific needs of each user category, enhancing productivity and user experience.
ESDS possess the capability to deliver sufficient Bandwidth between the Primary Data Centre and Disaster Recovery Data Centre to facilitate seamless data replication. This ensures that critical data and applications are continuously synchronized between the two centers, enabling robust disaster recovery capabilities. Dedicated Point to Point link and adequate bandwidth is available to support efficient and timely replication, minimizing data loss and downtime in the event of a disaster. Leveraging the CSP's bandwidth capabilities ensures the integrity and availability of data across both centers, enhancing business continuity and resiliency.
In ESDS Data Centers, Network-level redundancy is enabled by leveraging MPLS links from multiple service providers. This approach ensures that network connectivity remains uninterrupted even in the event of a service provider outage or network failure. By establishing multiple MPLS links, alternate routing paths is facilitated through the ISP backbone, providing redundant and diverse connectivity options. Redundant network devices further enhance network resiliency, minimizing the risk of single points of failure. This comprehensive redundancy strategy ensures high availability, seamless connectivity, and minimized downtime, enabling organization to maintain critical operations and uninterrupted access to network resources.
Cloud service supports multiple network interfaces, allowing the configuration of primary and additional interfaces. This feature enables network segmentation, load balancing, redundancy, and seamless integration with external networks or VPNs. Benefit from enhanced flexibility and connectivity options, optimizing cloud-based applications and services.
Service supports multiple IP addresses per instance, enabling hosting of multiple websites on a single server and facilitating network appliances with multiple private IP addresses for each network interface. This flexibility optimizes resource utilization and enhances network configurations, empowering efficient management of diverse use cases.
Cloud service allows the movement of network interfaces and IPs between instances. This includes the ability to reserve a static IP, attach it to an instance, detach it from one instance, and then attach it to another instance as needed. This flexibility enables seamless migration, reconfiguration, and resource optimization within cloud environment, empowering to adapt and scale infrastructure efficiently.
Cloud service offers enhanced networking support, including capabilities such as Single Root I/O Virtualization (SR-IOV). This features offload virtual network processing to hardware, resulting in higher performance in terms of packets per second, lower latency, and reduced jitter. By leveraging these advanced networking capabilities, we can achieve optimal network performance, improved responsiveness, and a seamless user experience within cloud infrastructure.
Supports network traffic logging, specifically capturing information about IP traffic flowing to and from network interfaces. This feature, often referred to as flow logging, allows to monitor and analyze network traffic patterns, helping to identify potential security threats, troubleshoot network issues, and gain insights into network performance. By enabling network traffic logging, the cloud service empowers with enhanced visibility and control over network, facilitating effective monitoring and management of cloud-based infrastructure.
Has the capability to automatically assign public IP addresses to instances. This feature eliminates the need for manual configuration, streamlining the provisioning process and enabling instances to have direct public internet access.This automation enhances convenience and enables rapid deployment of instances with immediate connectivity capabilities.
Cloud service supports multiple IP protocols, including TCP, UDP, and ICMP. This ensures compatibility and flexibility in handling different types of network traffic and communication within cloud environment. With support for these protocols, we can effectively deploy and manage a wide range of applications, services, and network configurations, accommodating various networking needs and requirements. Benefit from seamless interoperability and efficient handling of TCP, UDP, and ICMP protocols within cloud infrastructure.
Services offers support for IP address ranges specified in RFC 1918, which includes private IP address ranges, along with publicly routable CIDR blocks. This flexibility allows to utilize any network CIDR, whether it falls within the private IP range for internal use or the public IP range for external connectivity. By accommodating both RFC 1918 and publicly routable CIDR blocks, the cloud service enables to design and configure network infrastructure according to specific needs, ensuring seamless integration with both internal and external networks.
Supports static public IP addresses associated with a customer account rather than a specific instance. This means that the assigned IP address remains associated with the account until explicitly released, providing consistency and reliability. With static public IP addresses, we can ensure stable connectivity and maintain the continuity of services, even when instances are created or terminated. This feature enables predictable addressing and simplifies network management, allowing to maintain long-term associations with specific IP addresses within cloud environment.
ESDS cloud service has the capability to automatically create a default virtual private network (VPN) along with a corresponding subnet. Instances launched into this default subnet receives both a public IP address for external communication and a private IP address for internal communication. This default private network setup simplifies the provisioning process, providing instances with the necessary network connectivity out-of-the-box.
ESDS Cloud Service provides Customers to create multiple subnets within a private network using a single CIDR block. This allows efficient IP address allocation and network segmentation, enabling secure communication and resource management within the private network environment.
ESDS cloud service supports ingress filtering, also known as security groups, which allows users to add or remove rules for inbound traffic (ingress) to instances. This feature enables fine-grained control over network access, allowing users to define specific rules to permit or deny incoming traffic to their instances based on various criteria such as source IP, port, or protocol. By leveraging ingress filtering, users can enhance the security of their instances and networks, ensuring that only authorized traffic is allowed to reach their resources.
ESDS cloud service supports egress filtering, enabling users to add or remove rules for outbound traffic (egress) from instances. This feature acts as a stateful firewall, allowing users to control and monitor outbound communication, enhancing network security and ensuring compliance with organizational policies.
ESDS cloud service allows users to disable source/destination checks on network interfaces. This flexibility enables advanced networking configurations and is particularly useful for scenarios involving NAT gateways or load balancers, where source/destination verification is not required. By disabling these checks, users can optimize their network architecture and improve the efficiency of network traffic flow within the cloud environment.
ESDS cloud service supports configuring a NAT instance at the network level. This enables routing of traffic from internal-only instances to the Internet, providing outbound Internet connectivity while maintaining the privacy and isolation of internal resources within the cloud environment.
ESDS cloud service supports a site-to-site managed VPN service, enabling a secure connection between the cloud provider and the customer's data center. This allows for encrypted communication and seamless integration of the customer's on-premises infrastructure with the cloud environment.
Supports virtual network peering, enabling the connection of two virtual networks using private IP addresses for secure and efficient communication between them. This feature simplifies network architectures and enhances the flexibility and scalability of the cloud infrastructure.
Multiple VPN connections per virtual network, allowing for the establishment of multiple secure connections with external networks or data centers. This feature enhances network flexibility, redundancy, and scalability, enabling efficient communication and seamless integration with external resources within the cloud environment.
Provide support for Border Gateway Protocol (BGP) for high availability and failover. BGP enables robust liveness checks on IPSec tunnels and simplifies the failover process when VPN tunnels go down. This enhances network reliability and resilience within the cloud infrastructure.
Capable of providing Private connections to customer data centers, offering direct leased-line connections or MPLS connectivity. This results in reduced network costs, increased bandwidth, and a more consistent network experience compared to internet-based connections. Private connections ensure secure and reliable communication between the customer's infrastructure and the cloud environment.
DNS/Anycast-based global load balancing for load balancing instances across multiple host servers. This ensures efficient traffic distribution, improves performance, and enhances scalability within the cloud environment.
Provide supports for multiple load balancing routing methods, including round-robin, failover, and sticky session. These options allow for efficient traffic distribution, high availability, and session persistence based on the application's needs.
We supports a front-end load balancerthat distributes client requests across registered instances. This load balancing mechanism enhances application scalability and performance by efficiently handling incoming traffic from the internet. An internal load balancer capable of routing traffic to instances within private subnets. This back-end load balancer ensures efficient distribution of traffic and workload among instances, enhancing the performance and availability of applications hosted in private subnets. By supporting an internal load balancer, the cloud service enables seamless and reliable communication between instances within the private network, improving the overall scalability and resilience of the cloud-based infrastructure.
ESDS cloud service supports health checks to monitor the health and performance of resources. These health checks enable continuous monitoring of applications and resources, ensuring their availability and optimal performance. By implementing health checks, users can proactively identify and address issues, maintain high service reliability, and deliver a seamless user experience within the cloud environment.
Seamless integration with load balancers is available. This integration allows load balancers to work effectively with the cloud service, ensuring efficient distribution of traffic and workload across instances. By enabling integration with load balancers, users can achieve optimal performance, scalability, and high availability for their applications and services hosted in the cloud environment.
Low-latency 25 Gig network connectivity between servers, ensuring fast and efficient communication and data transfer. This high-speed connectivity facilitates rapid response times, reduces latency, and enables seamless interaction between the servers within the cloud infrastructure. By offering such low-latency network connectivity, the CSP enhances the overall performance and responsiveness of applications and services hosted in the cloud environment.
Offers a globally distributed content delivery network (CDN) that provides services through points of presence (POPs) and edge network services. The CDN supports the efficient delivery of static HTTP content and media content using the Real-Time Streaming Protocol (RTSP). This enables optimized content delivery, improved performance, and enhanced user experience by delivering content from edge locations closer to the end-users. The globally distributed CDN infrastructure ensures fast and reliable content delivery across different geographical regions, reducing latency and network congestion.
Provides endpoint services that allow users to access various resources from within the internal cloud network. These endpoint services enable secure and seamless connectivity to databases, storage systems, APIs, and other resources within the cloud environment. By supporting endpoint services, the CSP enhances the accessibility and ease of use for users, enabling efficient utilization of cloud resources and facilitating smooth integration with applications and services.
eNlight Global traffic manager and DRM:
eNlight 360° supports different database services such as MySQL, MSSQL, Oracle, etc., which makes it simple to set up and scale databases in the cloud. In addition, we provide other monitoring parameters for different databases, like MySQL- Connection Timeout, Aborted clients, Aborted Connections, Connections, and so on.
Postgre- Connection Time, Active Connections, Total Users, Disk Usage, Index Usage, and so on.
Oracle- Buffer Cache Size, Shared Pool Size, Fixed Area Size, Java Pool Size, Free Memory, and so on.
ESDS cloud supports a range of open-source NoSQL databases, to name a few MongoDB, Apache Cassandra, Apache HBase, etc. As for your requirement for a key-value pair NoSQL database, we will be suggesting MongoDB which supports features like key-value pair, secondary indexes, change streams, scalability, etc. ESDS is capable to provide cross-region replication of data, from the primary Data Center in Maharashtra to the secondary Data Center in Bangalore.
ESDS cloud supports a range of open-source NoSQL databases, to name a few MongoDB, Apache Cassandra, Apache HBase, etc. MongoDB supports features like key-value pair, secondary indexes, change streams, scalability, etc. ESDS is capable to provide cross-region replication of data, from the primary Data Center in Maharashtra to the secondary Data Center in Bangalore
Few methodologies for Database Replication and Failover are as defined below
Primary Site: Primary site will have the two database servers configured in the active – passive mode cluster.
Secondary Site: On secondary site standby server will be deployed, it will only use to replicate the data from primary to secondary site. In case disaster the server will be become live.
External & internal users will access the site from primary location in case of failure of site user will switch to the secondary site with the minimum down time.
SQL and NoSQL databases as a service (DBaaS) are cloud-based offerings that provide managed database solutions for both SQL and NoSQL data models. These services eliminate the need for organizations to manage the underlying infrastructure and administrative tasks associated with database management. Instead, users can focus on their applications and data without worrying about server provisioning, maintenance, backups, and scaling.
RDBMS:(Relational Database Service): Offers managed SQL databases like MySQL, PostgreSQL, Oracle, SQL Server, etc.
SQL DBaaS offerings typically include features like automated backups, high availability, replication for data redundancy, security controls, monitoring, and performance optimization. These services often offer flexible scaling options to handle increased workloads or changing requirements.
Users can interact with SQL DBaaS through APIs, command-line tools, or graphical interfaces provided by the respective cloud platforms. They can perform tasks such as creating databases, managing schemas, executing queries, monitoring performance, and setting up security measures.
SQL DBaaS is suitable for applications that require structured data, strong consistency, ACID transactions, and SQL query capabilities. It is widely used in various industries for web applications, enterprise software, analytics, and reporting.
ESDS SQL Database as a Service packagesVM Configuration | |
1 | Managed DB - 1 vCPU, 2 GB RAM |
2 | Managed DB - 2 vCPU, 4 GB RAM |
3 | Managed DB - 2 vCPU, 8 GB RAM |
4 | Managed DB - 4 vCPU, 8 GB RAM |
5 | Managed DB - 4 vCPU, 16 GB RAM |
6 | Managed DB - 4 vCPU, 32 GB RAM |
7 | Managed DB - 8 vCPU, 16 GB RAM |
8 | Managed DB - 8 vCPU, 32 GB RAM |
9 | Managed DB - 8 vCPU, 64 GB RAM |
10 | Managed DB - 16 vCPU, 32 GB RAM |
11 | Managed DB - 16 vCPU, 64 GB RAM |
12 | Managed DB - 16 vCPU, 128 GB RAM |
13 | Managed DB - 32 vCPU, 128 GB RAM |
14 | Managed DB - 32 vCPU, 256 GB RAM |
MySQL as a service | |
1 | Managed DB - 1 vCPU, 2 GB RAM |
2 | Managed DB - 2 vCPU, 4 GB RAM |
3 | Managed DB - 2 vCPU, 8 GB RAM |
4 | Managed DB - 4 vCPU, 8 GB RAM |
5 | Managed DB - 4 vCPU, 16 GB RAM |
6 | Managed DB - 4 vCPU, 32 GB RAM |
7 | Managed DB - 8 vCPU, 16 GB RAM |
8 | Managed DB - 8 vCPU, 32 GB RAM |
9 | Managed DB - 8 vCPU, 64 GB RAM |
10 | Managed DB - 16 vCPU, 32 GB RAM |
11 | Managed DB - 16 vCPU, 64 GB RAM |
12 | Managed DB - 16 vCPU, 128 GB RAM |
13 | Managed DB - 32 vCPU, 128 GB RAM |
14 | Managed DB - 32 vCPU, 256 GB RAM |
PostgreSQL as a Service | |
1 | Managed DB - 1 vCPU, 2 GB RAM |
2 | Managed DB - 2 vCPU, 4 GB RAM |
3 | Managed DB - 2 vCPU, 8 GB RAM |
4 | Managed DB - 4 vCPU, 8 GB RAM |
5 | Managed DB - 4 vCPU, 16 GB RAM |
6 | Managed DB - 4 vCPU, 32 GB RAM |
7 | Managed DB - 8 vCPU, 16 GB RAM |
8 | Managed DB - 8 vCPU, 32 GB RAM |
9 | Managed DB - 8 vCPU, 64 GB RAM |
10 | Managed DB - 16 vCPU, 32 GB RAM |
11 | Managed DB - 16 vCPU, 64 GB RAM |
12 | Managed DB - 16 vCPU, 128 GB RAM |
13 | Managed DB - 32 vCPU, 128 GB RAM |
14 | Managed DB - 32 vCPU, 256 GB RAM |
Oracle DB as a Service | |
1 | Managed DB - 1 vCPU, 2 GB RAM |
2 | Managed DB - 2 vCPU, 4 GB RAM |
3 | Managed DB - 2 vCPU, 8 GB RAM |
4 | Managed DB - 4 vCPU, 8 GB RAM |
5 | Managed DB - 4 vCPU, 16 GB RAM |
6 | Managed DB - 4 vCPU, 32 GB RAM |
7 | Managed DB - 8 vCPU, 16 GB RAM |
8 | Managed DB - 8 vCPU, 32 GB RAM |
9 | Managed DB - 8 vCPU, 64 GB RAM |
10 | Managed DB - 16 vCPU, 32 GB RAM |
11 | Managed DB - 16 vCPU, 64 GB RAM |
12 | Managed DB - 16 vCPU, 128 GB RAM |
13 | Managed DB - 32 vCPU, 128 GB RAM |
14 | Managed DB - 32 vCPU, 256 GB RAM |
Maria DB as a Service | |
1 | Managed DB - 1 vCPU, 2 GB RAM |
2 | Managed DB - 2 vCPU, 4 GB RAM |
3 | Managed DB - 2 vCPU, 8 GB RAM |
4 | Managed DB - 4 vCPU, 8 GB RAM |
5 | Managed DB - 4 vCPU, 16 GB RAM |
6 | Managed DB - 4 vCPU, 32 GB RAM |
7 | Managed DB - 8 vCPU, 16 GB RAM |
8 | Managed DB - 8 vCPU, 32 GB RAM |
9 | Managed DB - 8 vCPU, 64 GB RAM |
10 | Managed DB - 16 vCPU, 32 GB RAM |
11 | Managed DB - 16 vCPU, 64 GB RAM |
12 | Managed DB - 16 vCPU, 128 GB RAM |
13 | Managed DB - 32 vCPU, 128 GB RAM |
14 | Managed DB - 32 vCPU, 256 GB RAM |
Managed NoSQL document database service compatible with MongoDB.
NoSQL (Not Only SQL) databases are a category of database technologies that provide alternatives to traditional SQL (Structured Query Language) databases. They are designed to handle large volumes of unstructured, semi-structured, and diverse data types, offering flexibility, scalability, and high performance. Here are some key features and offerings of NoSQL database technologies:
Data Model Flexibility: NoSQL databases offer various data models to accommodate different data types and structures, including:
Document Databases: : Store and retrieve data in flexible, JSON-like documents (e.g. MongoDB, Couchbase).
Key-Value Stores: : Use simple key-value pairs for data storage and retrieval (e.g. Redis, Riak).
Wide-Column Stores: Store data in column families with dynamic columns (e.g., Cassandra, HBase).
Graph Databases: Represent and query data as nodes, edges, and properties (e.g., Neo4j, Amazon Neptune).
Scalability: : NoSQL databases are built to scale horizontally, allowing them to handle large amounts of data and high read/write workloads. They distribute data across multiple servers, enabling seamless scaling as data grows.
High Performance: : NoSQL databases are optimized for fast data retrieval and processing. They leverage techniques like in-memory caching, sharding, and parallel processing to achieve high throughput and low latency.
Flexibility in Schema Design: : NoSQL databases provide schema flexibility, allowing for agile development and accommodating evolving data structures without requiring predefined schemas.
Distributed and Fault-Tolerant Architecture: : NoSQL databases are designed for distributed environments, ensuring data replication, fault tolerance, and automatic data recovery in case of node failures.
Support for Big Data Analytics: : Many NoSQL databases integrate with big data processing frameworks like Apache Hadoop and Apache Spark, enabling analytics and complex data processing tasks on large datasets.
Cloud-Native Capabilities: : NoSQL databases are well-suited for cloud environments, offering elasticity, scalability, and managed database services as part of cloud platforms.
Developer-Friendly Interfaces: : NoSQL databases often provide APIs, libraries, and query languages tailored for specific data models, making it easier for developers to work with the databases.
Use Cases: : NoSQL databases are commonly used in various applications and industries, including e-commerce, social media, content management, IoT, real-time analytics, and personalized recommendation systems.
The choice between SQL and NoSQL DBaaS depends on the specific requirements of your application, data model, scalability needs, and the query patterns you anticipate. Consider factors like data structure, transactional consistency, horizontal scalability, and performance characteristics to determine whether a SQL or NoSQL DBaaS solution aligns better with your use case.
NO SQL Database Managed DB servicesESDS eNlight cloud services supports and have capability to provide NO SQL database Managed services There are four major types of NoSQL databases emerged: document databases, key-value databases, wide-column stores, and graph databases.
NoSQL DB as a service (MongoDB) | |
1 | Managed DB - 1 vCPU, 2 GB RAM |
2 | Managed DB - 2 vCPU, 4 GB RAM |
3 | Managed DB - 2 vCPU, 8 GB RAM |
4 | Managed DB - 4 vCPU, 8 GB RAM |
5 | Managed DB - 4 vCPU, 16 GB RAM |
6 | Managed DB - 4 vCPU, 32 GB RAM |
7 | Managed DB - 8 vCPU, 16 GB RAM |
8 | Managed DB - 8 vCPU, 32 GB RAM |
9 | Managed DB - 8 vCPU, 64 GB RAM |
10 | Managed DB - 16 vCPU, 32 GB RAM |
11 | Managed DB - 16 vCPU, 64 GB RAM |
12 | Managed DB - 16 vCPU, 128 GB RAM |
13 | Managed DB - 32 vCPU, 128 GB RAM |
14 | Managed DB - 32 vCPU, 256 GB RAM |
NoSQL DB as a service (Cassandra) | |
1 | Managed DB - 1 vCPU, 2 GB RAM |
2 | Managed DB - 2 vCPU, 4 GB RAM |
3 | Managed DB - 2 vCPU, 8 GB RAM |
4 | Managed DB - 4 vCPU, 8 GB RAM |
5 | Managed DB - 4 vCPU, 16 GB RAM |
6 | Managed DB - 4 vCPU, 32 GB RAM |
7 | Managed DB - 8 vCPU, 16 GB RAM |
8 | Managed DB - 8 vCPU, 32 GB RAM |
9 | Managed DB - 8 vCPU, 64 GB RAM |
10 | Managed DB - 16 vCPU, 32 GB RAM |
11 | Managed DB - 16 vCPU, 64 GB RAM |
12 | Managed DB - 16 vCPU, 128 GB RAM |
13 | Managed DB - 32 vCPU, 128 GB RAM |
14 | Managed DB - 32 vCPU, 256 GB RAM |
NoSQL DB as a service (Hbase) | |
1 | Managed DB - 1 vCPU, 2 GB RAM |
2 | Managed DB - 2 vCPU, 4 GB RAM |
3 | Managed DB - 2 vCPU, 8 GB RAM |
4 | Managed DB - 4 vCPU, 8 GB RAM |
5 | Managed DB - 4 vCPU, 16 GB RAM |
6 | Managed DB - 4 vCPU, 32 GB RAM |
7 | Managed DB - 8 vCPU, 16 GB RAM |
8 | Managed DB - 8 vCPU, 32 GB RAM |
9 | Managed DB - 8 vCPU, 64 GB RAM |
10 | Managed DB - 16 vCPU, 32 GB RAM |
11 | Managed DB - 16 vCPU, 64 GB RAM |
12 | Managed DB - 16 vCPU, 128 GB RAM |
13 | Managed DB - 32 vCPU, 128 GB RAM |
14 | Managed DB - 32 vCPU, 256 GB RAM |
Graph DB as a service (Neo4J) | |
1 | Managed DB - 1 vCPU, 2 GB RAM |
2 | Managed DB - 2 vCPU, 4 GB RAM |
3 | Managed DB - 2 vCPU, 8 GB RAM |
4 | Managed DB - 4 vCPU, 8 GB RAM |
5 | Managed DB - 4 vCPU, 16 GB RAM |
6 | Managed DB - 4 vCPU, 32 GB RAM |
7 | Managed DB - 8 vCPU, 16 GB RAM |
8 | Managed DB - 8 vCPU, 32 GB RAM |
9 | Managed DB - 8 vCPU, 64 GB RAM |
10 | Managed DB - 16 vCPU, 32 GB RAM |
11 | Managed DB - 16 vCPU, 64 GB RAM |
12 | Managed DB - 16 vCPU, 128 GB RAM |
13 | Managed DB - 32 vCPU, 128 GB RAM |
14 | Managed DB - 32 vCPU, 256 GB RAM |
Graph DB as a service (ArangoDB) | |
1 | Managed DB - 1 vCPU, 2 GB RAM |
2 | Managed DB - 2 vCPU, 4 GB RAM |
3 | Managed DB - 2 vCPU, 8 GB RAM |
4 | Managed DB - 4 vCPU, 8 GB RAM |
5 | Managed DB - 4 vCPU, 16 GB RAM |
6 | Managed DB - 4 vCPU, 32 GB RAM |
7 | Managed DB - 8 vCPU, 16 GB RAM |
8 | Managed DB - 8 vCPU, 32 GB RAM |
9 | Managed DB - 8 vCPU, 64 GB RAM |
10 | Managed DB - 16 vCPU, 32 GB RAM |
11 | Managed DB - 16 vCPU, 64 GB RAM |
12 | Managed DB - 16 vCPU, 128 GB RAM |
13 | Managed DB - 32 vCPU, 128 GB RAM |
14 | Managed DB - 32 vCPU, 256 GB RAM |
Graph DB as a service (Dgraph) | |
1 | Managed DB - 1 vCPU, 2 GB RAM |
2 | Managed DB - 2 vCPU, 4 GB RAM |
3 | Managed DB - 2 vCPU, 8 GB RAM |
4 | Managed DB - 4 vCPU, 8 GB RAM |
5 | Managed DB - 4 vCPU, 16 GB RAM |
6 | Managed DB - 4 vCPU, 32 GB RAM |
7 | Managed DB - 8 vCPU, 16 GB RAM |
8 | Managed DB - 8 vCPU, 32 GB RAM |
9 | Managed DB - 8 vCPU, 64 GB RAM |
10 | Managed DB - 16 vCPU, 32 GB RAM |
11 | Managed DB - 16 vCPU, 64 GB RAM |
12 | Managed DB - 16 vCPU, 128 GB RAM |
13 | Managed DB - 32 vCPU, 128 GB RAM |
14 | Managed DB - 32 vCPU, 256 GB RAM |
Analytics DB as a service (Hive) | |
1 | Managed DB - 1 vCPU, 2 GB RAM |
2 | Managed DB - 2 vCPU, 4 GB RAM |
3 | Managed DB - 2 vCPU, 8 GB RAM |
4 | Managed DB - 4 vCPU, 8 GB RAM |
5 | Managed DB - 4 vCPU, 16 GB RAM |
6 | Managed DB - 4 vCPU, 32 GB RAM |
7 | Managed DB - 8 vCPU, 16 GB RAM |
8 | Managed DB - 8 vCPU, 32 GB RAM |
9 | Managed DB - 8 vCPU, 64 GB RAM |
10 | Managed DB - 16 vCPU, 32 GB RAM |
11 | Managed DB - 16 vCPU, 64 GB RAM |
12 | Managed DB - 16 vCPU, 128 GB RAM |
13 | Managed DB - 32 vCPU, 128 GB RAM |
14 | Managed DB - 32 vCPU, 256 GB RAM |
Caching as a service (Redis) | |
1 | Managed service - 1 vCPU, 2 GB RAM |
2 | Managed service - 2 vCPU, 4 GB RAM |
3 | Managed service - 2 vCPU, 8 GB RAM |
4 | Managed service - 4 vCPU, 8 GB RAM |
5 | Managed service - 4 vCPU, 16 GB RAM |
6 | Managed service - 4 vCPU, 32 GB RAM |
7 | Managed service - 8 vCPU, 16 GB RAM |
8 | Managed service - 8 vCPU, 32 GB RAM |
9 | Managed service - 8 vCPU, 64 GB RAM |
10 | Managed service - 16 vCPU, 32 GB RAM |
11 | Managed service - 16 vCPU, 64 GB RAM |
12 | Managed service - 16 vCPU, 128 GB RAM |
13 | Managed service - 32 vCPU, 128 GB RAM |
14 | Managed service - 32 vCPU, 256 GB RAM |
Caching as a service (Memcached) | |
1 | Managed service - 1 vCPU, 2 GB RAM |
2 | Managed service - 2 vCPU, 4 GB RAM |
3 | Managed service - 2 vCPU, 8 GB RAM |
4 | Managed service - 4 vCPU, 8 GB RAM |
5 | Managed service - 4 vCPU, 16 GB RAM |
6 | Managed service - 4 vCPU, 32 GB RAM |
7 | Managed service - 8 vCPU, 16 GB RAM |
8 | Managed service - 8 vCPU, 32 GB RAM |
9 | Managed service - 8 vCPU, 64 GB RAM |
10 | Managed service - 16 vCPU, 32 GB RAM |
11 | Managed service - 16 vCPU, 64 GB RAM |
12 | Managed service - 16 vCPU, 128 GB RAM |
13 | Managed service - 32 vCPU, 128 GB RAM |
14 | Managed service - 32 vCPU, 256 GB RAM |
Text Search as a service (Elastic Search) | |
1 | Managed service - 1 vCPU, 2 GB RAM |
2 | Managed service - 2 vCPU, 4 GB RAM |
3 | Managed service - 2 vCPU, 8 GB RAM |
4 | Managed service - 4 vCPU, 8 GB RAM |
5 | Managed service - 4 vCPU, 16 GB RAM |
6 | Managed service - 4 vCPU, 32 GB RAM |
7 | Managed service - 8 vCPU, 16 GB RAM |
8 | Managed service - 8 vCPU, 32 GB RAM |
9 | Managed service - 8 vCPU, 64 GB RAM |
10 | Managed service - 16 vCPU, 32 GB RAM |
11 | Managed service - 16 vCPU, 64 GB RAM |
12 | Managed service - 16 vCPU, 128 GB RAM |
13 | Managed service - 32 vCPU, 128 GB RAM |
14 | Managed service - 32 vCPU, 256 GB RAM |
Object storage (object-based storage) is a type of storage in which we organize and work with units of storage, called objects. Every object contains three things:
eCOS is eNlight Cloud Object Storage which enables infinite vertical and horizontal auto-scale for your enterprise objects. With eCOS, users can customize Meta data to search and fetch data in a few clicks, replicate data across platforms/regions, manage terabytes of data systematically in a secure cloud environment. With eCOS, enterprises reduce the TCO of storage infrastructure with eNlight’s pay-per-use model.
eCOS is provided as an Add-on service with which users can avail the service using a self-service portal.
Architecture
eCOS object storage servers are configured in cluster fashion across multiple datacenters in India. Data is synchronized in the background across all clustered nodes for data redundancy.
Initial setup, Configuration & Working
1. User signup: Every eCOS customer gets account details such as User name, Password (API Key), Tenant Name, Authentication Service.
2. Install Agent/Custom App (via API calls): eCOS customer has an option to install Windows/Linux based client application or developer your own mobile/desktop app using REST API available for eCOS service.
3. Configure Backup and Restore task : A simple or complex backup task can be configured using our desktop based client application. Any file or folder backup and restore task can be done manually or automated using the same client
Customize Meta data, assign unique ID and store file as a single object. Fetch data in seconds as soon as you feed unique ID. eCOS eliminates the need for web servers and load balancers by fetching details on the web, in real time.
Programmatic Data ManagementManage data with programmatic interfaces provided by eCOS. Get support for additional functionality like object versioning, replication and movement of objects between different tiers and types of storage.
Cross Platform ReplicationGet off-the-shelf compatibility across cloud and recover objects/ multiple versions of objects, as eCOS runs cross platform replication of data. CAS makes data retrieval easy and builds high redundancy for your enterprise objects, eliminating any loss of data.
Secure ObjectsSafeguard your enterprise data against physical & logical failures, fraudulent users & infrastructure failures as eCOS protects objects at all levels. Enterprises can achieve the goals of data compliance & security through eCOS.
Ease of ManagementOrganize, manage and monitor your data with the help of a user-friendly GUI without the need of specific training/ additional knowledge. Get status updates and notifications, via high performance object storage APIs on eCOS.
Cost ControlPay as data grows, and zero down cost as data shrinks. eNlight-supported eCOS operates on pay-per-consume billing model which reduces 60-70% of your storage cost. With a highly interactive user-management tool with real-time alerts, you can take complete control of costs.
Object storage is known for its compatibility with cloud computing, and that’s because of its unlimited scalability feature. With eCOS, storage capability will be increased and decreased automatically and end user does not need to worry about its scalability. eCOS can handle data growth from MB to GB and GB to TB without any hassle.
2. Faster Data Retrieval and Better RecoveryEach object in the storage environment has its own identifying details, comprised of metadata and ID number, which the OS reads to retrieve data. Without the need to sift through file structures, retrieval is much faster. Thanks to the metadata and ID numbers, users don’t need to know an object’s exact location to retrieve it. Having unrestricted metadata also allows storage administrators to implement their own policies for data preservation, retention and deletion. This, along with the way storage nodes are distributed across the structure, makes it easier to reinforce data and create better “disaster recovery” strategies.
3. Cost-effectivenessFor organizations that need to store large amounts of data, eCOS solution could be the most cost-effective. Because it scales out much easier than other storage environments, it’s less costly to store all your data. Plus, if users have a private cloud space, costs can be even lower. Plus, compared to other systems that are considered inexpensive for these volumes of data, it’s a much more durable alternative.
4. Customizable Meta-DataWhen it comes to object storage, metadata resides in the objects themselves. There is no need to build databases to associate metadata with the objects. Custom metadata can be created about an object file based on contents, dates, user information, permissions, etc. Attributes can be changed and added over time. Because of custom metadata, object storage is highly searchable. Users can conduct searches that return a set of files that meet specific criteria, such as what percentage of files are of a certain type or created by certain owner. This allows companies to extract insights from the big data they possess within their files and identify trends
Disk [IOPS/TB] automatically improves storage resource utilization. It provides a fair performance between multiple virtual machines running on the same cluster and allows policy-based performance goals to be configured in units of normalized IOPS. Disk [IOPS/TB] manages Disk I/O and prevents VMs from using excess Disk resources, causing Disk I/O bottlenecks. Disk [IOPS/TB] policies set fixed Disk IOPS for every VM to ensure that performance window is observed.
eNlight Object cloud storage provides read after write consistency where each read-and-write operation is guaranteed to return the most recent version of the data.
Our object storage is highly resilient, with replication across multiple data centers ensuring exceptional availability and durability
Hosting websites are supported that use client-side technologies(such as HTML, CSS, and JavaScript), offer services to speed up the distribution of static and dynamic web content, and provide a storage gateway appliance for seamless integration of on-premises data with the cloud
Object storage should be replicated across multiple DC’s for better resiliency and should be designed for 99.99% availability and 99.99999999999999% (16 9's) durability.
HDFS is an open-source storage system which stores the data without no considerations to the datatype and stores huge data in efficient and faster manner and has high fault tolerance. Its distributes the data into chunks and saves them in the multiple data nodes. It also considers storing the replica of the chunks thereby making it fault tolerant. Hence, we choose the HDFS as our base storage system. Below is the HDFS data storage architecture.
Data IngestionApache NiFi is an open source data ingestion tool which pulls data from a wide range of data sources into HDFS system by creating pipelines. It also provides user an interactive UI for data flow management, security and provenance. Provide Visualization and performance monitoring metrics of the data flow. The Rest API of Nifi helps to command control and alter Nifi Instance in real time. It also has custom processor creativity. Hence Nifi, suits well in our case as we are planning to create custom API flows through our SSP portal. Data Security and Governance: - Apache Ranger, AD.
Data StreamingApache Kafka is an open source, distributed streaming platform that enables the development of real-time, event-driven applications. Kafka is а distributed рlаtfоrm it runs as а fаult-tоlerаnt, highly аvаilаble cluster that саn sраn multiрle servers and even multiple data centers. Kаfkа tорiсs аre раrtitiоned аnd reрliсаted in suсh а wаy thаt they саn sсаle tо serve high volumes of simultaneous соnsumers withоut imрасting рerfоrmаnсe. Аs а result, ассоrding tо Арасhe.оrg, “Kаfkа will рerfоrm the sаme whether yоu hаve 50KB оr 50TB оf рersistent stоrаge оn the server.”
MonitoringKafka-Manager is a UI to manage and create the Kafka topics for streaming data. It provides user better understanding about the Kafka brokers and topics. It also provides data and messages info of published, produced and consumed data by the Kafka.
Рrоmetheusis an open source monitoring software which соntributes tо the DevОрs system through mоnitоring аррliсаtiоns аnd infrastructure, аnd with the aid of watching оver masses оf miсrоserviсes. Рrоmetheus mоnitоring eliminates the аmоunt оf alerts in а system, only sending alerts whilst major problems need tо be solved. Furthermоre, the Рrоmetheus Node Exроrter саn be adjusted tо retrieve data from the big apple client, which саn be very helрful. Аlоng with this, Рrоmetheus mоnitоring саn be used tо рrоvide сlаrity into structures аnd how tо run them.
Grafanais an open-source visualization web application which create dashboards through the metrics collected from the data source and visualize the data for better understanding. We can also create alerts in the system by indicating the threshold.
Prometheus acts as a data source to Grafana in our case. Prometheus collects metrics from the different services of our datalake and provide to Grafana for providing the visualized graph of the system. Hence used widely by DevOps as monitoring system.
Fig 2. Datalake Architecture Design
The Datalake Architecture Design illustrates the architecture we are following to build our datalake in a very cost effective manner using open-source technologies.
We have HDFS as our base storage system due to below considerations.Below is the High Level Architectural Diagram of the HDFS system in our Datalake.
Fig 3. HDFS HA Architecture
We are planning to develop a SSP Portal for the users as a deliverable to connect to the datalake services. This is will be primary POV for the users to access the datalake.
The below Data Flow diagram shows the flow of data into the datalake. The data from different data sources like Object Storage, Web API’s, SFTP, Kafka are ingested to the HDFS storage using the Nifi Templates. Standard Nifi templates are created for storing the data from multiple data sources into our Datalake storage system. The user will access the SSP portal to Insert/Get data in/from different data Sources. This data will then be ingested to the datalake storage via SSP portal standard Data Ingestion phase. The Ingestion phase of the SSP portal will create a bucket, process within the NiFi-registry, NiFi for a particular flow by a user. The stored data within the datalake can be accessed through the HDFS File browser(HUE) system.
Fig 4. Data Flow Diagram
Fig 5. User POV
Fig 6. Entity Sequence Diagram
The Entity Sequence Diagram illustrates the ELT procedure within the datalake.
The Below High Level Node Architecture explains the node distribution for the services of the datalake.
The implementation divides the server nodes into several roles, and each node has a configuration that is optimized for its role in the cluster.
The Kubernetes Cluster implementation is a 7 nodes high available cluster deployment consisting of 3 Master Nodes, 3 Worker Nodes and 1 Load Balancer Node.
The further Node Description is as below Master NodesMaster nodes will consist of Active/Passive Name-nodes and Yarn Resource Managers supporting the cluster operations for High Availability Datalake Storage. Zookeeper will work as the connectivity for the nodes and the Journal Node will be the failover controller as explained in the fig 3. HDFS HA Architecture.
Worker NodesWorker Nodes will consists of Data-nodes and data-node managers supporting the storage and bulk operations of the HDFS storage cluster.
Utility NodeUtility node will serve the purpose of the Ingestion to the Datalake Storage and will consists of NiFi and Kafka Clusters.
Administration NodeAdministration Node will serve the Monitoring purpose of the datalake services.
Fig 7. High Level Node Architecture.
Designed a simple network where both the master and worker clusters will be attached to the same VLAN and network for faster processing. All machines will be attached to a single network that is Kubernetes Cluster data network which will be connected to the Local network system as per company standards.
Fig 8. Network Architecture
The prototype is discussed with the figures below.
Fig 9. Login Page
Fig 10. Home Page SSP
Fig 11. Dashboard of Services
Fig 12. Data Sources
Fig 13. Data Ingestion SSP API
Fig 14. Monitoring Page of Datalake Services.
No Code/Less Code End to End Data Science Platform
ESDS Rubiscape is a pioneering Data Platform that makes Data Science possible and enjoyable for everyone.
With a motto of Data ‘decoded’, Future ‘decided’, ESDS Rubiscape brings a paradigm shift in end-to-end data-driven solutions that seamlessly harmonize open source, algorithms, computation, and people, through a process of co-creation and continuous innovation in-sync with evolving needs.
Machine Learning Simplified!Rich library of 100+ pre-built ML Algorithms and Functions to build the best models for Statistical Analysis, Accelerate Machine Learning (Supervised, Unsupervised), Natural Language Processing
ESDS RubiWiseESDS Rubiscape has applied design thinking principals in crafting RubiWise that aims to Simplify Data Science through effective strategies - Datasets (diverse sources and infrastructures), Skillsets (talents and creativity), Toolsets (ESDS Rubiscape and opensource), Mindset (principles and ethos) to innovate and deliver a value.
ESDS Rubiscape is designed to provide agility by seamlessly integrating Plug & Play components that are further customizable based on industry-specific needs & evolving expectations.
For Business PeopleModel creation and collaboration is made easy than ever before. Anyone with basic knowledge of Stats can use ESDS Rubiscape. No need to learn any programming.
Best In class TCOHighly affordable as it is built with leading edge Opensource technologies and offered on Cloud as SaaS model as against existing proprietary on-premises products.
ESDS Rubiscape Platform Stack RubiStudio :- Effortlessly build Analytical Models with a Visual DesignerESDS Rubiscape Designer or a Model Studio is a visual model builder (no-code or low- code, drag and drop) for data scientists to build models, train-test-deploy and publish the selected model. You can reuse models whenever required. You can also integrate Python and R based models and custom coding.
RubiFlow :- Orchestrate Data and Workflows for a seamless CollaborationRubiFlow is an integrated Process Designer to help users build and manage data flows with a visual, end-to-end event-based Orchestrator. Data access engines of RubiFlow provides a powerful, easy-to-use user interface that supports collaboration, reuse of processes and common metadata.
RubiML :- Boosting Analytical ProductivityWith RubiML for Predictive Analytics, you can create, test, deploy, and maintain your Predictive Models easily and instantly. RubiML offers interactive data exploration and makes it easy to build and adjust predictive models without any knowledge of coding for boosting your analytical productivity
Rubicast :- Efficiently Generate Scientific ForecastsRubicast is a Forecasting Module to streamline and automate your forecasting process. With RubiCast, you don’t need to manually code your models for exploring and analyzing large volumes of time series data. RubiCast can generate easily and efficiently any number of statistically based trustworthy forecasts.
RubiText :- Easily Extract Deeper Insights from Textual DataRubiText simplifies Text Analytics with a set of Linguistic, Statistical, and ML techniques for Word Frequency Analysis, Pattern Recognition, Tagging/Annotation, Information Extraction, Link & Association Analysis and Predictions.
RubiSightRapidly Create Visual Data Stories
Rubisight tells the Data Story visually. With RubiSight, users can achieve faster dashboard turnaround, flexibility for any subject area, consistent user experience, and effective collaboration across the decision-making process. RubiSight makes the visual Data Discovery easier with Box plot, Heat map, Network diagram, Correlation matrix, Forecasting, Decision tree, Time Zone, Geo Maps, Text objects and many features.
Smartly Maximize your Business Value with Connected Intelligence
RubiThings enriches the data experience by the inter-networking of Physical Devices, Vehicles, Buildings, Machines, Electronics, Software, Sensors with IoT and M2M applications.
Connecting from different sources of Input data and processing the data through various stages such as Data Integration, Data Science and Data Visualisation. The entire technology stack is inbuilt in a single platform which ultimately helps the end user to perform different tasks without switching to different platforms.
ESDS Rubiscape Dataset ConnectionThe dataset source in ESDS Rubiscape contains various Social Media Platforms from which the data can be extracted such as
This data connections will enable the user to extract the data from the various Social Media Platforms and APIs on a real-time.
2. RubiML and RubiTextis an inbuilt toolset of ESDS Rubiscape that encompasses AI, Machine Learning and Natural Language Processing algorithms to automate and enrich the data to derive measurable benefits in terms of intelligence that can be used in the aligned Decision Support Systems.
'eNlight Cloud Functions' is a FaaS (Functions as a Service) platform which executes functions as per the demands, eliminating server maintenance needs and costs. eNlight Cloud Functions is based upon Apache OpenWhisk which provides a simple and sophisticated platform to deploy functions.
Serverless' computing relates to the notion of creating and running applications that do not demand server management. It represents a deployment model at a granular level, where applications are a bundle of one or more functions. We upload them to a platform and then they run, auto-scale, and generate a bill as per the particular demand. The term serverless doesn't actually mean that there are no servers involved. We, of course, need them for the codes to function.
With the ever-changing markets– deploy your applications faster with eNlight Cloud Functions. eNlight Cloud Functions is a Serverless cloud-computing platform where you can deploy your functions which executes in response to triggers or incoming events on demand. Achieve high scalability and take advantage of the pay-per-consume model which guarantees increased cost savings.
Our serverless cloud computing platform will add a lot of benefits to your business application from development to updates and maintenance. There are several benefits for developers, owners, and users
With eNlight Cloud Functions you are free from server and application environment administration as it is a fully managed service provided by us and the overheads like managing servers, virtual machines and containers get eliminated.
Flexible On-Demand and Automatic ScalingeNlight Cloud Functions can promptly and accurately scale to serve each individual incoming request. As the traffic levels change, functions automatically scale which is intelligently managed by eNlight Cloud
Event-driven Way with High VelocityEvents trigger the functions. Triggers can be invoked via programmable APIs. Thus your external apps, services and edge systems, can invoke your eNlight Cloud Functions with only the required resources resulting in effective serverless computing.
Developers Can Focus on Significant TasksYour developers don’t need to bug about the OS, infra, language runtime, middleware, its administration and dependencies. They can now focus on the projects directly driving business growth instead of maintenance and time-lag.
Granular Pay-Per-Consume ModelYour bill is based on memory usage, execution time, and CPU usage. You pay only for the time period when your function executes and the number of functions that performed. Hence, no hourly charge and lesser idle time.
The wave of eNlight IoT will amplify a platform to help you prototype and scale your IoT applications eNlight IoT has the potential to change the way we interact with our belongings. eNlight IoT is a managed cloud platform that lets connected devices easily and securely interact with cloud applications and other devices. eNlight IoT can support various devices, and can process and route sensor messages to other devices reliably and securely. With eNlight IoT, your applications can keep track of and communicate with all your devices, all the time, even when they aren’t connected. eNlight IoT makes it easy to use Node RED, to build IoT applications that collect, process, analyze, visualize and act on data generated by connected devices, without having to manage any infrastructure.
eNlight IoT allows you to easily connect devices to the cloud and to other devices. eNlight IoT supports REST(HTTP/S) and MQTT protocols. It is best suited for IoT and M2M communication because of its small code footprint, lower bandwidth requirements and lower power consumption on device. You can actually make your thing talk to you using eNlight IoT. Connecting your devices and interacting with them was never so easy.
Secure device Connection, data transfer & Access ControleNlight IoT provides authentication, access control and end-to-end encryption throughout all points of connection, so that data is never exchanged between devices and eNlight IoT without proven identity. In addition, you can secure access to your devices and data by applying access tokens and device tokens.
Real-Time Data ManagementWith eNlight IoT, you can collect, filter, transform, and trigger upon device data on the fly, based on business rules you define. You can update your rules to implement new device and application features at any time. eNlight IoT makes it easy to use Node RED services for your device data. You can easily set real-time triggers and notifications on your device data on the fly.
Rich Analytics & InsightsWith eNlight IoT, you can collect, analyze and visualize device data on our Dashboard. You can visualize data with various graphs and widgets. eNlight IoT makes it easy to use Node RED services for your device data to send data to various analytics tools and do real-time analysis of your device data.
eNlight Media services in the cloud offer a range of benefits and features that cater to the specific requirements of managing, processing, delivering, and analyzing media content. Here are some key benefits and features of eNlightcloud media services:
Key Benefits:Every day there are numerous instances when we hear users getting frustrated due to the low loading speed of applications, devices and websites. This slowness causes results in lower user experience levels and dissatisfaction. To overcome all user concerns related to latency, bandwidth exhaustion, and a high surge in online traffic, ESDS has developed the India's fastest & highly cost-effective CDN Solutions.
To address geographically scattered users and their needs, ESDS has deployed multiple regional PoPs (Points of Presence) present all over India. These PoPs are capable of handling high bandwidth.
For More Details CDN
Ensuring the continuity and performance of our services is paramount to us, both during the duration of the agreement and beyond, including the exit management period. As your trusted Cloud Service Provider (CSP), we are committed to upholding the highest standards of service delivery, even post expiry of the Agreement.
1. Continuity of Services: It is our prime responsibility to guarantee uninterrupted service quality throughout the Agreement, including the exit management period. We assure the Government Department that no facility or service will be compromised in any way during this transition phase. Furthermore, we pledge to facilitate a seamless transfer of knowledge to the Replacement Agency (or Government Department), ensuring the continuation of services at the same high standards.
2. Transition Support: Upon the conclusion or termination of the contract, we are obligated to provide comprehensive handholding and transition support. Our aim is to ensure the Government Department's complete satisfaction with the continuity and performance of the services during this critical phase.
3. Migration Assistance: We are committed to assisting the Government Department in migrating VMs, data, content, and any other assets to their new environment, be it on alternate cloud service providers' offerings or otherwise. Additionally, we will certify the destruction of VMs, content, and data to prevent forensic recovery, providing the necessary support until the successful deployment and access of services in the new environment.
4. Data Retention and Deletion: We will refrain from deleting any data at the end of the agreement for a maximum of 45 days beyond the expiry, unless expressly approved by the Government Department.
5. Technical Support: Throughout the exit/transition management process, it is our responsibility to promptly address and rectify any issues related to the migration of Department applications and IT infrastructure, including the installation or reinstallation of system software.
6. Ownership of Data: The ownership of data generated during the contract period unequivocally rests with the Government Department at all times, ensuring their complete control and autonomy over their data assets.
7. Documentation Maintenance: We are committed to maintaining up-to-date documentation, including configuration documents, throughout the contract period. All such documentation will be handed over to the Department during the exit management process to facilitate a smooth transition.
SAP DB support offers to manage the critical components at utmost priority, supporting across the landscape and reviewing and recommending the demand as per the usage/need. Monitoring and managing the service's health, performance, and high availability, to bring the components offer maximum uptime by maintaining the SLA to more than expected for HANA, Sybase, and MaxDB databases. With no vendor lock-in, exuberant support from certified Linux & SAP-certified engineers, etc., stay up-to-date and SAP-compliant with updates and upgrades. Take control to customize at every step with enterprise HANA on eNlight.
ESDS's SAP DB Management Offers
Head Office | Nashik
Plot No. B- 24 & 25, NICE Industrial Area,Satpur MIDC, Nashik 422 007.
Corporate Office | Airoli, Mumbai
Reliable Tech Park, B Wing, Thane - Belapur Rd, Gavate Wadi, MIDC, Airoli, Navi Mumbai, Maharashtra 400708.
Office | Bengaluru
1st floor, No 76, 77 & 78(p), New STPI building, Cyber Park, Electronic City Phase-1,
Hosur Road ,Bengaluru 560 100
Toll FREE : 1800-209-3006
Email : [email protected]