Tait and Cloud Computing - Canterbury Software Cluster

Transcription

Tait and Cloud Computing - Canterbury Software Cluster
Cloud Computing Experience
presented to Canterbury Software Cluster
Dan Van Wieren
ICT Infrastructure Manager
April 7, 2015
1
www.taitradio.com
Confidential – Not to be distributed outside of Tait Communications
Introduction
• 
Tait has around 750 staff globally, with about 580 based in ChCh. We have offices in 8 countries
and clients in around 90. Staff, clients and partners in all those regions access some resources
from public cloud infrastructure as well as on-premise and colocated infrastructure. We do not
expect to ever go 100% into the cloud for many reasons.
• 
For Tait cloud based service delivery means focusing on an HTML5 compliant browser as the
primary application presentation tool to deliver services to anyone, anywhere, anytime, any
device, any platform, any browser, however, this is very much a transitional challenge.
• 
We minimise the use of client side proprietary tools as much as possible and we don’t want to be
tied to a particular vendor and therefore where possible we prioritise vendors who support open
standards. But we do recognise there will always be exceptions due to business needs or vendor
product limitations especially if there is a lack of support for open standards.
2
Confidential – Not to be distributed outside of Tait Communications
What Has Tait Moved to the Cloud
2009
•  IaaS - Review of VMware as an internal service delivery platform and NZ based shared
infrastructure service providers were investigated.
•  SaaS - Migrated CRM to SalesForce from various on-premise systems.
•  SaaS - Implemented Learning Management System.
•  SaaS - Implemented Timesheets.
•  SaaS - Migrated to different email filtering from on-premise.
2010
•  SaaS - Migrated email & calendaring to Google from on-premise. Docs was not a focus.
2011
•  IaaS - Migrated public website to Rackspace from on-premise (www.taitradio.com).
2012
•  SaaS - Implemented organisational charting.
•  IaaS - Review of VMware as an internal service delivery platform and NZ based shared
infrastructure service providers were investigated for alternatives.
3
Confidential – Not to be distributed outside of Tait Communications
What Has Tait Moved to the Cloud
2013
•  IaaS - Implemented document management system hosted with AWS to replace on premise fileservers (CFM).
•  SaaS - Implemented system for performance management (reviews and appraisals).
•  SaaS/IaaS - Consideration *aaS new ERP system.
2014
•  SaaS - Migrated to different incident management system (IMS) from on-premise.
•  IaaS - Migrated Intranet / Collaboration environment to AWS from on-premise private cloud
infrastructure.
•  IaaS - Migrated public website (www.taitradio.com) from Rackspace to AWS.
•  IaaS - Migrated R&D workloads to local public shared infrastructure provider.
•  IaaS – (WIP) Migrate Azure based workloads to AWS.
2015
•  IaaS - Document management on private cloud infrastructure co-located at local data centre
provider used for R&D based cloud file management for IP and bandwidth reasons.
•  Currently having a look at AWS WorkMail.
4
Confidential – Not to be distributed outside of Tait Communications
What Has Tait Moved to the Cloud
• 
• 
• 
• 
• 
The key system that we are now delivering from AWS is ‘Cloud (Document) File Management’
which is based on Alfresco running from a RedHat AMI and using PostgreSQL.
For the initial rollout we were supported by a vendor.
The app, DB and content server were on separate hosts and integrated with our corporate
OpenLDAP directory server. The master LDAP is located on-premise in ChCh and hosted on a
Solaris virtual zone and replicated to an AWS node running on another RedHat AMI.
Initially deployed without HA. But supported with node replication and backups.
Over time we have augmented the underlying infrastructure using AWS building blocks to deliver
a highly resilient scalable system. This has included:
• HA across multiple availability zones (AZ’s) in Sydney and complemented with ELB. AZ’s
are 2 physically and geographically separated data centres in Sydney.
• DR to another AWS region in Singapore.
• RDS for PostgreSQL.
• In the future Route 53 will be reviewed. This is already used on our public website.
5
Confidential – Not to be distributed outside of Tait Communications
Which Cloud Vendor and Products are Used
• 
• 
• 
• 
We have used Rackspace for IaaS.
We are using Azure, for some client tools but migrating those workloads to AWS.
We are now focused on AWS and use the following features:
-  Route53, ELB, S3, RDS, Auto scaling, EC2 (AMI’s), ElastiCache, CloudWatch, VPC, multiple
AZ's, and DR.
-  CloudFront is on the radar.
-  AWS Business Level Support.
-  We have partnered with Fronde and they now handle our monthly invoicing and this means we
are not tied to a credit card bill. This also gives us access to AWS support via Fronde as well
as direct with AWS.
-  We have 3 system engineers that have completed the AWS architecture course and one of
who is working full time on service delivery from AWS.
We use Google for email and calendar, video. Docs is in limited use but not promoted.
• 
We use SalesForce for CRM and RemedyForce (IMS).
6
Confidential – Not to be distributed outside of Tait Communications
Evolving from a Stand-alone System to Full HA & DR
• 
The following diagrams provide a high-level illustration of how we have evolved the CFM
environment form a stand-alone, replicated and backed-up system to a fully HA and DR
configuration using the following components:
- 
- 
- 
- 
7
Elastic Load Balancing (ELB)
Relational Database Service (RDS) - Managed PostgreSQL DB for metadata
Simple Storage Service (S3) - Content storage
2 Availability Zones (AZ) - Separated Data Centres
Confidential – Not to be distributed outside of Tait Communications
Initial Stand-Alone Setup
8
Confidential – Not to be distributed outside of Tait Communications
Introducing ELB
9
Confidential – Not to be distributed outside of Tait Communications
Introducing RDS
10
Confidential – Not to be distributed outside of Tait Communications
Add New Application Server
11
Confidential – Not to be distributed outside of Tait Communications
Introduce New Content Repository Server Using S3
12
Confidential – Not to be distributed outside of Tait Communications
Remove Old Content and App Server
13
Confidential – Not to be distributed outside of Tait Communications
Final HA Implementation
(Singapore DR Site not shown)
14
Confidential – Not to be distributed outside of Tait Communications
Full System View Including SSO
15
Confidential – Not to be distributed outside of Tait Communications
How Long Have we Been Using the System
in Production
• 
The key system that we are now delivering from AWS is ‘Cloud (Document) File Management’
and this was started in February 2013. After pilots and testing it was operationalised in November
2013.
• 
There has been a major focus on IaaS over the last 3 years.
• 
We still operate on-premise private cloud infrastructure for relevant workloads.
16
Confidential – Not to be distributed outside of Tait Communications
How Many People Are Using the Systems
We have many systems deployed which have different numbers of users. But we have global
systems in production with user numbers at around 750 staff, with about 200 being overseas.
Some systems are also used by clients and partners.
17
Confidential – Not to be distributed outside of Tait Communications
How Long Did it Take to Migrate the System
• 
The key system we have been focused on is global cloud file/document management (CFM).
• 
It would typically take a few days to create a test or production environment. This is because all the building blocks are already
in place with AWS. There are no debates around funding new hardware or carving up existing infrastructure for capacity or
obtaining capex. Spinning up new hosts only takes a few minutes.
• 
The usage of the system is being staged over a much larger period of time which means we are staggering the adoption of the
platform across departments and regions and decommissioning local file-servers as these entities migrate across.
• 
The environment has been enhanced over time to meet availability requirements related to RTO and RPO to provide HA and
DR.
• 
We still have a huge task to complete the data migration and work out which data belongs in our CFM and which should stay
on-premise on traditional NFS and CIFS servers.
Because the public cloud model is pay as you go you don’t have to request capex to deploy infrastructure and wait for this to happen. You can
just consume at will what you need. But you must understand the cost implications of this approach to minimise unexpected bill shock and this
places more self responsibility and discipline on managers, engineers and project leaders. We understand the financial parameters within
which we can leverage IaaS for service delivery and work within approved budgets. AWS pricing is well documented so you can make informed
decisions about the costs of the infrastructure you are creating.
18
Confidential – Not to be distributed outside of Tait Communications
Which of the Predicted Benefits Worked Out
and Which Did Not
19
• 
Agility - anyone, anywhere, anytime, any device, any platform, any browser.
• 
One fundamental goal has been to be able to perform service delivery with a number of systems
as effectively as possible to staff, partners and clients around the world. The Cloud is a great
platform to use for this in terms of time-to-market, accessibility and resiliency. Our experience
demonstrates that this has been a positive outcome.
• 
There are some views that the Cloud can simplify service delivery and this is true, however, but
it is easy to add complexity when integrating hybrid Cloud platforms, particularly around
connectivity. So while you maintain multiple service delivery platforms which includes public
cloud, private on-premise cloud and colocation you still risk a degree of process integration
complexity when connecting multiple environments together across international borders.
• 
Another positive has been the ability to utilise AWS infrastructure in different parts of the world to
bring some service delivery closer to end-users by leveraging AWS’s global network for access
(Route53) and content delivery (CloudFront).
Confidential – Not to be distributed outside of Tait Communications
What Surprised You About Moving to the Cloud
20
• 
The range of solutions available to be used as building blocks to facilitate a resilient platform for
service delivery.
• 
To date we have not seen any contention issues impacting on performance.
• 
Auto scaling - the ability to have an on-demand pricing model that allows you to deploy systems
using a thin provisioning approach to minimise costs. So you can turn on or off systems to
manage costs and/or meet demand using policies to auto scale the required infrastructure. This
is extremely useful for test & dev workloads that are not required 24x7 and quiet periods on
production systems. AWS provides the infrastructure to facilitate auto scaling, but this can still
be impacted by traditional budget, product licensing and product functionality constraints.
Confidential – Not to be distributed outside of Tait Communications
What Lessons Did We Learn for Others Starting on this Path
21
• 
Be very clear about the business problem you are trying to solve to ensure that the Cloud is appropriately aligned with your strategic
direction and security policy.
• 
Understand issues around your intellectual property and data sovereignty requirements and match those with your security policy which
may dictate on-premise service delivery or at least using a local data centre to keep data in country.
• 
Consider the cost model. If your ICT budget is under pressure then some aspects of Public Cloud may not be appropriate.
• 
Consider your view on IaaS, SaaS or PaaS. While we use IaaS and SaaS be clear on which is relevant to you.
• 
IaaS will not necessarily simplify service delivery for your infrastructure team as there are still some common challenges, i.e. building
OS’s and integrating networks. This extends to traditional Change, Release & Configuration Management as well as Availability &
Capacity Management. You are still managing infrastructure.
• 
You may still need to provision your own tools to monitor the environment as the provided ones are for high level use only. You can
augment this with advanced tools from 3rd parties or roll your own open source tools.
• 
With one Cloud provider we did get caught out with some bill shock in relation to systems we had shut down but not deleted. In this
situation with AWS there is no charge but the policy of this other provider was to charge anyway and we got stuck with some unexpected
costs.
• 
Be conscious of the data that flows out of your AWS environment as this is charged. Generally it is not a significant cost, but if something
goes wrong you don’t want unexpected and excessive costs.
Confidential – Not to be distributed outside of Tait Communications
What Lessons Did We Learn for Others Starting on this Path
• 
• 
Security when selecting a cloud service provider
• 
Tait is working toward ISO27001 certification and we are applying these principles whenever we are investigating potential
systems and vendors.
• 
When selecting a cloud service provider it is essential to research around the level of security provided. In a cloud environment
security depends on the level of trust and transparency.
• 
Trust about policies and procedures. To provide confidence on these, cloud service providers certify their data centres against
recognized international security standards such as ISO 27001, SSAE 16, etc and third party audits.
• 
Transparency is more about technical security controls in network architecture and design.
Security in AWS deployment
• 
In any cloud service model, responsibility of data security lies with the client not the service provider. Hence it is
essential to develop and deploy necessary processes for secure deployment.
• 
We use SSL certificates in all situations as wells apply a policy of securely hardening all systems in the cloud without
exception.
• 
• 
A good thing with AWS is that we can do vulnerability assessment or penetration testing on our systems. (to conduct a
vulnerability test on AWS systems, we need to take prior permission from AWS).
Security in Operation
• 
22
AWS trusted advisories provide information on security of the AWS environment. These also provide baselines of current
deployment in terms of performance, security and cost optimization.
Confidential – Not to be distributed outside of Tait Communications
Finally - Support from AWS / Fronde
• 
• 
• 
• 
23
We have chosen AWS as our preferred cloud service provider.
AWS themselves have been very supportive of what we have been doing
with their infrastructure.
We attend their lunch and learn sessions in Christchurch.
With support from Fronde, AWS have been available for on-site workshops
to helps us understand how their building blocks can facilitate service
delivery.
Confidential – Not to be distributed outside of Tait Communications