vesper lamp stack containers
TRANSCRIPT
VESPER
Copyright © 2015 Opex Labs India LLP 1
A light-weight container framework
LAMP Stack Containers
LAMP Service Provider Challenges
Copyright © 2015 Opex Labs India LLP 2
Existing LAMP stack servers are under utilized
VM or Physical servers
Maximize returns from existing server resources
Do not want to provision new VM
Could not provide dedicated LAMP stack per tenant
Tenant owners cannot start or stop services (Web server, MySQL)
No dynamic load balancing of resources per tenant
SLA based CPU, Memory and DISK IO allocation
Do not want to disturb existing installation
ZERO downtime cannot afford to bring down existing services
Existing LAMP Stack
VESPER LAMP Stack Containers
Copyright © 2015 Opex Labs India LLP 3
Tenant – A
Web Container
Apache Server
Hostname
IP Address
Disk Space
SSHD, SFTPD
10% CPU,
1GB MEM
10% IOPS
Apache Server
Hostname
IP Address
Disk Space
SSHD, SFTPD
20% CPU,
2GB MEM
20% IOPS
VESPER VM/Server-2
VESPER
MySQL
Hostname
IP Address
Disk Space
SSHD, SFTPD
10% CPU,
1GB MEM
10% IOPS
MySQL Server
Hostname
IP Address
Disk Space
SSHD, SFTPD
20% CPU,
2GB MEM
20% IOPS
Tenant –B
Web Container
Tenant – A
MySQL Container
Tenant – B
MySQL Container
VM/Server-1
VESPER light-weight container
with optional SSHD & SFTPD
service with dynamic resource
allocation policies over existing
LAMP stack with ZERO
Downtime
Manage it using
existing tools such as
CPanel as a separate
host
VESPER
Existing MySQL
Can have
different
Version of
MySQL
server
within
contianer
Tenant owner can bring
down all the services
within their container,
VESPER LAMP Stack Containers
Advantages
Copyright © 2015 Opex Labs India LLP 4
ZERO down time
No impact on existing LAMP stack configurations
Isolated LAMP stack container creation in seconds
Allocate separate hostname & IP address per container
Dynamically configurable resource allocation policies
Tenant owner can stop/start services within containers
No SUDO privileges required for tenant owners
Integrates with existing management & monitoring
solutions
Complies with standard Linux security policies