Cloud Data Migration: What An ISV Needs To Know

Cloud Data Migration: What an ISV Needs to Know

Cloud Data migration is not new to ISVs. Data conversion from legacy systems during new implementations is common and so is the data migration during major upgrades. ISVs adopt either manual methods or proprietary tools or resort to sophisticated ETL tools for this important step of a customer implementation project. However things change drastically when a customer is moving to cloud and the on premise data needs to be moved to the cloud. ISVs need to know and prepare for the following in their data migration solutions for their customers moving from on premise to cloud.

Storage selection: This happens actually much before the data migration and needs to be considered while designing the cloud architecture of their products. Cloud vendors offer multiple storage options. For example take S3, Simple DB and RDS offered by Amazon. While RDS is good for web apps, S3 is suitable for large media files and Simple DB is the best option for query-able light weight attribute data. Selecting the right storage simplifies data migration later during customer on boarding.

Data location:  On premise data migrations allow you to specify the target storage and path. However, in the case of the cloud, unless you ask for it you have no control over where your data will reside.  Hence while selecting a cloud vendor it is important to check whether they allow and facilitate this choice. Customers might have compliance reasons to insist on data location within a region and not having a strategy in place could mean loss of business.



Data selection:  It is critical to plan for the data to be migrated.  There could be multiple reasons for keeping part of the data on premise. These could be data sensitivity, archived data or a hybrid cloud model. What are really important are the data extraction strategy and the tools which can apply the filters e.g. attribute based, selection table based or aggregation function in SQL to extract the appropriate data.

Multi tenant data transformation:  Degree of multi tenancy plays an important role in data migration strategy. If it is separate database tenancy migration, it’s simple. If it is shared database but separate schema most of the ETL tools support it. But the challenge comes when it is a shared schema model tenant id which has to be passed at the record level. Run of the mill ETL tools will not support this and the ISV needs to prepare a solution well in advance before moving to shared schema multi tenancy.

Data loading strategies: There are multiple options like direct loading, Simple APIs or workflow based APIs.  Simple APIs check for data model failures or non compliance but in a multi tenant cloud there could be tenant specific data model extensions and APIs need to work with these. Similarly workflow based APIs run pre determined workflows and throw up pre defined errors in case of deviations. One needs to develop these APIs before hand as a part of the migration strategy.

Migration verification:  The standard method of on premise migration verification is to verify whether all attributes of selected objects are migrated. This poses challenges in cloud. Unlike on premise relational targets cloud storage do not yet support strong SQL querying capabilities. So the standard top down, bottom up equivalence or bottom-up fingerprint techniques do not work as is. And thus for verification, custom solutions need to be built before hand. While this post does not cover specific solutions, ISVs would benefit to use these as a checklist in their cloud migration strategy.

By Milind Khirwadkar, AVP Cloud Services, Symphony Services

Symphony Services is a leading global specialist providing software product engineering outsourcing services. The company’s focus on Engineering Outcome Certainty™ drives R&D results that shorten time-to-market for new products and delivers greater innovation to compete in a global marketplace. Independent software vendors (ISVs), software enabled businesses and companies whose products contain embedded software partner with Symphony Services to achieve their business goals.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

Four Trends Driving Demand For Data Security In 2017

Four Trends Driving Demand For Data Security In 2017

Data Security Trends 2017 will be a hallmark year for security in the enterprise as all industries have reached a tipping point with respect to cloud and mobile adoption, forcing more and more data beyond the corporate firewall. Over 100 IT executives weighed in on their plans for 2017 in our latest survey; buried among…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…