How to Build a Private Cloud

How to Build a Private Cloud

Despite it being so easy to just hook into the public cloud by going to Google, Amazon, Microsoft and other public cloud vendors, a private cloud offers a bit more control to your virtualization and automation efforts. Many people have already tried it and posted up how they did it and all of them have mentioned the headaches and migraines that are in store for you. The main reason this is so, is because there is no one set way to build a private cloud, although there are some attempts currently underway to do so (OpenStack, etc.). At best most private clouds are something cobbled together by the IT staff and glued or duct taped in certain places with VMware or some other Virtualized solution. As such, this is in no way a definitive guide on how to build a private cloud but it does attempt to provide a “one method fits all” approach for those looking to build a private cloud. I will use a typical ADDIE process to outline it as below:

  • Analysis – Take a good hard look at your current infrastructure. If you already have a datacenter then you’re well set to continue on the next step, but if you don’t then perhaps other alternatives should be considered. A private cloud is not an easy thing to implement on the whole but studies have shown that SMBs (most of whom do not have datacenters) have the easiest time of adopting a Cloud infrastructure. Take stock of what you have, what people need the most and how a Cloud infrastructure will deal with this. Do some feasibility tests, re-affirm what everyone uses to glue the network together and ask everyone in the company how willing they are to share resources with each other. In short, find out what your needs are and how building a private cloud will solve them.
  • Design – After the analysis stage you can map out a possible private cloud using the method which will cause the least amount of change as possible or the path of least resistance. This is because the easiest path to adopt would be the one more likely to succeed. If you’re using a linux-based server to maintain a network of similarly Linux or Ubuntu based machines then going wholly Ubuntu with VMWare Fusion is one of many good ideas or approaches. For those more entrenched in Microsoft products, going with Windows Server 2008 R2 SP1 and System Center Virtual Machine Manager 2012 RC would perhaps be a better idea. Likewise if you are not running or do not intend to run any virtualized applications then perhaps all you need is an easy to access Cloud storage solution so that the people in India or the Philippines can see the spreadsheet file you were working on, then iSCSI or NAS based private cloud would be enough. People are less likely to make the move to Cloud adoption if it means having to totally abandon how they are used to working already. Make it seem that business will go on just like usual (except on a virtual machine) and you’re set for the next step. From my personal experience this could be finding a virtual application that is the most similar to the application that everyone is using to do their work. Do not forget about security and you’re all set.
  • Development – Research your solutions and try them out. If you have the CEO’s backing then you have more drive behind you (and more impetus to make sure it is successful) but different sections of a company are less likely to support you than most. The marketing department will mostly be indifferent but the financial department won’t want to share at all. Find the best and most complete solution at this stage so that when you do the roll out or try to convince everyone else, you will have proven results and numbers to back you up. Consider the best way to do automation of services here and how much easier it will make make life for everyone. If you’ve got everyone convinced and signed memorandums of understanding between departments then you’re all set for the next step.
  • Implementation – This is basically the roll-out of your private cloud. Provide ample training, documentation and face-to-face consultation on how to use applications and it should actually be the easiest step of all. There will be teething problems, but there will also always be workaround solutions for any problems or issues you might encounter.
  • Evaluation – Things do not stop once implementation has been successful as you now need to make things better. Evaluate your private cloud and streamline processes as you see fit. The smoother a process flow is, the better. Tighten up security and get ready for the next evolution.

Bear in mind that this is just a generalization of the overall processes required to build a private cloud. Personally, I don’t recommend it, as public cloud is a lot easier to implement. However, 2012 could well be the year for hybrid clouds (mix of private and public) to rise, so knowing how to build a private cloud could be something your CEO lays on your platter to investigate as part of this.

By Muz Ismail

Sorry, comments are closed for this post.

Comic
SWIFT Says Bank Hacks Set To Increase

SWIFT Says Bank Hacks Set To Increase

Bank Hacks Set To Increase SWIFT, whose messaging network is used by banks to send payment instructions worth trillions of dollars each day, said three clients were hacked over the summer and cyber attacks on banks are set to increase. The theft of $81 million in February from Bangladesh’s central bank using SWIFT messages rocked…

Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

The Lighter Side Of The Cloud – Data Merge

The Lighter Side Of The Cloud – Data Merge

By Christian Mirra Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

The Rise Of Threat Intelligence Sharing

The Rise Of Threat Intelligence Sharing

Threat Intelligence Sharing  Security has been discussed often on CloudTweaks and for good reason. It is one of the most sought after topics of information in the technology industry.  It is virtually impossible to wake up and not read a headline that involves the words “Breached, Hacked, Compromised or Extorted (Ransomware)“. Included (below) is an…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Four Keys For Telecoms Competing In A Digital World

Four Keys For Telecoms Competing In A Digital World

Competing in a Digital World Telecoms, otherwise largely known as Communications Service Providers (CSPs), have traditionally made the lion’s share of their revenue from providing pipes and infrastructure. Now CSPs face increased competition, not so much from each other, but with digital service providers (DSPs) like Netflix, Google, Amazon, Facebook, and Apple, all of whom…

Cloud Infographic – Big Data Analytics Trends

Cloud Infographic – Big Data Analytics Trends

Big Data Analytics Trends As data information and cloud computing continues to work together, the need for data analytics continues to grow. Many tech firms predict that big data volume will grow steadily 40% per year and in 2020, will grow up to 50 times that. This growth will also bring a number of cost…

Cloud Infographic: The Future of File Storage

Cloud Infographic: The Future of File Storage

 The Future of File Storage A multi-billion dollar market Data storage has been readily increasing for decades. In 1989, an 8MB Macintosh Portable was top of the range; in 2006, the Dell Inspiron 6400 became available, boasting 160GB; and now, we have the ‘Next Generation’ MacBook Pro with 256GB of storage built in. But, of course,…

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing Despite the rapid growth of cloud computing, the cloud still commands a small portion of overall enterprise IT spending. Estimates I’ve seen put the percentage between 5% and 10% of the slightly more than $2 trillion (not including telco) spent worldwide in 2014 on enterprise IT. Yet growth projections…

Why Small Businesses Need A Business Intelligence Dashboard

Why Small Businesses Need A Business Intelligence Dashboard

The Business Intelligence Dashboard As a small business owner you would certainly know the importance of collecting and analyzing data pertaining to your business and transactions. Business Intelligence dashboards allow not only experts but you also to access information generated by analysis of data through a convenient display. Anyone in the company can have access…

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations Everyone knows what the cloud is, but does everybody know where the cloud is? We try to answer that as we look at some of the most unusual data centre locations in the world. Under the Eyes of a Deity Deep beneath the famous Uspenski Cathedral in the…

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology Profiling 600 companies and including 553 supporting tables and figures, recent reports into the M2M, IoT and Wearable Technology ecosystems forecast opportunities, challenges, strategies, and industry verticals for the sectors from 2015 to 2030. With many service providers looking for new ways to fit wearable technology with their M2M offerings…