Google Dumps Custom Linux In Favor Of Debian For App Engine

Google Dumps Custom Linux In Favor Of Debian For App Engine

Google Dumps Custom Linux in Favor of Debian for App Engine

Google has made the switch from its own custom version of Linux, which they called “Google Compute Engine Linux” to more standard and generic, Debian Linux for App Engine. The switch syncs with the announcement of Debian 7.0 codenamed “wheezy” which brings significant new improvements and bug fixes as pushed by the community. The switch was announced last week on the Google App Engine blog. Google’s support for a standard version of Linux would ease down on compatibility issues and also increase its user base.

In addition to other benefits of the switch, Google will also tap into the massive Debian community which can now easily migrate their applications and solutions onto Google App Engine without going through nightmarish migration and compatibility procedures. According to Jimmy Kaplowitz wgoogle-app-engineho is a site reliability engineer at Google and a Debian developer, “We (Jimmy’s team) are continually evaluating other operating systems that we can enable with Compute Engine”. This statement suggests continuous lookout for more OS which may be a good fit, both from the technical and business perspectives, for the App Engine. Apart from Debian, Google also has support for CentOS which is the derivative of RHEL (Red Had Enterprise Linux) and perhaps the second most popular Linux distribution after RHEL in the enterprise world.

Even though Debian is not the first Linux distribution which supported the Cloud, it still stands out as a stable and secure distribution. The latest release, 7.0 “wheezy” comes out with improvements which are vital for deployment on any Cloud environment. Some of these include:

  • Support for OpenStack suite as well as XCP (Xen Cloud Platform) which gives users a choice to deploy their own cloud infrastructure. This will definitely be attractive for Google since there’s a momentum being built around OpenStack within the Cloud infrastructure community. In addition to using Debian on App Engine, you can also deploy your own private Cloud using Debian, thanks to its tight integration with OpenStack and XCP.

  • Support for s390x which is the 64-bit port of IBM System z machines

  • Stable support for 32/64 bit machines

  • Full Disk Encryption using geli. This is important, if not vital for any serious enterprise deployment.

  • A massive addition of around 12,800 new packages bringing the total to 37,493 packages which is by far, the highest number of packages available in any Linux distribution. One of the motivations behind this push for new packages was to get the status of “Universal Operating System”.

In order to ease the migration and deployment of your application stack on App Engine, Google has created its own Debian package mirror which may be used by Google compute engine Debian instances. Debian is definitely a pleasant addition to App Engine and indicates a move towards a standards based Cloud platform by Google.

By Salman Ul Haq

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your content in the cloud is dangerous. The truth is that top tier cloud storage is more secure than most organizations’…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of your control. But in order to effectively provide quality services with the focus on the customer, providers need to ensure…

Identity and Access Management: Advancing to Meet the Changing Needs of Passwords and Governance

Identity and Access Management: Advancing to Meet the Changing Needs of Passwords and Governance

Identity and Access Management The identity and access management market continues to grow in a wide variety of industries of all sizes. As has been much discussed in many headlines, this is primarily because of three main reasons: 1) It is much more cost effective to implement than in past years; 2) Solutions can be implemented fairly quickly, and 3) Companies have realized the great benefits IAM solutions bring to their organization. As the IAM…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure is quickly becoming a thing of the past. In fact, the cloud has become so ingrained in the fabric of…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring revenue, here are four essentials to guide your way: All Revenue Will Become Recurring Revenue. Perhaps not this week or…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more frequently what you are really looking at is more like death by a thousand cuts. Cloud makes this easy to…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping for the best. On the flipside, opening the hood and checking if policies or regulations are being respected means you…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars years after their intended lifespan is because the correctness of their software was mathematically verified before deployment. Similar trusted 24/7/365…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to being a mission-critical component, BODs are also becoming more interested in what their organizations are doing to plan their incident…