Google Dumps Custom Linux In Favor Of Debian For App Engine

Google Dumps Custom Linux In Favor Of Debian For App Engine

Google Dumps Custom Linux in Favor of Debian for App Engine

Google has made the switch from its own custom version of Linux, which they called “Google Compute Engine Linux” to more standard and generic, Debian Linux for App Engine. The switch syncs with the announcement of Debian 7.0 codenamed “wheezy” which brings significant new improvements and bug fixes as pushed by the community. The switch was announced last week on the Google App Engine blog. Google’s support for a standard version of Linux would ease down on compatibility issues and also increase its user base.

In addition to other benefits of the switch, Google will also tap into the massive Debian community which can now easily migrate their applications and solutions onto Google App Engine without going through nightmarish migration and compatibility procedures. According to Jimmy Kaplowitz wgoogle-app-engineho is a site reliability engineer at Google and a Debian developer, “We (Jimmy’s team) are continually evaluating other operating systems that we can enable with Compute Engine”. This statement suggests continuous lookout for more OS which may be a good fit, both from the technical and business perspectives, for the App Engine. Apart from Debian, Google also has support for CentOS which is the derivative of RHEL (Red Had Enterprise Linux) and perhaps the second most popular Linux distribution after RHEL in the enterprise world.

Even though Debian is not the first Linux distribution which supported the Cloud, it still stands out as a stable and secure distribution. The latest release, 7.0 “wheezy” comes out with improvements which are vital for deployment on any Cloud environment. Some of these include:

  • Support for OpenStack suite as well as XCP (Xen Cloud Platform) which gives users a choice to deploy their own cloud infrastructure. This will definitely be attractive for Google since there’s a momentum being built around OpenStack within the Cloud infrastructure community. In addition to using Debian on App Engine, you can also deploy your own private Cloud using Debian, thanks to its tight integration with OpenStack and XCP.

  • Support for s390x which is the 64-bit port of IBM System z machines

  • Stable support for 32/64 bit machines

  • Full Disk Encryption using geli. This is important, if not vital for any serious enterprise deployment.

  • A massive addition of around 12,800 new packages bringing the total to 37,493 packages which is by far, the highest number of packages available in any Linux distribution. One of the motivations behind this push for new packages was to get the status of “Universal Operating System”.

In order to ease the migration and deployment of your application stack on App Engine, Google has created its own Debian package mirror which may be used by Google compute engine Debian instances. Debian is definitely a pleasant addition to App Engine and indicates a move towards a standards based Cloud platform by Google.

By Salman Ul Haq

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…