The Challenges Of Multi-tenancy

The Challenges of Multi-tenancy

Regarded as one of the most important features of cloud computing, multi-tenancy is a key common attribute of both public and private spaces. It applies to all three layers of a cloud (IaaS, PaaS and SaaS) and refers to a software architecture design in which a single instance of a software application serves multiple customers.

Multi-tenancy architecture has many benefits over multi-instance architecture. It is often cheaper to run thanks to software development costs and maintenance costs being shared, updates are faster because the provider only has to make the changes once, and it is easily scalable. Nonetheless, challenges of running software for a large number of tenants still presents problems – what are they?

Multi tenancy cloud security

multi tenancy cloud

Software providers will naturally argue that their software is protected with the highest level of security available and that a company’s data is more secure than ever on their servers. Nonetheless, there is a scope for human error, where a database administrator accidentally grants access to an unauthorized person or contravenes the security policy of an organisation.

There is also the threat of hackers – no matter how secure an encryption is it can always to broken with the right knowledge. A hacker who breaks the encryption of multitenant database will be able to steal the data of hundreds of businesses who have data stored on it.

Capacity Optimization

Database administrators need the tools and the knowledge to understand which tenant should be deployed on which network in order to maximise capacity and reduce costs. This is process is further complicated by the need to continuously align capacity with business demand and requires providers to manage the actual and forecasted resource utilization for all their servers.

Service Delivery and High Availability

When failures occur or when certain services generate abnormal loads the service delivery can be interrupted – yet business clients will often request high-availability, typically 99.999 percent. Therefore, monitoring the service delivery and its availability is critical to ensure that the service is properly delivered and meeting SLAs. Without effective monitoring problems are hard to locate and downtimes are increased – often leading to lost revenue.

Monitoring

According to Librato CTO and co-founder Joseph Ruscio, “modern IT environments are incredibly dynamic and their operators require sophisticated alerting capabilities”. He believes effective monitoring can be the solution for successfully managing the ever changing IT landscape and thus many of the challenges of multi-tenancy.

Ruscio’s company, the San Francisco-based Librato, offers clients a secure, stable and resistant platform that has been optimised for time series data analytics. It allows users to see all the metrics that are required to track the health of web-scale applications and consequently enables them to quickly find the cause of unexpected patterns and events. Their software accepts both a company’s operational metrics and its other additional metrics by using a REST API, and presents all the information in a web-based application that is highly-detailed and easy-to-use.

Indeed the company has recently launched a brand new alerting platform that they hope provide a framework for industry-leading new features. Amongst other features, users can now be alerted on application-level SLAs, on when a source stops reporting and on when all data-points in a given duration exceed a threshold.

Librato is rapidly becoming one of the ‘must-haves’ of multi-tenant architecture monitoring – a view echoed by Scott Turnquest, application developer at ThoughtWorks. He says, “Librato is one of the most important live dashboards that we have running in our team room. By watching out for particular trends, we’re usually able to be proactive about issues before they affect customers”.

Turnquest’s quote undoubtedly highlights the key reason for using an effective monitoring solution – addressing problems before they reach the customer. It means less downtime, reduced costs, improved client feedback, a better reputation in the market place, and improved business prospects long term. Ultimately, a high quality cloud monitoring tool such as Librato will aid administrators of multi-tenant architecture improve its security, capacity optimisation, service delivery, and high availability by helping them to configure problem detection and to do root-cause analysis. 

What do you think are the challenges of multi-tenant architecture? What about solutions? Do you use an effective monitoring tool?

Post Sponsored By Librato

By Daniel Price

Holiday Access.png
It’s Magic
The Sticky Note.png
Data Bed.png
Matrix
When sci-fi films like Tom Cruise’s Oblivion depict humans living in the clouds, we imagine that humanity might one day leave our primitive dwellings attached to the ground and ascend to floating castles in the ...
Gilad David Maayan
What Is SSPM? SaaS Security Posture Management (SSPM) is a set of security tools that an organization’s security team can use to gain visibility and manage security for their Software as a Service (SaaS) applications ...
Drew Firment
Here’s How to Make Sure Your Skills are Cloud Ready This year will be a period of meteoric growth for the cloud industry. Research from Gartner suggests that global spending on public cloud services in ...
Security Breach 10 Useful Cloud Security Tools
Cloud Security Tools Cloud providing vendors need to embed cloud security tools within their infrastructure. They should not emphasize keeping high uptime at the expense of security. Cloud computing has become a business solution for ...
Rakesh Soni
5 Common Myths About Cloud Computing Cloud computing has offered new horizons to businesses embarking on a digital transformation journey. However, no matter how appealing, it’s also a reason to worry. With cloud computing, businesses ...
  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.