Redundant server architectures from E2E Networks

Redundant server architectures from E2E Networks

Introduction

Single point of failure (SPOF) is a part of a system, that if it fails, will stop the entire system from working. To overcome SPOFs, High Availability architecture is deployed into web based environments. High Availability(HA) refers to a system  that is continuously operational for a desirably long length of time. It is key to any web based environment as it provides continuous operation of the system even in the case of a hardware failure.

Here is a list of architectures, all of which provide High Availability, great redundancy and seamless performance.

High Availability architecture

first-level

Load balancing stage

Load balancers are added to a server environment to improve performance and reliability by distributing the workload across multiple servers. If one of the servers that is load balanced fails, the other servers will handle the incoming traffic until the failed server becomes healthy again. All the web servers are continuously synced with each other in real time through LSYNC.

Master/slave database structure

One way to improve performance of a database system that performs many reads compared to writes, is to use master-slave database replication. Master-slave replication requires a master and one or more slave nodes. In this setup, all updates are sent to the master node and reads can be distributed across all nodes.Master DB has read/write setup whereas the slave DB is read only.

Pros

  • Enables the user with horizontal scaling, i.e. processing capacity can be increased by adding more servers to it.
  • High Availability due to reduced Single Point of Failures (SPOFs), which is achieved by adding a redundant load balancer.

 High Availability architecture with VPN

This architecture is similar to the previous architecture in every way except that a Virtual Private Network (VPN) gateway is provided to access the servers.

first-level-vpn

Virtual Private Network(VPN)

A virtual private network (VPN) appliance is provided to ensure greater security over shared networks along with firewall protection, authentication, authorization and encryption. This ensures that the data always flows in an encrypted form providing better security from hacks.

Pros

  • Enhanced security. When user connects to the network through a VPN, the data is kept secured and encrypted.

High Availability architecture with DRBD setup for MySQL

DRBD (Distributed Replicated Block Device) is a Linux-based software component that facilitates the replacement of shared storage systems by networked mirroring. Network mirroring enables the user to copy all files and data from one web server to another web server so that the site or files are available from more than one place. DRBD makes it possible to maintain consistency of data among multiple systems in a network.

For example, in case of a DB failure there is a permanent loss of stored data. To overcome this issue, DRBD system replicates or mirrors the data instantly to lower level block device which allows the user to access and store data into multiple devices.

second-level

 Pros

  • Prevents failure in shared storage resources  without causing service interruption.

High availability architecture with Delayed replication

In addition to the previous architecture with DRBD, Delayed slave DB is added to the system for delayed replication.

second-level-delayed

Delayed replication

Delayed replication allows specifying that a replication slave should lag behind the master by at least a specified amount of time specified in seconds.

For example, before executing an event, the slave will first wait, if necessary, until the given time has passed since the event was created on the master. The result is that the slave will reflect the state of the master some time back in the past. This becomes really helpful and significant in worst case situations when the database is overwritten or deleted completely.

Pros

  • Protects against user mistakes on the master. A DB can roll back a delayed slave to the time just before the disaster.
  • To test how the system behaves when there is a lag.
  • To inspect what the database looked like long ago, without having to reload a backup.
    • Related Articles

    • E2E Networks payment options

      How to pay E2E via NEFT or RTGS ? (Indian banking system transfer methods usually available via netbanking) Name of Account  : E2E Networks Private Limited Account Number  : 08401131001775 Account Type        : Current Account Bank Branch         : ...
    • Create and activate E2E Networks account

      E2E Networks My account portal E2E Networks My account portal lets you access and manage your E2E Virtual Compute Nodes through a simple and intuitive web-based user interface. My Account portal is a one-stop platform for E2E Networks that holds all ...
    • Server Migration/Plan Upgrade

      Server Migration/Plan Upgrade, the idea is to transfer all the data from existing server to the new server. There are 2 scenarios in the Server migration/Plan Upgrade process, A. Server migration/Plan Upgrade with IP change. B. Server migration/Plan ...
    • SQL Server Installation

      To set up SQL Server Installation for a 32 bit system go with the link given below http://www.microsoft.com/download/en/details.aspx?id=29066 As like you can get the link as per system requirement for 64 bit system also. ...
    • Fixing a compromised server

      Overview This article discusses why a server might be hacked, how it can be hacked and suggestions for securing your server. An exploited server is no longer fully under your control. Someone else is now partially controlling your server and using it ...