07 Oct

Deploy a WordPress Site in Minutes with Turnkey Linux

WordPress as a CMS (content management system) owes its popularity to the fact that it’s rich suite of tools and simple UI empowers more people to build websites. With tools like a web-based GUI, visual code editors, plugins from popular vendors, shopping carts, and SEO tools, WordPress is a one-stop-shop for site creation and management tools.

But, because WordPress is not a completely vendor-controlled CMS like some of its competitors, it relies on the user providing their own server to run WordPress on. To set up a WordPress site you will need to install a LAMP stack to your server. That stands for Linux, Apache, MySQL, and PHP. These contain all the tools needed for WordPress to run. Once your server is configured, you likely won’t be using it much because of the WordPress online GUI. But setting up a WordPress server can be challenging if you’ve never done it before. Servers usually lack a GUI which means you will be only be using the terminal to install all this software.

Luckily, there’s an easier way. ZebraHost’s cloud now supports Turnkey Linux for WordPress. This takes all the hard work out of setting up and configuring your WordPress server. Simply download the Turnkey Linux WordPress image, configure your server specs, and boot up your server. From there, a set of prompts will guide you through configuring credentials for your server account, database, and WordPress. Once your server is completely configured, input the URL the server provides into your browser and you will have access to your WordPress site!

Below is a detailed walkthrough on how to get set up on WordPress with Turnkey Linux.

How to Setup a WordPress Site with Turnkey Linux

Step 1: Download the Turnkey Linux WordPress Image

The first step is to download the Turnkey Linux WordPress image from your tenancy. For more a more detailed article on how to get to this step please review our guide on getting familiar with Turnkey Linux Here.

Once the image is downloaded properly you will see a green light and the image will say its “online”. If your image is online, you are good to move forward.

Step 2: Create New Server from a Recipe

In the sidebar, you will see “New From Recipe”. Click it. This will bring you to the page to start configuring your server.

Create a New VM Recipe
Create a New VM Recipe

Step 3: Configure Your Server

At this stage, you will configure your server. The recommended specs for a basic WordPress site are 1 core and 512 MB of RAM. However, you have some flexibility here and can certainly increase these specs if you think your site is going to experience heavy traffic or host a lot of media like images and videos.

After choosing your basic specs leave the Cluster as “Default” and switch Network to “External”.

ZebraHost Hypervisor Server Configuration
ZebraHost Hypervisor Server Configuration

Step 4: Boot Your Server

Once your server is configured you will need to boot it up. In the upper right-hand corner, you will see a button that looks like a play symbol. Click it to boot your server.

From here your server will be booted, but to continue configuring your server you will need to access the terminal by clicking the terminal button in the same location.

Press Play Button to Boot Up Virtual Machine
Press Console Button (>_) to View Your Server in the Browser Window

Step 5: Credentials

When your server boots successfully you will be greeted with a prompt in the terminal to start configuring your passwords for the following:

•             Root Account

•             MySQL Admin

•             WordPress

Follow through with these prompts (and remember to write down any credentials) to have your server configured.

Configuring Server Passwords in Turnkey Linux Server
Configuring Server Passwords in Turnkey Linux Server

Step 7: Configuring the “extras”

Once you’ve configured your logins you will be prompted for a few extra optional features like email notifications, turnkey backups, and security updates. The prompts will explain these in detail then give you the option to either accept or decline.

Configuring 'Extras" in Turnkey Linux Server
Configuring ‘Extras” in Turnkey Linux Server
Configuring "Extras" in Turnkey Linux Server
Configuring “Extras” in Turnkey Linux Server

Step 8: Installation

When all your settings and passwords are configured, the script to install WordPress and all its dependencies will start. This will take a minute so you can sit back and let the server do the work.

When the installation is finished you will be prompted to provide WordPress login details.

Note! The login that is being requested is for the server itself, not your WordPress account. The username will be root and whichever password you chose for your root account.

WordPress Installing on Turnkey Linux
WordPress Installing on Turnkey Linux

After your server was initially setup you should have received a URL to access your WordPress site and admin account from a browser. If you skipped over this step and forgot your URL you can type the following command to view it.

Command to see URL: `confconsole`

Example URL For Site: http://10.1.150.4

Example WordPress Admin URL: http://10.1.150.4/wp-admin

Type one of the above URLs in your browser address bar to either view or configure your WordPress website.

WordPress Default Page
WordPress Default Page
WP Admin Login Page
WP Admin Login Page

If you see the default WordPress theme (or the admin login prompt) congratulations! You’ve successfully deployed a WordPress site with ZebraHost and Turnkey Linux! Although you now have an up and running site there is still more to do. To have a proper site, you will need to choose a WordPress theme, install plugins, and publish content. But all this can be outside the server. When you’re ready to launch your site you will need to choose a domain name and install an SSL certificate. And ZebraHost would be happy to help! Please visit our site to browse for domain names and see our SSLvendors. If you would prefer to speak with a person just call our Sales lines and a team member will assist you.

Share this
06 Oct

Deploy Quickly With Turnkey Linux!

What Makes Us So Excited to Offer Turnkey Linux?

For those that like to be “hands-on” with their ZebraHost tenancy and spin up servers within their hypervisor, we have some great news! Turnkey Linux is now live on our cloud and it will save you a ton of time spinning up servers for a variety of purposes.

                Turnkey Linux is a set of images that are pre-configured for a particular application like WordPress, Drupal, OpenVPN, and more. It allows you to download a server image with a precompiled script that will automatically install these programs at boot. So, for example, if you need a WordPress site, all you will have to do is go into your ZebraHost Tenancy, download, and boot a virtual machine from a Turnkey Linux WordPress image.

                Here’s what makes us so excited to offer Turnkey Linux. Other than being able to install and run an application in a matter of just a few clicks, Turnkey Linux offers TONS of images to choose from. They actually have a website where you can view all their images. And they have an image for almost any need. Need to build a website? There is a Turnkey Linux image for that. Need to run a VPN? There’s an image for that. Need to run a Minecraft server? Believe it or not, there’s even an image for that. We’re excited because it allows us to bring you a convenient way to have more control over your tenancy and use our cloud for multiple purposes all while having complete control.

View all turnkey Linux images here.

                Our cloud-only comes pre-configured with a small selection of Turnkey Linux images as of right now. You will find scripts like WordPress, Drupal, node.js, MySQL, and a few more that we think you will find use in. But what makes our cloud special is that you can simply download a Turnkey Linux image from the website and upload it to our cloud yourself. Or, you can ask us to upload it for you. This means that even if an image isn’t already available on our cloud if its offered by Turnkey Linux, we can get it going for you!

                Finally, if you aren’t a fan of the idea of spinning up your own servers based on Turnkey Linux, we would be happy to do it for you. Simply let us know what specs you want and what program you would like us to install. From there, we would hand off the credentials so you can use it like any other server.

How to Deploy with Turnkey Linux in ZebraHost

Deploying any Turnkey Linux application with ZebraHost is easy. It just takes a few clicks to provision a fully setup server for popular applications. You can use the following guide to deploy any turnkey Linux image on our cloud. Simply follow the steps below.

Step 1: Login to your ZebraHost tenancy.

You should have your password, username, and URL to access your hypervisor. If not, please contact us so we can provide it for you. We can also provide a detailed walkthrough on how to access your hypervisor if needed.

ZebraHost Hypervisor
ZebraHost Hypervisor

Step 2: Accessing Your Virtual Machines

In your dashboard, go to Machines. This is where you will see and manage all your virtual machines. Alternatively, you can press the large icon that says “virtual machines” on your dashboard.

Step 3: Access Turnkey Linux Images

In the “Machines” section, you will want to look to the sidebar and find “VM Recipes”. This is where Turnkey Linux images, ISOs, and other install media will be located.

VM Recipes in Sidebar
VM Recipes in Sidebar

Step 4: Find the Proper Installation Media

Here you can browse all install media that have been added to our cloud. You can also add your own install media for things like Linux distros or Turkey Linux images as well.

But from the list you will want to locate the turnkey image you want to use. In this example I am going to use Drupal.

ZebraHost Hypervisor Install Media
ZebraHost Hypervisor Install Media

Step 5: Choose a Turnkey Linux Image

Highlight and double click the Turnkey Linux image. You will be brought to a screen to download the image. To save space, images are not downloaded by default so they will need to be downloaded and online before they can be used.  Simply click “Download” in the sidebar.

Turnkey Image Offline
Turnkey Image Offline

Once your image is downloaded, you will see a green icon showing that the image is “online”. This means that the image has successfully downloaded and can now be used to provision a server.

Turnkey Image Online
Turnkey Image Online

Step 6: Create a New VM Recipe

Now that your image is downloaded, without changing screens you will want to again look in the sidebar for “New From Recipe”. This will allow you to begin configuring the specs of your server.

ZebraHost Hypervisor New From Recipe
ZebraHost Hypervisor New From Recipe

Step 7: Configure Your Specifications

On this screen, you will choose the specs for your server. You should research carefully what specs you will need for a particular program. In this example, the specs I chose were for demonstration purposes and do not accurately reflect the specs required to run Drupal. But these specs would be fine for a WordPress site for example. After setting your CPU and RAM, you will want to leave Storage as “default” and change the Network to “external”.

VM Recipe Specs
VM Recipe Specs

Step 8: Start Your Server

When your server is configured, you will be brought back to the dashboard. From here, there will be a button in the upper-left corner that resembles a play button. Click it. This will boot your server. To view your server, you will then click the terminal button in the same position.

Step 9: Setup Your Server and Application

Within your server, you will likely run into installation prompts guiding you through setting up your server and application. Once this is done your program is ready to go!

That’s it! In just a few clicks Turnkey Linux has taken out many of the manual steps and installs required to get an application fully running on a server. This will allow you to deploy programs faster and more efficiently, especially if you required to work with multiple servers and applications.

Once your server is booted, there will typically be extra steps that are mostly guided by installation prompts to configure your application and server. These vary by the application so were not included in this guide. If you need further assistance for a specific program like WordPress please check out our other guides for more specific Turnkey Linux application installations.

Share this
19 Aug

Emby Server Windows Install

Emby is a media server service that allows users to create their own private server with ease. It works by providing a web client and apps for mobile devices and TVs that allow a user to stream a variety of content ranging from music, pictures, movies, and TV.

Though not as well-known as rival service Plex, Emby is a great alternative for those that prefer a more minimal interface.

This article is going to show you how to use Emby to set up a home server on windows.

Installation

Installation is very simple. Start by downloading the .exe package from Emby’s website. You will be greeted with multiple operating system choices and Windows is to the far left. Click “Download Emby Server”

Download Emby
Download the .Exe file

The program will download it and when you click to open the .exe file you will be brought to Windows installer. Follow the prompts to complete the installation process.

Downloading Emby
Downloading Emby

Start Emby

Once Emby is done downloading it typically leads the user to a webpage that allows the user to set up their server. If not, search for Emby in your start menu. When it starts it will be docked on your taskbar.

Right Click the Green Emby Logo

Right-click Emby to be given a menu of options and then click “configure Emby

You will be brought to a browser page that will give you different options to begin configuring your server.

After going through several prompts to configure Emby for usability, and detecting that it is running on your computer, you will then be asked to start setting up your server.

You will be brought to a browser page that will give you different options to begin configuring your server.

emby Welcome Screen
Welcome Screen

After going through several prompts to configure Emby for usability, and detecting that it is running on your computer, you will then be asked to start setting up your server.

Setting Up Your Server

Click the plus to add your current machine as a server.

Emby Add Server Screen
Add Server Screen

You will then type in your computer’s IP – if you don’t know this you can find how in the section below this one using the command console to find out.

Emby Add IP Address
Add IP Address

How to Find Your IP Address

To find out your IP on windows, you will first want to type CMD into your start menu search bar.

Type CMD in Start menu

Open the command prompt and type ipconfig

ipconfig command in  Windows Command Prompt
ipconfig

Scroll down until you see Default Gateway and that is your IP address

Windows displaying IP Address
IP Address Displayed

Setting Up Your Media Server

Once you’ve successfully entered your IP you are ready to start linking media folders to your account.

Click New Library to be brought to a page asking you to link a file path from your PC to Emby.

Emby add media library
Click + New Media Library

You will have several options for media to choose from such as music, movies, pictures, etc.

In this example, we are going to connect our Windows music folder.

When asked you to select a content type, choose music (or any media type you want to install)

Emby Add Content Type and Media Folder
Add Content Type and Media Folder

You will then be asked about miscellaneous options like which repositories you want to download album art and metadata from. We chose all of them for this example but feel free to customize based on your preferences.

Emby Media Metadata Settings
Media Metadata

Click the Folder + icon which will allow you to add your windows Music path. For our PC it was C:\Users\username\Music

A good way to check is to go to the folder where you store music. Right-click a song and you will see the location it is stored in. Input that location to Emby.

Emby Enter Media Folder Path
Enter Media Folder Path

Emby will quickly ask if you want to enable remote access on your server. Remote access will let you access your server beyond your home network. A good example of when this is useful is streaming music on your phone when you are outside your house and on cellular of another wi-fi network.

But if you only intend to use your server on your own home network it might be a good idea for the security and peace of mind to disable remote access. The choice is yours.

In our example we enabled remote access.

Emby Choose Whether or Not You Want Remote Access
Choose Whether or Not You Want Remote Access

Emby Interface

Now that you have Emby installed and configured you will be brought to the home interface.

Because we only set up the music folder so far, we are brought straight to the music player portion of Emby.

Here, any music that is added or deleted from our Windows music folder will be synced with Emby and displayed in this interface.

Emby Interface

In this example, the one song we have in our music folder from Windows is now on Emby.

Emby Media Successfully Syncing
Media Successfully Syncing

Adding a New Library

In this example, we only installed the music folder to start, but Emby will allow you to stream more than just music.

If you want to add multiple forms of media you will want to add another library.

To do this, go to your side bar and then click “Settings

You will then be brought to a list of different settings split into categories.

Go to Library to add New Media Library

Under “Library” click settings. You will then be brought back to a familiar screen which allows you to add libraries from your Windows Machine to sync with Emby.

Click +New Library

Click +New Library then simply select the type of media you want to sync from the dropdown menu.

Emby Add New Media Type and Folder
Add New Media Type and Folder

Conclusion

Emby offers a convenient and user-friendly platform to build your own media server for streaming. Users can start for free with limited functionality or upgrade to a monthly paid plan or one-time payment for a perpetual license to unlock all premium features.

Streaming media platforms like Plex and Emby are popular both as private on-premises home servers as well as a convenient solution to implement with a cloud hosting provider like ZebraHost.

Share this
12 Aug

Configure an Emby Server on Linux

What is Emby?

Emby is a media server service that allows users to create their own private server with ease. It provides a web client and apps for mobile devices and TVs that allow a user to stream a variety of content ranging from music, pictures, movies, and TV.

Though lesser known than Plex, Emby is a great alternative for those that prefer a more minimal interface.

This article is going to show you how to set up a home server with Emby on Linux

In this particular demonstration, we will be installing Emby on Ubuntu 19 “Disco Dingo”. If you use a different Linux distribution you can adjust any commands used or download a package installer for your particular distribution. Most steps will remain the same.

Install Method 1: Installing via GUI Package Installer

The first step is to go to Emby’s website.

Emby Homepage
Emby Homepage

As you can see, there are several different platforms you can download Emby for including Docker for those that want to use a container!

Select Linux and then choose your particular distribution. We are installing on Ubuntu 19 so we will choose Ubuntu X64 (Emby-server-deb_4.4.2.0_amd64.deb) and download it.

You will then be asked to either save the file or install it via the package manager. Install now with the package manager that Ubuntu comes pre-loaded with. When the program finishes installing it will be installed to the system.

Ubuntu built-in package installer
Ubuntu built-in package installer

As a note: Emby does not come with an app tray accessible shortcut. So it may not look like it is installed at first but if the install completed successfully, you will be able to access the web interface.

Emby functions through a web browser interface. To access the interface, use this link:

Interface Link: http://localhost:8096

Note: We recommend saving this link as a favorite in your web browser for easy access later.

After installing Emby you will be brought to a Welcome screen where you will begin to customize your server.

Emby Welcome Screen
Emby Welcome Screen

Install Method 2: Install via Command Line

First, download the Emby-server-deb_4.4.2.0_amd64.deb package from the website and then place it somewhere on your machine where it will be found by the terminal. In our case, we simply placed the package in our Home directory.

Type: sudo dpkg -i emby-server-deb_4.4.2.0_amd64.deb

sudo dpkg -i emby-server-deb_4.4.2.0_amd64.deb
sudo dpkg -i emby-server-deb_4.4.2.0_amd64.deb

Once you’ve successfully executed this command Emby should be installed on your system.

After Emby has been successfully installed, use (and save!) the link below to access Emby’s web interface.

Link: http://localhost:8096

Welcome Page and Settings

The first time you log in you will be brought to a welcome page to guide you through setting up basic settings.

Emby Welcome Screen

Emby Welcome Screen

You will then be brought to a page asking you to add a server. Here you will connect your IP for your machine.

Emby Add Server
Add Server
Emby Input host IP
Input host IP

If you do not know your IP, the next section will teach you how to find your IP using the terminal.

How to Find Your IP in Ubuntu

On Ubuntu, type the command:

ifconfig

This will bring up your IP. You are looking for the IP that looks the most like the one for your internet router. The number next to inet is the IP number you should use.

Find your IP on Ubuntu
Find your IP on Ubuntu

Sync Setup

After successfully entering your IP, Emby will register that machine as a server. It will sync the media folders you instruct it to with your Emby web interface and applications. This media can then be streamed to any device your account is logged into.

In this example, we will first set up the Emby server to sync with our Home Music folder.

Once all your information put in and your account is setup you will be brought to a prompt that asks you to begin syncing your first media library.

To do this click +New Library

Setup Media Library
Setup Media Library

In the example of music, you will be asked additional questions such as where you want metadata to be downloaded from, what language the metadata should be in, etc.

Connect media folders to Emby
Connect media folders to Emby

After filling this information out, go to Folder + where you will be asked which directory path you want to sync information from.

In this example, we are syncing from /home/username/music

Any music added or deleted from the Home Music directory from our machine will automatically be synced with our server.

Local Music Folder
Local Music Folder

After successfully syncing with the Home Music directory, you can see that on our Emby home screen we are automatically linked to our music streaming folder where the same “Castle in the Sky” song has been synced and is ready to stream!

Emby Interface Reflecting Local Music Folder Contents
Emby Interface Reflecting Local Music Folder Contents

Add More Media

If you want to add more media such as movies and pictures, you can go back and add additional file paths and media categories.

To do this first go to Settings. You will see that settings are split into several categories but we want to go to “Server” -> “Library”.

Emby Sidebar
Find “Library”

You will then be taken back to a view where you can see a sidebar to the left. You want to make sure you have “library” selected.

Click ” New Library” At the Top

Click the icon that says “+New Library” towards the upper middle of the screen.

You will then be brought back to the familiar screen from a setup where we added our first library. On this screen simply select the type of media you want to sync, any settings you are prompted to select, and include the directory path to sync from and that’s it!

Add Local Media Folder to Emby
Add Local Media Folder to Emby

Conclusion

Emby provides a simple, convenient, and affordable option for syncing media from a private server and enabling that media to be streamed over the cloud. Emby starts with a free tier and has both a monthly subscription as well as a one-time perpetual license option for those that want to enable extra features.

Server platforms like Emby and Plex can be installed either on-premises on a computer that is constantly on to sync from or onto a public cloud hosting service like ZebraHost if you want to have your server constantly on without maintaining your own hardware.

Share this
05 Aug

Remote Desktop Protocol (RDP)

Remote Desktop Protocol (RDP) is a proprietary graphical remote desktop software developed by Microsoft. It is the default solution for connecting to remote Windows servers and has been packaged with every version of Windows since XP. Now on its 8th version, RDP has been forked to work on most popular operating systems including IOS, Android, Mac, Windows, and Linux. Though designed to work with windows server, RDP has become a popular choice for connecting not just to remote PCs, but to mac as well as Linux servers.

Capabilities:

Remote Desktop Protocol is designed to allow users to connect to a computer desktop remotely and access that computer as if it were right in front of them. A desktop connected has access to all plugged in peripherals just like a normal computer. These peripherals can include things like:

  • Mouse and keyboard
  • Monitors – including multi-monitor setups
  • Headphones and speakers (Audio In/Out)
  • Printers
  • Storage devices

Security Concerns

Remote Desktop Protocol uses the very well-known 3389 port, which is commonly used to infect computers with malware and ransomware. According to an article published by cybersecurity firm McAfee, RDP was the most common attack mechanism used to spread ransomware in Q1 2019.

For this reason, experts generally warn against using it over the Internet despite encryption capabilities. It is rather suggested to use RDP over a private network or VPN.

Despite security issues with port 3389, RDP does come with encryption enabled. Even peripherals like mouse and keyboard have their signals sent over encryption which although leading to input lag, helps to secure input such as passwords.

Here are a few suggestions to stay safe using RDP:

  • Make sure encryption is enabled: Encryption can be turned on or off so make sure it is enabled on your DRP session
  • Use complex passwords: choose passwords that will be hard to crack. RDP requires knowing a computer’s password.
  • Use over a private network or VPN: RDP should be used over a private network especially or enterprise use. Be cognizant of which networks you are accessing your computer from. If you must access it remotely, make sure you are going through a Virtual Private Network.
  • Manage Firewall Settings: In your firewall, you can limit RDP sessions to know IPs to make sure unauthorized users are not given access.

Open Source Forks

RDP is available on almost all platforms thanks to the open-source community and their efforts creating RDP software designed to work with operating systems like Linux.

The 2 leading open-source RDP protocols are FreeRDP and Xrdp. These can be installed on any Linux operating system and accessed through either Microsoft’s own Remote Desktop application on Windows or through open-source viewers like Rdesktop on Linux.

Using RDP

On Windows:

  1. Open the Remote Desktop Connection application
  2. Click on the Options link if you want to customize settings
  3. Input the IP address of the desktop you are trying to connect to
  4. Input your username and password

On Linux:

  1. Install a client. Popular options include: Rdesktop, Remmina, xfreerdp
  2. Run your chosen RDP client
  3. Input IP, username and password

On Mac:

  1. download the Microsoft Remote Desktop client from the App Store
  2. Click “New” to configure your connection
  3. Type username, IP, username, and password
  4. Click “Start”
Share this
29 Jul

Understanding Git

What is Git?

Git is the most widely used Version Control Control System in the world. It was developed by Linus Torvalds in 2005 as a way to address the challenges of remote development projects and the multiple conflicting updates that can occur during the development cycle as a result of developers not working closely together.

A Distributed Version Control System is a platform that allows developers to work on programs remotely as their own separate versions, then merge their changes into one master file once the developer feels changes are ready. In Git projects, there is a master project that a team is trying to develop and improve. But instead of everyone working on the master project itself, each developer can download a copy, make changes in a completely separate environment from other developers, then merge those changes into the master version which can then be globally updated for all developers to download from.

When developers work on these separate versions of an application (known as branches) those changes are not going be seen by other developers until integrated into the master file. Each developer has their own version and their own repository of changes. This is useful because if a developer feels they need to make revisions or restore an old version, they are free to do so.

By working on a separate version of an application, developers aren’t disturbed by changes from another developer. It also allows developers to test their specific changes in a program to see if issues arise or they want to make corrections before integrating those changes for everyone else.

Example of Version Control

How Version Control Branches Work
How Version Control Branches Work

In this illustration, there is an app that is going through 3 stages of development and being worked on by 2 developers.

John (developer 1) downloads App version 1 and makes several changes to it. He doesn’t disturb Dave (developer 2) who is also working on the app because both have separate version repositories after they’ve downloaded from the master project.

John makes several changes to the app and then reverts 1 step because he made an error before resubmitting his changes to the master app. John can do this with ease because Git backs up John’s app versions along the way. He ends up submitting version 3 from his repository instead of version 4.

Dave only needs to make 2 changes. He works undisturbed then submits his changes to the master project.

After both developers have submitted their changes, the master project is updated to App version 2.

Both developers are now working from a new version (App V2) where they are both up to date on each other’s work.

They review their changes. Dave finds he doesn’t need to make any more changes, so he submits App V2 as the final version. John, on the other hand, realizes there is an error and fixes it in his copy of App V2. He then submits the changes to the final version.

Because both developers were using Git, John was able to submit his change to the final version and Git recognized Dave didn’t submit any conflicting changes and so the change was implemented in the final project.

Advantages of Using Git:

Scalability: Git is a powerful tool that allows multiple developers to work on applications remotely. Git is relied on from small development teams to large, multi-national tech corporations.

Built-in Backup: Git is built with recovery in mind. versions are saved all along the way and repositories are separate so if a developer wants to return to an old version they can.

Centralized Development: Git projects can be enforced by an admin so that no one is pushing changes to the master file before approval. This helps foster organization and managed collaboration.

Genuine Details: details like time, file ID, commit messages, and anything else stamped by Git cannot be changed without changing the file ID itself. This means details are authentic.

Speed: most operations in Git are performed on the local machine that the developer is working on. This means there is no latency or performance drop that sometimes comes from communicating with central servers.

Open Source: Git was developed by Linus Torvalds – the creator of the Linux kernel. Git is open source so the community can contribute and modify the program as they wish.

Free: Git is a free platform that allows developers of all sizes and scale to use Git to build projects affordably.

Optimized for Linux: Git was built by Linux Torvalds who developer the Linux Kernel. git was designed to be a tool optimized for Linux development environments.

What is GitHub?

Many people in the technology community are more familiar with Github than with Git itself. And you might be wondering what the relationship between the two is.

Github and Git are separate entities. Git is the development platform that allows for Distributed Version Control while Github is a company offering an online development community where users can submit Git projects along with other development projects.

GitHub, recently purchased by Microsoft in 2018, is a hub targeted at the developer community. It allows developers to share code, projects, collaborate on forums, ask questions, find featured tools and software, learn about open source guidelines, and more.

For example, when clicking the “Android” topic, users can find anything from designers asking questions about Google’s material design, sharing resources that they’ve found helpful for general Android programing knowledge, and curated collections of software or interesting projects.

Just like Git, Github is built on the premise of community and collaboration. It is designed for developers to have a forum to discuss, collaborate, and share.

What’s The Connection Between Github and Git?

While Github is more than just Git projects, it is still designed to work seamlessly with Git. Git projects are typically published and stored on Github as a way to centralize them project. From there, developers can “pull” a project down from Github and begin working on their own branch. When they are ready, it can then be “pushed” back up to Github and integrated into a downloadable master file.

While many users of Git are users that share their projects to the public, Git offers the choice to create private repositories that act much like a storage locker for projects. This is a great system for remote developers looking to collaborate as Git acts as a safe space to store a development project. Private repositories are also heavily used by large corporations looking for a way to unite their remote workforce.

Summary and Final Thoughts

For many developers worldwide and of all sizes, Git is an irreplaceable tool and the defacto standard when collaborating on large development projects with many distributed versions. The fact that Git is free and open source means that developers of all sizes can take advantage of Git which allows for coordinated, remote development.

Git is scalable, recoverable and centralizes workflows between developers making it an essential tool for the modern remote cloud computing dominated world. Developers can work on their own machines for speed, then push their creations to repositories in the cloud through services like Github or private cloud servers for internal organization use. Git allows for seamless development on the Linux platform but is available to be used on all platforms giving it unparalleled flexibility.

If developers decide they want to collaborate openly on projects, they turn to a platform like Github where they can share their development, collaborate, ask questions or find resources through the many forums and curated lists by Github users.

If you want to try Git yourself, the Git website has details on how to install Git. There is also an optional GUI desktop program to install.

Share this
22 Jul

Installing SSH on Linux and Generating Public and Private Keys

What is SSH?

SSH stands for Secure Shell and it is a way for systems to communicate with each other by sending encrypted data over a network. SSH is one of the most secure ways to send and receive data and is the method relied on by the data centers that manage tons of information and keep the Internet as we know it running. It is also relied on by many including developers and systems admins because it is a reliable way to access servers. Combined, with SSH keys, it can even eliminate the need for passwords when remote connecting to servers.

The reason that SSH is relied on because it is universal, working on Linux, Mac, and Windows. It can be controlled through a command prompt or GUI based programs such as the popular PUTTY client for windows.

One of the first steps for setting up a remote server, whether it be through a provider like ZebraHost or a private on-premises cloud, is to enable SSH access and to generate a public and private key so that two systems can send encrypted information remotely.

SSH works by generating two keys. One public key and one private key. The private key only lives on the machine you want to SSH into your server from. The public key can be copied to any server or machine you want to access remotely. This is great for security because regardless of who has your public key, as long as only you have your private key, only you can log in with it. This even opens up opportunities like being able to securely access your server as a root user or without a password.

Install SSH Access on Linux

the first step to enabling SSH access is to install Secure Shell. We will be doing this via Open SSH. To do this, type:

sudo apt-get install openssh-server

After clicking enter you will be prompted if you want to continue (Y/N). Types Yes.

Once open SSH is installed you will be ready to use basic SSH in order to access your machine remotely. All you have to do is type your username, IP, and password and you will be able to log into your machine remotely. However, this is considered the least secure way to access your machine as anyone that knows your credentials can access your machine via SSH.

To make your machine more secure, you will need to generate a public and private SSH key. The advantage of using public/private keys is that because the two keys must “talk” to each other, even if someone learns what your credentials are or sees your public key, without knowing the private key there is no way they can access your server.

How to Generate a Public and Private Key on Linux

Think of a public key and a private key as a lock and key. The lock can go on any door you want but without the key its inaccessible. The public key lives on any server you want to access while your private key lives on the machine that you use to access the server. This allows you to have control over your server or if you want, multiple servers.

On your host Linux machine, you will start by generating a public and private key using either of the commands below:

Type either:

ssh-keygen

or

ssh-keygen -t rsa

Then, as shown below you will have options such as setting up a passphrase to protect your keys. In this example, we will simply click Enter to skip entering a passphrase and go straight to generating our public and private key.

Generating SSH keys using ssh-keygen command
Generating SSH keys using ssh-keygen command

Now that the keys are generated, you will want to copy your public key over to your server while your private key remains on the host machine.

To do this, first go into your .ssh directory by using:

cd.ssh

Then, type:

ssh-copy-id username@serverIP

If done correctly, you will see that 1 key has been added to the server. This is the public key that will allow you to access your server via public/private key access.

Successfully copying over public key in Ubuntu
Successfully copying over public key in Ubuntu

Try logging into your server. If your SSH keys have been generated and placed successfully, you will no longer need your password. Rather, Ubuntu will use your private key generated on your host machine to access your server.

Successful SSH login from Ubuntu
Successful SSH login from Ubuntu

The above screenshot is an example of what your machine should look like if you have properly SSH’d into your machine using keys. Notice that after I typed ssh sshtest@192.168.56.104 I was not asked for a password and my server simply said Welcome to Ubuntu 19.10

Generating SSH Keys on Windows

Because the ability to generate public and private keys is not fully baked into Windows, we will be generating our keys via a program called PUTTY. Putty is a client that allows users to log into their servers via SSH.

Putty is GUI-based and as such will generate public/private keys using a different method.

To start, download Putty.

Testing SSH Without SSH Keys

Once PuTTY is installed on your system, you will open the client and first test to make sure you can SSH into your server without keys.

To do this, simply type either your server IP address or username@server address into the “Host Name (or IP address)” bar towards the top of the PuTTY program.

PuTTY session page
PuTTY session page
Where to put your private key in PuTTY
Where to put your private key in PuTTY

Once you click Enter, you will be asked either which user you would like to log in as or the password for that user.

PuTTY SSH requiring username
PuTTY SSH requiring username
PuTTY successful SSH login
PuTTY successful SSH login

Above is what a successful PuTTY SSH login will look like without using SSH keys

Generating SSH Keys via PuTTY

Now that you know your server is accessible from your host machine through normal SSH, you can begin to generate your SSH keys.

To do this, you will want to exit your session if it is active, then search for Putty Key Generator in your start menu. Open this program and click “Generate” with parameters set to RSA

Generating PuTTY SSH Keys
Generating PuTTY SSH Keys

Once your key is generated, click save for both the private and public keys to a private, secure folder where no one will see them (especially for the private key).

Go back to your regular PuTTY program and then type in your IP address in the “Host Name (or IP address)” bar and then without logging into your server, go to the Category window, then scroll down to SSH, then click “Auth” and browse for your private key you generated.

PuTTY Authentication Settings
PuTTY Authentication Settings

Once that is uploaded, you will then SSH login to your server like normal. You will still need your password because you need to upload your public key to the server.

Once you’ve logged into your server, type:

cd. ssh

This will bring you to the ssh directory you need

Then type:

nano authorized keys

then paste the public key that PuTTY generated in a new line. See below which key to copy.

Copy the public key generated in the box on PuTTY
Copy the public key generated in the box on PuTTY

Click CTRL+X then Enter

You will now have the proper public key loaded onto your server

Setting Up One-Click Login Parameters for PuTTY

In order to set up one-click login using your public/private keys, you will need to set up a session profile in PuTTY.

First, type your IP in the “Host Name (or IP address)” bar.

Then go to the Category window. Connection -> Data -> Auto-login username.

Enter your username so that you don’t need to enter your username each time you log in to your server.

Then, Category -> Connection -> SSH -> + -> Auth -> Private key file for authentication.

Click Browse and locate your private key file generated earlier.

Return to “Session” in the Category window.

Enter a name for your Session under Saved Sessions and then click Save.

Now, you can double click your session name or click the session and the load button. With SSH access enabled you will be able to log into your server with just your public/private key combination with no password or username needed.

Below is an example of a successful login with SSH keys:

Successful SSH Login with PuTTY Using SSH Keys
Successful SSH Login with PuTTY Using SSH Keys

Share this
15 Jul

Edge Network vs CDN – and Why They Can Help Your Business

The Internet and networking technology is becoming increasingly critical for business growth. More people are shopping and working online than ever before.  Companies are now using the Internet as the primary outlet for increasing brand recognition, reaching customers, and converting sales.

Although it seems like more users online equal more sales opportunities there is a problem. The internet is brutally competitive. And users are demanding data load faster.

If your company can’t produce a webpage or load an image in milliseconds users will simply go elsewhere.  And there’s little chance they are going to return to your site.

With rising globalization and increasingly connected users, data needs to travel farther and faster than it ever has before in order to reach users. Many companies, like ZebraHost, have users across the globe. Those users need to be served data at equally fast speeds or ZebraHost risks losing its global competitive edge.

The pain point of needing to deliver content to users faster has led to the rise of Edge computing. Under the umbrella of Edge computing, two solutions have emerged. Edge Networks and Content Delivery Networks. Content Delivery Networks and Edge Networks are both designed to bring content to users faster. Although the two methods are referred to interchangeably, there are some differences you should be aware of.

Content Delivery Network (CDN)

A Content Delivery Network (CDN) is a network of servers located strategically close to users. The primary purpose of these servers is to cache static content like images videos etc. to reduce the distance that data needs to travel. With less distance to travel, data reaches users faster.

Have you ever tried to request content from a server located in a foreign country or continent? If you live in North America and have ever tried to get content from Asia, you might have noticed it loads slowly. It has nothing to do with either your internet speed or theirs. It’s simply because of latency due to the distance that data needs to travel.

Because content must travel physical distance over copper or fiber wires, the farther a user is from the server hosting the content, the longer it takes to receive it. The user will have to request the content from the origin server (where the data is originally hosted). That server will then realize a user far away wants to access it then will push the content out to that specific user. All this takes time. The amount of time it takes to request then render a data request is known as latency.

Latency is solved through taking commonly accessed content like images or a website homepage and storing it on the CDN. The CDN will store the content via caching it closer to users. For example, if I want ZebraHost’s homepage to be accessed by users in Kansas City, Sydney Australia, and Cape Town South Africa but my servers are only located in Altoona Iowa, I might find a CDN beneficial. I can cache my homepage on a CDN that has servers in those locations. Then, instead of users having to download my homepage from Altoona Iowa, they can download it from the CDN server closest to them.

Naturally, a CDN can’t place a server equally close to every single user. So, in order to deliver data effectively, the CDN places servers at strategic points such as high traffic data centers where most internet activity in a region is accessed from. A CDN is not just about numbers or servers but strategic placement of those servers to minimize latency.

Edge Network

An Edge Network takes things a step further by not just placing servers in regionally dispersed data centers but rather at high volume Internet Exchange Points (IxPs). These Internet Exchange Points are where ISPs connect with each other to exchange information.

An Edge Network provider will place Point of Presence (PoP) servers at Internet exchange points to further minimize latency by going through the network most direct to the user.

Typically, data must travel over the cables of multiple network providers when traveling long distances. Because an Edge Network caches information at Internet Exchange Points, a user might only have to connect to the nearest exchange point to receive data rather than have it travel over many networks. This can speed up data delivery dramatically, especially for companies with internationally dispersed users.

This might make an Edge Network just sound like a fancy CDN because that’s what it is. An Edge Network is a CDN that specifically places servers at Internet Exchange Points to bring data closer to the network Edge. The network edge is the closest that a CDN can get to users. While an Edge Network is a CDN, a CDN is not an Edge Network. A CDN simply refers to a content delivery solution that caches information in geographically dispersed data centers. The CDN may place their servers in IXPs or they may not.

Edge Computing

CDNs and Edge Networks are under the umbrella of the Edge Computing revolution. But Edge Computing and Edge Network are not the same thing. Edge Computing is an umbrella term that refers to the new trend of bringing data closest the users as possible. And Edge Computing can encompass many things. Most commonly, Edge devices are devices that enable data to be brought closer to users. Common examples are Internet routers, connected vehicles, smartphones, etc. Anything that can act as an entrance to the network has the potential to be an Edge device. But being able to store and access information at these Edge devices is what allows them to be a part of Edge Computing and work towards reducing latency for users.

A common example of Edge Computing is found in electric vehicles. Electric vehicles are highly connected with various electronics that can store, cache, and transmit data. Technology companies can cache information in these vehicles to deliver it faster to users. They can also pull data from these vehicles to understand driving habits, safety data, and more.

The overall goal of Edge computing is the same as CDNs and Edge Networks in that it is designed to deliver information to users quickly and decrease latency.

Free vs Paid CDNs

There are numerous paid CDN services available that make CDN management easy. Examples include Key CDN, Akamai, CloudFront, etc. But there are also free CDNs with more limited features. The most popular of which is Cloud Flare.

Free CDNs typically require more manual configuration. A paid CDN will have a support team that can guide you as you set up your CDN, as well as help you if anything goes wrong. A free CDN will typically let you use the CDN network, but there is unlikely to be any kind of personalized support as part of the free plan.

Free CDNs will also often use a ‘push’ method of delivering content. The push method means that users will choose which content they want on their CDN and request that it be stored on the CDN. The plus is that users have control over the content being pushed and there isn’t wait time for the CDN to cache the content once users request it. On the other hand, if the content hasn’t been pushed to the CDN it won’t be automatically added to the CDN as frequently access content. This can prevent the CDN from working optimally from a user end.

A Paid CDN will typically have more premium support as well as extra features. For example, Cloudflare offers both a free CDN and paid CDN. The free plan offers access to their global CDN. But the paid tier offers the following features:

  • Better site protection
  • More frequent site crawls
  • Mobile optimization
  • DDoS protection

As well as offering extra features as Cloudflare does, paid CDNs are typically more automated using the ‘pull’ method. The pull method is where users will request content. The CDN will then be set as the default access point and since it does not have the content. It will pull that content from the origin server and then cache that content over the CDN. The downside to this is that the first users to request something will have to wait longer because the information isn’t already cached. However, users afterward will be able to access the content quicker once it’s cached. And because the CDN is helping automatically pull frequently requested content it leads to better user experience as the CDN is optimized via user requests.

Main Advantages of CDNs and Edge Networks

CDNs and Ege networks differ slightly, but the core advantages are very similar between the two:

Fast: CDNs and Edge Networks deliver content quicker to your users than if they must send a request to the origin server. This will give your users a better experience and increase the chances of them returning to your site.

Better Bandwidth: Because geographically dispersed users request content from the server closest to them, it means that there is less bandwidth being used on the origin server. CDNs cache content in multiple places helping balance bandwidth.

Load Balancing: Having information cached in dispersed servers that users can access other than the origin server lessens the stress on each server in your network.

Cost Savings*: CDNs and Edge Networks typically end up saving businesses money. Data travels shorter distances so hosts pay less to ISPs. Although CDNs and Edge Networks in most cases cost money, this cost is often less than the amount saved.

Security: Because content is cached globally and the CDN or Edge Network acts as an access point to the network, DDoS and other network attacks are mitigated or at the very least affect fewer users.

Redundancy: Because content is stored in multiple places, if a server goes down, users can simply be redirected to the next closest server that has the content they requested cached. Content is also cached so if the origin server is down, users can still access the content.

Should You Use a a CDN, Edge Network or Neither?

Most businesses have geographically dispersed users and will likely benefit from the addition of a CDN or Edge Network to their infrastructure. However, some businesses, mostly local businesses, will have users in only one area. For these businesses, a CDN might not be useful – yet.

In order to answer the question of which content delivery option is best for your business you must look at your user base.

Do you have a large, globally dispersed userbase? Use an Edge Network. An Edge Network being located at Internet Exchange Points will help data travel by having it traverse less ISP networks thus bringing content closer to your users.

Do you have a geographically dispersed userbase in only a few main regions? If the features and price are right, a CDN is right for your business. If your users are only in a few key areas having your content stored in data centers close to your users will suffice.

Do you have users only in a local area? If you are a local business or only serve on region nearby your origin server, a CDN or Edge Network will not make any noticeable improvement for your business. Your data doesn’t have to travel far so the extra cost or technical setup might not be worth it. On the other hand, you should keep Edge Networks and CDNs in mind if you plan to expand beyond your local area in the future.

Conclusion

There is no doubt that we will see a rise in the usage of CDNs and Edge networks in the future. As the Internet continues to grow and users demand content to be delivered faster, Edge Networks and CDNs will be an important part of most companies’ network infrastructure.

Though CDNs typically are not free, the cost is well worth it for many businesses for the benefits they provide like security, redundancy, and faster load times.

Businesses of any size should keep the advantages of a CDN or Edge Network in mind as they expand and need to potentially cover a larger customer base. Unless your business deals strictly with the local area, understanding how these content delivery methods function could help expand your business.

ZebraHost is now on a CDN. We’ve worked with a leading CDN to make our website faster by caching our homepage so it is delivered to users quickly. We chose to work with a CDN to add additional speed to make browsing our website faster and increase user satisfaction when researching our cloud solutions.

Share this
07 Jul

Happy Birthday ZebraHost!

It’s Our Birthday!

Today July 7th, 2000, ZebraHost was established by current CEO Clive Swanepoel. Over these last 20 years, we’ve continuously strived to bring our clients the best of breed technology and exceptional customer service.

Speaking of our clients, we couldn’t have made it this far without you! Over these last 20 years, we’ve had the pleasure of working with you to host many of your wonderful and exciting ideas. These ideas have allowed us to become more creative, respond better to the needs of developers, and position ourselves as a premier provider of infrastructure solutions.

Because a lot has happened over 20 years, we wanted to take a moment to share our story on how we grew into a customer-focused boutique provider we are today.

History of ZebraHost

20 years of ZebraHost History

Our Founding

ZebraHost’s serial entrepreneur CEO Clive Swanepoel has always pioneered new connected technology. Back in South Africa, he was one of the first people to be granted access to the internet by the Council of Scientific Research. Seeking ways to connect South Africa, Clive founded one of South Africa’s first digital sign companies Vivid Outdoor Media. Vivid Outdoor Media built some of the first digital signs that could be controlled remotely through wiring which allowed for easy turnover of advertisements.

After Clive discovered that he was procuring most of the technology and material for Vivid Outdoor Media in the Mid-Western United States, he decided to move to Des Moines Iowa. Wondering how he could continue to deliver cutting-edge services, Clive looked towards his next tech venture. Upon witnessing the growing userbase of the internet, Clive realized that companied needed a service that would allow tech companies to store massive amounts of data with little upfront expense. Capitalizing on this pain point, Clive founded ZebraHost – one of the first hosting providers.

ZebraHost was founded in 2000, right during the height of the dotcom bubble. The surplus of overvalued tech companies failing to deliver a profit eventually led to the greatest tech crash in US history. But the internet did not end with the crash. Companies focused on solving a core pain point, who delivered exceptional customer service, and grew at a sustainable rate continued to thrive.

These 3 factors were what Clive took away from surviving the dotcom crash. ZebraHost still to this day remains committed to growing sustainably without injections from venture capital groups, prioritizing exceptional customer service, and delivering result-oriented solutions. But as the internet continued to grow, there was a demand for more granular solutions.

The Expansion of Our Product Lineup

Although ZebraHost now owns its own hardware and is co-located in industry leading data centers around the globe, ZebraHost only had its start as a hosting reseller. Reselling is very common in the cloud infrastructure industry, with many smaller providers today still opting to rebrand existing hosting services as their own. Common resale providers include Rackspace and IBM.

ZebraHost spent several years as a shared hosting reseller. Shared hosting is a form of inexpensive cloud infrastructure hosting which has multiple tenants using the same hardware. But as security needs changed, ZebraHost began to offer more premium options like Linux and Windows dedicated servers. Dedicated servers offer enhanced security and flexibility over shared hosting because each server only has one tenant.

In 2007, ZebraHost wanted to bring a solution that combined value and security which led it to begin offering VPS hosting. VPS hosting uses virtualization to separate each tenant so that they can occupy the same server hardware but use resources separately. This creates a secure wall between tenants and reduces the hardware expense normally associated with dedicated servers.

Building a Global Presence

After building a successful US-based brand, ZebraHost continued to grow its data center presence outside of The United States. In 2008 ZebraHost began to offer UK-based data center solutions. This allowed ZebraHost to test the European market.

5 years later, ZebraHost expanded its presence not just in Europe, but in Asia and Australia as well. In 2013, ZebraHost expanded its data center offerings to include Amsterdam, Singapore and Melbourne, Australia. The result was that ZebraHost could now reach customers with strict data sovereignty laws, reduce latency for customers abroad, and build a truly globally connected network.

Purchasing our Own Hardware

While reseller hosting and renting infrastructure works for smaller providers who are trying to get a start, ZebraHost had long outgrown this phase and was looking for ways to reduce cost and grow more sustainably.

In 2018, ZebraHost started purchasing its own hardware in order to have more control over its hardware and reduce licensing costs. The result was unparalleled flexibility in market offerings allowing ZebraHost to bring bespoke solutions at unmatched value. Starting with Altoona, Iowa and Kansas City, Missouri, ZebraHost has continued to purchase hardware to meet growth needs.

As we continue to expand our footprint in data centers across the globe, we will be purchasing hardware that meets the performance, sovereignty, and security needs of our clients.

The Growth of our Leadership and Team

We wouldn’t be where we are without our exceptional team and leadership.

In 2019, Nate Battles joined Clive Swanepoel in leading the company as Managing Partner. The two constantly exchange ideas and visions for the future of ZebraHost while working personally with clients to make sure technical challenges are resolved.

Over the last couple of years, new additions have been made to the team to assist in sales, marketing, and systems administration. Together the team is focused on meeting existing and planning for future challenges while putting our clients first.

Where We’re Going

We aren’t just spending the day reminiscing about the last 20 years, we’re planning for the next 20! As ZebraHost has grown and changed so has the market for cloud services. There is increased demand for remote work services, enhanced security, compliance compatibility, and better data responsibility. And we’re planning to tackle all of those!

We will be spending these next 20 years revamping our current offerings to make sure they remain industry-leading while introducing new services that compliment them. Stay tuned over the next few years to see the exciting changes we’re about to make!

Attribution

Image Template Attribution: Infographic vector created by pikisuperstar – www.freepik.com

Share this
01 Jul

What is the ‘Hybrid Cloud’?

What is the ‘Hybrid Cloud’ and Why are so Many Businesses Turning to it?

Try this,

Count how many digital services you rely on day to day. Now, count how many of those must connect to the internet and how many of those are subscription-based. After connecting to my CRM, email marketing manager, Adobe Creative Cloud for designing marketing material, SEO tools, I realized my entire job relies on cloud-based services. I can’t be the only one either. It seems like all the services we rely on daily as professionals are moving towards the cloud. So, let’s try to understand it.

The cloud is mainly split between 3 different solutions ‘Private’, ‘Public’, and ‘Hybrid’. But as more and more data is processed and stored in data centers, there is an increasingly hot debate amongst businesses who are arguing about the pros and cons between using a private cloud or public cloud data strategy. And there is no clear winner. Both the public and private clouds have compromises which cause many companies to also consider hybrid strategies.

The Private Cloud

Let’s start with on-premises private cloud. The “on-prem” private cloud is a solution that is hosted on private hardware and typically accessed over a private network. Example: consider a desktop tower that contains all the data needed to run your business which is accessed over an internal intranet. Information can be accessed remotely, but that information is largely limited via different certifications and access levels. Although the private cloud is secure, scalability is challenging and private clouds often lack redundancy in case of hardware failure. Private clouds can also be immensely expensive as companies need to purchase their own hardware if they want to scale. That hardware must also be replaced regularly leading to added maintenance and expense. This makes owning hardware hard to scale with company growth. This issue of scalability typically leads many businesses to use a public cloud.

The Public Cloud

The ‘Public Cloud’ refers to a cloud that is provided by a third party (like ZebraHost). With a public cloud, the cloud provider manages all the infrastructure and data that is hosted on their system. Some of the advantages include near-infinite scalability, lower costs for businesses due to not owning hardware, more flexible As a Service (aaS) payment structure, and security solutions backed by dedicated data experts and physical data centers.

Examples of other public cloud providers are big tech companies that store user data in their Software as a Service (SaaS) applications or Platform as a Service (PaaS) infrastructure. Example: Salesforce’s popular CRM platform. Salesforce is a platform for users to upload sales activity data. With a subscription to Salesforce, companies can store their sales data on the servers that Salesforce owns. Not only that, but Salesforce also acts as a platform for companies to implement custom APIs and or build their own customized platform on. All a company subscribed to Salesforce has to do is pay a monthly subscription fee. While paying a subscription, the company can customize Salesforce CRM to fit their needs. All backend data hosting and infrastructure is taken care of by Salesforce.

But again, there are cons to a public cloud.

For example, many do not like the idea of a 3rd party controlling all their data and having access to potentially sensitive information and trade secrets. Also, with nothing being hosted on-premises, there is no place to store the most sensitive data away from potentially prying eyes. This is especially important for industries like Healthcare IT and Finance which have regulatory requirements often disqualifying them from hosting data on a public cloud.

Because of the challenges presented by both the public and private cloud, more and more corporations are beginning to seek out a third option… the hybrid cloud.

The Hybrid Cloud

The hybrid cloud offers the best of both worlds. It offers a private cloud for storing base application infrastructure or extremely sensitive data while allowing near-infinite scalability, redundancy, and cost savings.

The hybrid cloud is an infrastructure strategy where a company will maintain its own private cloud as the core for its data while utilizing a public cloud to scale.

There are multiple ways to use a hybrid cloud strategy. Arguably the greatest strength of the hybrid cloud is its flexibility. Here’s a few ways companies can use the hybrid cloud strategy:

  • Storing the most sensitive data on a private cloud then storing more routine data on a public cloud
  • Storing core application infrastructure on a private cloud then building on it in the public cloud
  • Using a private cloud as the primary server then saving some data on the public cloud for redundancy.
  • Using the augment a local private cloud for seasonal traffic surges.

The above are only a few common examples of ways companies might use a hybrid cloud, but they all boil down to a few key advantages:

Controlled Scalability – The hybrid cloud allows scalability, but at a level you decide is comfortable for your business. For example, your business might have HIPAA data that can’t be stored on a public cloud but might also have more routine, less sensitive data that would be more appropriate to store on a public cloud. You can keep the HIPAA data on your private cloud while saving cost by utilizing the public cloud for any other data which scales per your needs.

Cost Efficiency – Scalability feeds directly into the second main advantage of the hybrid cloud which is cost-efficiency. Because your business doesn’t have to purchase new equipment to host your remaining data and instead builds on an already established foundation, it’s much cheaper to outsource to a 3rd party. 3rd party providers use their own equipment and most charge a monthly Infrastructure as a Service (IaaS) fee. An IaaS fee will be more manageable than buying hardware outright for most businesses because hardware costs are split between multiple tenants using the cloud provider’s hardware. This means that for most businesses, paying a monthly fee is cheaper overall and splits costs over long periods of time. Some businesses prefer to have Operational Expenses over Capital Expenses for easier accounting.

Redundancy – Redundancy is generally poor for private cloud solutions. Having private hardware and no ability to transfer data to other hardware of another data center naturally means there is more risk involved with storing data. Both public and hybrid clouds offer more redundancy and as a result, a safer environment for your business. If data is backed up into a public cloud as well as a private cloud, its accessible from two places. Even if separate data is kept between your public and private clouds, you still won’t lose everything if there should be a hardware failure. The hybrid cloud offers redundancy and redundancy offers peace of mind.

Final thoughts:

Right now, there is no denying the cloud is going to continue to expand in importance to how we perform our daily tasks and how we run our businesses. The impressive scalability, redundancy, and profits from cloud services are too good to pass up in their entirety.

Many companies rushed to the cloud. Some are adopting cloud-first strategies that will see their entire business and data inhabiting the public cloud. But others are starting to adopt a more cautious approach, afraid of what could happen if they leave everything to a third party. It makes sense that businesses want to take an approach that allows them to hold onto the most critical data on-premises whilst scaling with a cloud provider as needed.

We will likely continue to see the hybrid cloud become an increasingly important part of how information and applications are stored and managed. But dedicated private clouds and public cloud solutions will also continue to be solutions with their own advantages.

Share this

©2020 ZebraHost, LLC | All Rights Reserved | Powered by ZebraHost