Rediffmail Enterprise High Availability Architecture

Similar documents
Archival. Product Note

Failover Solutions with Open-E Data Storage Server (DSS V6)

BME CLEARING s Business Continuity Policy

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 13 Business Continuity

Maximum Availability Architecture: Overview. An Oracle White Paper July 2002

Module 4 STORAGE NETWORK BACKUP & RECOVERY

Specifications for WebDocs On-Demand

Stay connected to your market and employees! Product info Brochure

The Microsoft Large Mailbox Vision

Stay connected to your market and employees! Advanced Solution - Product info ebrochure

Datacenter replication solution with quasardb

Disaster Recovery Solution Achieved by EXPRESSCLUSTER

Exam : S Title : Snia Storage Network Management/Administration. Version : Demo

SECURE CLOUD BACKUP AND RECOVERY

Nutanix Tech Note. Virtualizing Microsoft Applications on Web-Scale Infrastructure

ForeScout CounterACT Resiliency Solutions

Replication Solutions with Open-E Data Storage Server (DSS) April 2009

EVERYTHING YOU NEED TO KNOW ABOUT NETWORK FAILOVER

VMware vsphere Clusters in Security Zones

Symantec Backup Exec 10d for Windows Servers AGENTS & OPTIONS MEDIA SERVER OPTIONS KEY BENEFITS AGENT AND OPTION GROUPS DATASHEET

FUJITSU Storage ETERNUS AF series and ETERNUS DX S4/S3 series Non-Stop Storage Reference Architecture Configuration Guide

vsan Security Zone Deployment First Published On: Last Updated On:

Dude Solutions Business Continuity Overview

EMC Virtual Infrastructure for Microsoft Applications Data Center Solution

What's in this guide... 4 Documents related to NetBackup in highly available environments... 5

ECE Engineering Robust Server Software. Spring 2018

Security and Reliability of the SoundBite Platform Andy Gilbert, VP of Operations Ed Gardner, Information Security Officer

What s in Installing and Configuring Windows Server 2012 (70-410):

PROTECT YOUR DATA, SAFEGUARD YOUR BUSINESS

PowerVault MD3 Storage Array Enterprise % Availability

IBM System Storage DS5020 Express

PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT

Chapter 2 CommVault Data Management Concepts

Copyright 2010 EMC Corporation. Do not Copy - All Rights Reserved.

In this unit we are going to review a set of computer protection measures also known as countermeasures.

High Availability and Disaster Recovery Solutions for Perforce

ZYNSTRA TECHNICAL BRIEFING NOTE

vsan Disaster Recovery November 19, 2017

Kunal Mahajan Microsoft Corporation

Introducing Avaya SDN Fx with FatPipe Networks Next Generation SD-WAN

Nutanix White Paper. Hyper-Converged Infrastructure for Enterprise Applications. Version 1.0 March Enterprise Applications on Nutanix

Hybrid setup. Product Note

Native vsphere Storage for Remote and Branch Offices

White Paper. A System for Archiving, Recovery, and Storage Optimization. Mimosa NearPoint for Microsoft

EMC VPLEX Geo with Quantum StorNext

FLAT DATACENTER STORAGE CHANDNI MODI (FN8692)

SolarWinds Orion Platform Scalability

Synchronous. (Block Based)

Atmosphere Fax Network Architecture Whitepaper

Disk-Based Data Protection Architecture Comparisons

Solace JMS Broker Delivers Highest Throughput for Persistent and Non-Persistent Delivery

Technology Insight Series

Executive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration

DELIVERING PERFORMANCE, SCALABILITY, AND AVAILABILITY ON THE SERVICENOW NONSTOP CLOUD

System Requirements for EFS (Electronic Filing System) This manual supersedes all previous versions. Version 3.1

Data Center Operations Guide

VPLEX & RECOVERPOINT CONTINUOUS DATA PROTECTION AND AVAILABILITY FOR YOUR MOST CRITICAL DATA IDAN KENTOR

Contingency Planning and Disaster Recovery

VERITAS Volume Replicator. Successful Replication and Disaster Recovery

Veritas Resiliency Platform 3.1 Overview and Planning Guide. Applicable for Veritas Resiliency Platform 3.1 and 3.1 Update 1

Protecting VMware vsphere/esx Environments with CA ARCserve

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo

Hypertable: The Storage Infrastructure behind Rediffmail - one of the World s Largest Services. Introduction. Current Architecture

Concord Fax Network Architecture. White Paper

Oracle Maximum Availability Architecture for Oracle Cloud

Delivered the Way Yo u Want

Virtual protection gets real

AWS Solution Architecture Patterns

THE COMPLETE GUIDE HADOOP BACKUP & RECOVERY

NEC Express5800 R320f Fault Tolerant Servers & NEC ExpressCluster Software

EMC VPLEX with Quantum Stornext

WAN VPN Solutions. How Cisco Uses VPN Solutions to Extend the WAN. A Cisco on Cisco Case Study: Inside Cisco IT

Issues in Programming Language Design for Embedded RT Systems

Controlling Costs and Driving Agility in the Datacenter

Local and Remote Data Protection for Microsoft Exchange Server 2007

How to Protect SAP HANA Applications with the Data Protection Suite

Microsoft SQL Server on Stratus ftserver Systems

Optimal Network Connectivity Reliable Network Access Flexible Network Management

Comparison: Microsoft Logical Disk Manager (LDM) and VERITAS Volume Manager

vsan Remote Office Deployment January 09, 2018

Level 3 Certificate in Cloud Services (for the Level 3 Infrastructure Technician Apprenticeship) Cloud Services

<Insert Picture Here> Oracle Application Cache Solution: Coherence

When failure is not an option HP NonStop BackBox VTC

OceanStor 6800F V5 Mission-Critical All-Flash Storage Systems

ISO27001 Preparing your business with Snare

Technical Brief SUPPORTPOINT TECHNICAL BRIEF MARCH

VMware Mirage Getting Started Guide

vsan Management Cluster First Published On: Last Updated On:

2788 : Designing High Availability Database Solutions Using Microsoft SQL Server 2005

Protecting Microsoft Hyper-V 3.0 Environments with Arcserve

Clustering In A SAN For High Availability

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

Q-Balancer Range FAQ The Q-Balance LB Series General Sales FAQ

IBM TS7700 grid solutions for business continuity

INTRODUCING VERITAS BACKUP EXEC SUITE

How To Guide: Long Term Archive for Rubrik. Using SwiftStack Storage as a Long Term Archive for Rubrik

A Survival Guide to Continuity of Operations. David B. Little Senior Principal Product Specialist

CASE STUDY: ASHLAND FOOD CO-OP

Isilon Scale Out NAS. Morten Petersen, Senior Systems Engineer, Isilon Division


Transcription:

Rediffmail Enterprise High Availability Architecture

Introduction Rediffmail Enterprise has proven track record of 99.9%+ service availability. Multifold increase in number of users and introduction of advanced features has not affected our service quality and availability. We attribute our reliability and scalability to well-designed HA (high availability) architecture. Rediffmail Enterprise s HA architecture is based on three important concepts of service availability. No single point of failure, fault tolerant architecture and continuous monitoring of services makes sure that service is available all the time. No single point of failure Infrastructure is composed of hardware and software components. All the hardwares are prone to failure in its lifetime. We ensure that we include best available hardware component in our infrastructure. Typically service fails due to bottlenecks in the system which does not have any redundant component to switch to in case of failure. We have analyzed the each component of infrastructure and added redundancy to granular level possible. Meta data and mail files redundant architecture 1. Server cluster redundancy Server clusters are responsible for processing the entire mail data. With millions of mails getting processed every day, we have array of server clusters that complement each other. We have multiple redundancies for server cluster and we make sure that server utilization never exceeds a threshold limit. 2014 Rediff.com Page 2 of 7

2. Storage redundancy The storage is divided into two components; metadata and mail file. Such division allows the faster data access and quick response to queries. For the data storage, Rediffmail enterprise has deployed RAID6 (redundant array of independent disks) standard. This standard mandates each data file to be copied at least 2 times on redundant disks. Also these redundant disks should always be operational and accessible all the time. 3. Load balancer redundancy Load balancer is responsible for optimal distribution of data processing requests to server clusters. Even for the load balancers we have added the redundancy in the system. The load balancers are always in active-passive mode. If active load balancer not available, load balancer in passive mode takes over and ensures smooth processing of data. Each load balancer has two VIPs (virtual IPs) internally to support redundant storage architecture as indicated in schematic above. 4. Network redundancy LAN and WAN network carry all the data from one data center to another and to end user. They are the backbone of entire infrastructure. We have created mesh of interconnectivity between major ISPs in India as well as our data center. Thus even if one link is down, the data can flow through multiple other routes. Rediff s interconnected network with Major ISPs 5. Network components redundancy Sometimes even a small network component such as router or firewall can cause disruption in service. If one these hardwares fail to perform, data can be processed or transferred. We have setup a parallel infrastructure with replication of each network component as indicated in the 2014 Rediff.com Page 3 of 7

diagram. In case of hardware failure, switchover happens automatically within human intervention. Rediff datacenter LAN architecture Fault tolerance Fault tolerance is generally measured in terms of ability to recover from errors that occur due to unprecedented event or surge of load on the system through redundant environment. Fault tolerance also includes confinement of problem to origin before it affects rest of the system. The fault tolerant architecture is designed to address any transient, intermittent and permanent faults. 1. Distributed mail architecture The mail architecture has been designed to abstract different components of system from one another. Even if there is any problem with one of the components of system, other components are not affected. This architecture also helps to switch to redundant component in place of faulty one. 2014 Rediff.com Page 4 of 7

Distributed mail architecture 2. Self-stabilization We have built intelligence in system to automatically identify the hard and soft failures and switch to redundant component without any human intervention. This makes sure that even in case of component failure; system auto recovers and stabilizes itself. 3. Quality control With high quality control mechanisms, we ensure a safe design for continuous uptime. These high quality control mechanisms involve periodic testing and maintenance of all components such as hardware and software. Such mechanisms are crucial for reducing the failure risk and impact availability. We also conduct regular audits of entire system to identify likelihood of any failure. Continuous Monitoring Along with multifold redundancy and fault tolerant architecture, 24x7 monitoring of system is crucial in ensuring the high availability of service. We have deployed multiple monitoring systems to analyze and predict the health of the system. Monitoring systems are automated with manual overdrive 1. Automated early warning system Early warning system continuously monitors and analyses the system health on various parameters including application latency, concurrency, server utilization, malfunctioning of any component, utilization of storage and many more. If any of the parameter crosses the threshold mark, an automated warning is sent over email as well as mobile to concerned teams. This 2014 Rediff.com Page 5 of 7

system also forecast capacity requirement in near future based on historical trends and notifies the team. 2. 24x7 service monitoring Screen capture of one of monitoring tools A dedicated service monitoring team is available at data centers 24x7. They monitor the health of the system using tools as well as they physically inspect the server locations. If required they can replace the malfunctioning component immediately. 2014 Rediff.com Page 6 of 7

Data recovery We provide three levels of data recovery services. One can choose whichever suits them best Backup and Restore Rediff s email backup solution, the mails are backed up as soon as they are sent or received by the user. All the sent or received mails of user can be backed up even if user is accessing mails from multiple devices. The mailbox restoration is as simple as a one click of the button. Administrators can even restore the accidently deleted mails. Email archival Rediff archival solution does not need any manual intervention to archive the data. Mails are archived as soon as they are sent or received by any user of the domain. The archival solution is device as well as network agnostic. All the mails are indexed and then stored in separate the system. Required mail cab be searched using combination of parameters such as from address, to address, words in subject line, attachment name as well as the mails from specific date range. The system will display the list of emails matching the query within couple of seconds. Rediff archival solution allows the download of archived data. If the data is to be produced for legal or audit purpose, administrator has an option to download the searched mails as a compressed file Disaster recovery In case of any natural disaster such as fire or flood, it is very important that the data is not wiped off. We have taken certain measures to ensure that data is available even if a part of infrastructure is affected due to natural disaster. In this solution we replicate the entire data at different data center in real time. This data can be restored back when the systems are up again. 2014 Rediff.com Page 7 of 7