GI - Cloud Reference Architecture - 06112020
GI - Cloud Reference Architecture - 06112020
Reference Architecture
Ministry of Electronics and Information Technology Page 2 of 32
GI Cloud Reference Architecture
DISCLAIMER
This document has been prepared by Cloud Management Office (CMO) under Ministry of
Electronics and Information Technology (MeitY). This document is advisory in nature and aims
to provide information in respect of the GI Cloud (MeghRaj) Initiative.
While every care has been taken to ensure that the contents of this Document are accurate
and up to date, the readers are advised to exercise discretion and verify the precise current
provisions of law and other applicable instructions from the original sources. It represents
practices as on the date of issue of this Document, which are subject to change without notice.
The readers are responsible for making their own independent assessment of the information
in this document.
In no event shall MeitY or its' contractors be liable for any damages whatsoever (including,
without limitation, damages for loss of profits, business interruption, loss of information)
arising out of the use of or inability to use this Document
Table of Contents
Table of Figures ........................................................................................................................................................ 6
1 Purpose ................................................................................................................................................................ 7
2 Background ........................................................................................................................................................ 8
5.3 Backup & Archive/Cold Disaster Recovery on Cloud with On-premise Primary DC ...29
Table of Figures
Figure 1: GI Cloud Reference Architecture .................................................................................................. 10
Figure 2: Service Orchestration ........................................................................................................................ 14
Figure 3: Cloud Management Platform ........................................................................................................ 16
Figure 4: Cloud Management Services ......................................................................................................... 17
Figure 5: Hybrid Cloud Reference Architecture ......................................................................................... 25
Figure 6: Multi Cloud Reference Architecture ............................................................................................ 26
Figure 7: Database on Cloud ............................................................................................................................ 27
Figure 8: Hot DR on cloud with on-premise Primary DC ....................................................................... 28
Figure 9: Backup & Archive/ Cold DR on Cloud with on-premise Primary DC.............................. 29
Figure 10: Analytics on Cloud ........................................................................................................................... 30
Figure 11: Multiple Cloud for Different Functions .................................................................................... 31
Figure 12: Migration to Containers ................................................................................................................ 32
1 Purpose
Government of India has referenced the Conceptual Reference Model of National Institute of
Standards and Technology’s (NIST). A requirement to design a GI Cloud Reference
Architecture arose to standardize on the nomenclature of terms, various actors and their roles
& responsibilities in the GI cloud ecosystem. This document has been prepared to address
the requirement of GI Cloud Reference architecture.
The GI Cloud Reference Architecture has been designed to assist the Government
Departments to build their Cloud deployment architecture with components, activities and
actors as relevant in the GI Cloud ecosystem. The Reference architecture proposed in the
document is a vendor neutral architecture and has been designed by adopting widely used
and recognized cloud reference architecture and their components.
The document also captures different use case scenarios along with their merits as applicable
in today’s cloud setup. These use cases are intended to assist Government Departments while
designing their cloud solutions. The GI Cloud Reference Architecture is intended to facilitate
the understanding of operational intricacies in cloud computing with focus on “what” cloud
services provide.
2 Background
Cloud computing has advanced significantly in the delivery of information technology and
services by providing an on-demand access to a shared pool of computing resources in a self-
service, dynamically scalable, efficient and metered manner.
NIST had published a Cloud Computing reference architecture which identified major actors,
their activities and functions in cloud computing. It was a generic high-level architecture
intended to facilitate the understanding of the requirements, uses, characteristics and
standards of cloud computing. Government of India (MeitY) referenced NIST’s conceptual
reference model to design the GI Cloud ecosystem and published it in its GI Cloud (Meghraj)
Adoption and Implementation Roadmap (April 2013). Apart from NIST, global technology
OEMs such as Oracle, IBM have published their own Cloud Reference Architecture which
further elaborate NIST’s conceptual model and include newer aspects of cloud technology.
MeitY empaneled Cloud service offerings of private Cloud Service Providers for different cloud
deployment models (Public Cloud, Virtual Private Cloud, Government Community Cloud) in
2017 thereby including private players in the GI Cloud ecosystem. Government Departments
have been leveraging the empaneled services of these players along with cloud services
provisioned by NIC to deliver services internally within the Department as well as to the citizens
of the country.
MeitY intends to come forward with the updated GI Cloud Reference Architecture which would
be designed referencing various globally accepted Cloud Reference Architectures and would
identify actors, their activities and functions in line with the GI Cloud ecosystem. The guiding
principles leading to creation of the document were to prepare a Reference Architecture that
is vendor neutral and does not restrict infrastructure modernization. The Reference
Architecture is not tied to any specific vendor products, services or reference implementation,
nor does it describes prescriptive solutions that constrain innovation. Also, the GI Cloud
Reference Architecture can be used by Government Departments for describing and
developing a system architecture using a common framework of reference.
Nowadays, Cloud technology is enabling practices such as DevOps to simplify and speed up
the application development process. The near real-time response to Department needs with
benefits of cloud would enable the government departments to efficiently deliver internal and
citizen centric services leading to increase in adoption of cloud-based infrastructure, platforms
and applications. Cloud enables Departments to operate more efficiently, reducing up-front
capital costs while providing flexibility in data storage, processing, and other functionalities.
As Government Departments are migrating existing applications to the cloud and developing
new capabilities/applications on the cloud, understanding and designing cloud deployment
architectures with elements of security and management have become crucial while adopting
cloud.
The figure above details the various building block which make up the GI Cloud Reference
Architecture. This Reference architecture may be leveraged as a framework to build/design
Cloud deployments/environment. GI CRA comprises of the following essential
components/entities:
Consumer
Cloud Service Provider
o Service Orchestration
o Cloud Management/Self-service Portal
o Cloud Services Management
o Cloud Security and privacy
Cloud Carrier
Managed Service Provider/Service Integrator
Cloud Auditor
The GI CRA also comprises of an Integration layer which may be utilized for cloud models like
Hybrid Cloud, Multi-Cloud and more. The GI CRA layers/components/entities are described
as below:
Components/Entities Description
Components/Entities Description
Cloud Service Provider Entity responsible for operating cloud environment and make
cloud services available to consumers
Service Orchestration Layer covering the management of physical DC facility, IT
hardware infrastructure, hardware abstraction layer and
provisioning of three cloud service models IaaS, PaaS & SaaS
Cloud Management Platform/ Self Single pane of glass from where consumer or Government
Service Portal Department can provision, manage, and terminate services
themselves
Cloud Service Management Responsible for the smooth execution of cloud build & operate.
Includes cloud implementation, operations & maintenance
services
Cloud Security and Privacy Comprehensively address all the security related aspects. Defines
guidelines on security addressing the various challenges, risks
and for prescribing the approach for mitigating the risks
Cloud Auditors Responsible for conducting assessment of cloud services,
system operations, performance and security of the cloud
implementation/deployment.
4.1 Consumer
The Consumer is the entity that uses or consumes the Cloud services. The Consumer may
request for the required service, set up a service contract with the Managed Service
Provider/Service Integrator or Cloud Service Provider and consume the cloud service.
Consumer lays down the requirement of cloud services and chooses amongst the services
offered by the cloud provider. Based on the services consumed, the cloud consumer may need
to arrange for payments. Consumers include citizens, government departments, line
departments and agencies at the central and state levels.
While opting for cloud services from any of the cloud providers, consumers shall clearly specify
the technical requirements. Consumers must also specify the SLAs which shall be fulfilled by
the cloud provider. From services perspective, consumer shall identify and specify the quality
of services required and which shall be provided by the cloud provider. Any kind of service
agreement between customer and cloud provider must include the scope of the cloud
provider, security provisions, service level agreement and the finalized payment terms.
A cloud consumer can choose amongst plethora of services offered by cloud providers
consisting of IaaS, PaaS and SaaS. For details of the service offerings, please refer the cloud
providers individual portals or for empaneled services please refer to Bouquet of Cloud
Services and visit (https://www.meity.gov.in/writereaddata/files/Cloud_Services_Bouquet.pdf)
for more details.
Eligible agencies who would be providing managed services on behalf of the Cloud
Service Providers.
Cloud Service Providers whose services have been empaneled by MeitY and willing and
qualified to fulfill role of MSP. They are qualified to register on GeM portal for
delivering Cloud Services
Government Departments would contract the Managed Service Providers in case cloud
services are being delivered and managed by them on behalf of the Cloud Service Providers.
Government Departments can choose to procure cloud services directly from Cloud Service
Provider when it already has in place an Implementing Agency/Internal IT Team/expertise that
is responsible for managing Cloud resources
There will be a scenario where End to End procurement of cloud services shall be done through
a Service Integrator when the cloud services would be a part of the total services procured
through Service Integrator (SI) for a turnkey project implementation.
Government Departments may refer to the Guidelines for Managed Service Providers offering
Cloud Services through Government e-Marketplace for detailed responsibilities of the
Managed Service Provider.
MSP/SI will manage the cloud platform and delivery of services along with relations between
consumer and cloud provider.
Cloud Service Provider may offer management and delivery of services to the Government
Departments either on its own or through its authorized Managed Service Provider
(MSP)/Service Integrator (SI). MeitY has empaneled Cloud Service Offerings of various Cloud
Service Providers and laid down multiple technical, functional, regulatory, legal requirements
as a part of the empanelment. Increase in the efficiency of delivering cloud services and
mitigation of various concerns around security has led to an increase in Cloud adoption within
Government Departments.
Government Departments may refer to MeitY’s RFP for empanelment of Cloud Service
Offerings of Cloud Service Provider for details on the technical, regulatory, legal requirements
as well as the Guidelines for Procurement of Cloud Services which outlines the roles and
responsibilities of the CSP and MSP/SI on https://meity.gov.in/content/gi-cloud-meghraj. A
Cloud Service Provider conducts following activities for all the consumers hosted on the
platform pertaining to the areas of Service Orchestration, Cloud Management Platform, Cloud
Management Services and Cloud Security & Privacy.
The figure above describes the logical view of orchestrated services mainly classified into three
sub-layers. The three cloud services model i.e. IaaS, PaaS & SaaS make up the Service Layer
whereas Physical DC along with IT hardware constitutes the Physical Layer. The Abstraction
layer which includes Hypervisor and virtualized IT infrastructure ties together the Service and
Physical layer.
underlying cloud infrastructure but have control over operating systems, storage, and
deployed applications.
It is possible, though not necessary, that SaaS applications can be built on top of PaaS
components and PaaS components can be built on top of IaaS components. Government
Departments may choose either of the service models depending on their requirement.
The lowest layer in Service Orchestration is the Physical Layer, which includes all the physical
IT resources along with the physical facility which houses the cloud.
Facility: Facility include the building in an area that houses essential component to run
the Data centres. This facility will have provisions of redundant cooling & power
supplies to run data centre equipment’s and also includes other utilities like physical
security to control and safeguard against unauthorized access.
Physical Pool: The physical pool comprises of the components placed inside the facility
like rack, cabinets which will house IT equipment i.e. server, storage and network
devices. This underlying hardware components/equipment will host the virtual
environment.
Cloud Consumers are exposed to cloud service interfaces in the Service Layer whereas do not
have direct access to the Abstraction and the Physical layer/resources.
CMP has the ability to provide functionalities such as Provisioning and orchestration, Security
and compliance, Service Request, Monitoring and logging, Cost Management and
optimization and day to day operational activities. These functionalities may be native or
orchestrated via third party integrations.
Government Departments require a feature which allows them to provision, manage, and
terminate cloud services themselves through a Web portal or programmed service API calls.
CMP is such a feature, a well-coordinated unified management framework that provides an
interconnected view of the infrastructure and end-to end visibility.
contract between the Cloud Provider/ Managed Service Provider and the Government
Department.
Contract Management activities may be undertaken by the Managed Service Provider in case
Government Departments enter into a contract with Managed Service Providers for
consuming cloud services. Government Departments may refer to Master Service Agreement
(MSA) for procurement of cloud services
(https://meity.gov.in/writereaddata/files/Guidelines_Contractual_Terms_Cloud_Procurement_V1.2.pdf ) and
Guidelines for User Departments on Service Level Agreement for Procuring Cloud Services
(https://meity.gov.in/writereaddata/files/Guidelines_User_Department_Procuring_Cloud%20Services_Ver1.0.pdf)
published by MeitY.
The proactive process of collecting, analyzing and using information to track a program or
services to guide Government Departments/ Cloud Provider to take decisions to maintain the
performance of infrastructure & resources.
Monitoring - Monitoring focuses on processes and services invoked, such as when and
where certain activities occur, who delivers them and how many people or entities they
reach. Government Departments should have the ability to create alerts that actively
check metrics, integration availability, network endpoints, and many more.
Diagnostics / Reporting – Diagnostics is tool generated process which ensure health
check and measures the performance of an IT environment. Based on diagnostics ran
on IT environment a report is generated which is a collection of a data, that can be
useful for troubleshooting and future enhancement.
Patch / Backup Management - Patch management ensure regular deployment of the
required patches to keep services, products, virtual machines, Operating Systems and
more up to date in order to protect against security vulnerabilities and bugs. Backup
Management is one the important aspects of cloud management wherein operational
aspects of backup Management include backup and data protection, disaster recovery,
restore, archiving and long-term retention, data replication and day-to-day processes
on data.
SL Management - Service Level Management is the process which is responsible for
negotiating and meeting the agreed service level agreements, e.g. ticket response and
resolution times.
When leveraging the cloud services the consumers are keen to know whether they shall be
move data or application on multiple cloud environments with minimal disruption. A Cloud
Service Provider must provide ability of data transfer to and out of the cloud environment to
consumers along with supporting elements for migration of services and data from one
provider to the other.
controls to maintain effectiveness and efficiency in their efforts to secure various applications.
Cloud Security is a crucial and integral component of the Cloud services.
Cloud Security Governance is all about applying specific policies, principles, standards and
guidelines to secure data and application deployed in the cloud. These policies and standards
are to be applied with existing IT governance policies of the Department and not to be
introduced in isolation.
One of the crucial categories under the Prepare process is Threat Management and
Assessment. It is detailed as follows:
Intrusion Detection & Prevention: Intrusion Detection & Prevention system are threat
detection and prevention tool/equipment. IDS/IPS can be provisioned as a physical or
a virtual appliance. IDS detect intrusion and malicious activity or policy violations. IDS
monitor network and generate logs or report to administrators to act for any suspicious
activities. IPS tool is a Threat prevention tool. IPS is an automated approach which will
response well before attacks. IPS continuously monitors network traffic flows and act
itself finding any malicious activity or unauthorized behavior.
Risk Assessment & Audits: Risk assessment is a systematic process of identifying risks
to workers safety and health from workplace hazards, Identifying & analyzing potential
events that may negatively impact individuals, assets or the environment.
The Prevent process mainly comprises of Vulnerability Scanning and Remediation along with
Patch management for the entire cloud landscape.
The Detect phase comprises of intelligent monitoring around end-point as well as internal
monitoring of cloud resources. It is important to monitor cloud resources in order to take
effective informed decisions based on the monitoring. The monitoring is to ensure security
incidents are timely tracked and documented. A Security dashboard provides a centrally
managed and comprehensive view of high-priority security alerts and compliance status. It is
single place view tool which monitors cloud environments for vulnerability and check for
compliance based on best practices and industry standard.
The Respond phase through incident response management and Cloud forensics would
enable Government Departments to respond to cloud security threats in a timely and
controlled manner.
Incident Response and Management: In order to avoid major security issues in the
cloud, it is important for Government Departments to have an incident response and
management plan in place. Incident response may be a collaborative effort between
the Government Departments and the Cloud Service Provider wherein there are clear
delineation of roles and responsibilities in case of an incident. It is also important to
have a recovery plan in place for certain major incidents.
Investigation and Forensics: Cloud Service Providers make available certain tools either
natively or as third party applications that allow for conducting forensics in case of an
incident. In addition to breach investigations, cloud forensics is important in
troubleshooting when performing Root Cause Analysis (RCA) for re-building systems
lost during disasters or incidents and for complying to compliance and legal
requirements.
Some of the components while evaluating cloud security capabilities of any CSP are detailed
below:
Identity & Access Management - Identity and access management (IAM) is the efficient way
of giving users access to the right resources at the right time. Security has become a big
challenge for identity architects and administrators due to increasing user identity spaces,
Statewide policies, complex structure hierarchies and roles, regulatory pressures, and customer
facing applications. IAM and User access management is essential to solve complexities arising
out of identity silos, securing an increasing number of APIs and endpoints, account
management, user password maintenance, regulatory compliances, and licensing.
Application Security – Application security which primarily deals with protection of cloud
applications avoid vulnerabilities such as SQL injection, cross-site scripting, weak
authentication and session management, cross site request forgery etc. Vulnerability
assessment while deploying the application to cloud should be ensured. Adopting security
while designing the application as in the process of DevSecOps is now considered a best
practice while evaluating application security in the cloud.
Infrastructure Protection – One of the most critical aspect of any cloud deployment is
protecting the underlying infrastructure (compute, network, storage) from any security threats.
Today Cloud Service Providers are leveraging state of art Security Operations Centre (SOC)
facilities for monitoring and managing their deployed infrastructure.
4.4.4.5 Privacy
In any digital economy, data is of strategic importance with many socio-economic and
governmental activities being increasingly carried out online. The flow of personal data in the
cloud is giving rise to concerns related to storage and using current technologies on cloud
services. It becomes more urgent to address various concerns over data and Privacy. The
challenge for data protection is in managing the risks and addressing the concerns without
restricting or eliminating the potential benefits. The role of Governments and the industry in
protecting data-in-transit and data-in-rest is of paramount importance.
Encryption: Encryption is a way of scrambling data so that only authorized parties can
understand the information. Encryption will ensure that no one can read
communications or data at rest except the intended recipient or proper data owner.
This prevents cyber criminals, from intercepting and reading Government’s sensitive
data. Encryption helps protection against data breaches, whether the data is in transit
or at rest. Similarly, encrypted communications enable the communicating parties to
exchange sensitive data without the hassle of data leakages.
Key Management: When there is an Encrypted program or data to decrypt that
information the encryption key is required; encryption key is the unique sequence of
bits that protect data from being decrypt. Key Management system is designed to
manage, create and protect encryption key and manage encryption and decryption
tasks.
Data Integrity and Data Handling: Data integrity is the maintenance and assurance of
accuracy and consistency of data throughout its lifecycle. Data increasingly drives
Government Department’s decision-making, but it must undergo a various changes
and processes to become more practical for facilitating informed decisions. Hence data
integrity must be a top priority for all Government Departments. Data integrity can be
compromised in a various way hence it becomes pertinent to make data integrity
practices an essential component of effective cloud security framework. Location of
data and duration of data storage are the main factors to decide on data handling
requirements in the cloud. With today’s cloud services these factors are addressed to
meet any regulatory or Departmental compliances.
Government Departments may refer to the cloud security best practices published by
MeitY for securing their application and cloud deployments.
Even today’s citizens have become more demanding about the quality of services they receive,
hence Cloud gives the flexibility to innovate in how citizen services are today being designed
and delivered.
The traditional view–that still holds true in some Government Departments–that data is only
secure when held on your own servers in your own data centre, is today becoming a thing of
the past. Today, Cloud may be considered more secure than on-premise implementations
given the wide variety of security services made available on a “As a service” model. It has been
designed for the volume and velocity of the new types of data that all organizations–public
and private–must deal with.
Government Departments are today looking to embrace the flexibility, scalability and
innovative benefits of Cloud computing. While secure and powerful, Cloud is evolving to
support workloads that are stable and contain less sensitive information. The early hybrid
alternative was to maintain all sensitive data on-premise and move everything else to the
Cloud. Today, there is a more sophisticated path where Government Departments may choose
to place workloads on the best platform for their mission needs and budgets. They may create
an environment based around a combination of on-premise private Cloud, Hybrid / Multi
Cloud and Public Cloud.
Hybrid cloud deployments allow for Government Department to benefit from features of
Cloud as well as on-premise deployments. Listed below are the features that would make
hybrid cloud attractive for Government Departments:
Hybrid Integration Styles: Combining app integration, API integration and data
integration.
Hybrid Connectivity: Reach across secure connections to get access to data residing
on-premise from Cloud.
Hybrid deployment: Application and virtual machines can be flexibly migrate or deploy
on cloud and on-premises to optimize solution architecture.
The above figure depicts a hybrid cloud reference architecture wherein virtualized IT
infrastructure in a third party/Government Data Centre is available (on-premise deployment)
and cloud native services are available in the cloud infrastructure. CMP would be the layer
allowing for management of resources.
Some of the common use cases for hybrid cloud as they are settling within digital
transformation initiatives are as follows:
APIs economy: Joining the API economy exposing existing data and functionality from
existing system and exposing that as API. API is available to partners to build innovation
solutions and service-oriented architecture.
Automation: Productivity is one of major aspects, automation enable people to spend
more time on value added task of their work and less time moving data between
system and doing manual tasks which might lead to duplication of data or work.
Refactor for innovation: Digital transformation leads to digital application, make
fundamental shift to a composable application architecture, refactoring from
Monolithic to Microservices and moving on to cloud native services.
With Cloud interoperability, Government Departments can leverage services from multiple
cloud providers as per their requirement. Multi-cloud is a concept of utilizing more than one
cloud service, from more than one cloud providers, for instance; one cloud provider may
provide better IaaS Services while the other Cloud provider may provide better PaaS & SaaS
Services.
Government Departments are more likely to meet their mission and operational needs if
they’re able to carefully select one or more cloud platform best suited for each of their
workloads. Cloud Service Providers are now offering Multi Cloud management service, which
run on top of existing virtual environment running on-premise and will provide single
platform/portal to manage or move workload from on-premise to cloud, and from one cloud
to another cloud thereby deriving benefits offered by different Cloud Providers and avoiding
vendor lock-ins.
The figure above illustrates the reference architecture devised for Multi-cloud deployments.
Virtualized infrastructure on-premise in Government or third party DCs along with IaaS, PaaS
and SaaS from different cloud providers. Cloud Management Services through Cloud portal
and orchestration allows for management of the different cloud deployments across different
Cloud Providers.
The Above Hybrid Cloud Architecture depicts Database on Cloud with active -active database
configuration. In this scenario User from different sites and office location are authenticated
from Domain controller to access resources, then either through VPN over public internet or
MPLS they can access the website or application which is hosted on cloud environment. Having
Database on cloud has its many advantages.
Benefits:
A copy of the database with read only privilege for load sharing and secondary
database for failover or high availability.
Database volume size can be increased or decreased on the fly, without any downtime.
With the emergence of Clouds, concepts like High Availability, Data Durability and
Infrastructure Elasticity for business continuity have become a reality. Hot Disaster Recovery
(DR) can provide near zero RTO and RPO. In case of a Hot DR, services and databases are
distributed and synchronized onto another site, geographically apart for the operations
continuity in case of a major failure of the on-premise data centre. In this scenario Web,
Middleware and Database server are replicated synchronously. Once the disaster strikes or
Primary site goes down, the DNS will failover the traffic to secondary site on Cloud. Schedule
health check will do regular ping test or heartbeat test as per configured interval of time i.e.
Ping test at configured time interval (minutes, seconds) and setup alerts intimating DNS to
route traffic to secondary site if ping test fails.
Once the DR site is up, autoscaling (which may already be configured) would start bringing up
the virtual machines and would scale- in or scale-out as per requirement. Based on the
configuration/algorithm the Load balancer will send load to the Web servers. Passive Database
will become active and web & middleware will be in position to access Database. Cloud Service
Providers provide DRaaS (Disaster Recovery as a Service) to end customers with no initial
investment in the form of Capital Expenditure.
Benefits:
The figure above illustrates the Backup & archival of data on Cloud scenario which is one of
the most popular Hybrid cloud use cases. Setting up an on-premise storage for backup and
archival demands huge CAPEX. Putting on-premise backup on cloud is of the most significant
ways to utilize cloud services. In this scenario Backup / snapshots are sent over cloud through
an automated process by the Cloud provider and are kept in an Object storage in encrypted
form. Local on-premise storage can also be backed up on cloud. This architecture may also
find suitability in designing Cold Disaster Recovery solutions where Departments may not
have strict RTO & RPO requirements. If Primary site is down, the CSP or MSP will be able to
bring up those virtual machines from Machine image, which were backed up in object storage.
Also, as per the Department’s backup policy requirement for the availability of data, they can
archive their data on cost effective object storage as well.
Benefits:
Running analytics and data scrubbing requires lots of compute power and chain of cluster
which is an expensive solution to be built on premises. Government Departments , in order to
gain insight from large, complex data sets may utilize data storage and analytics services from
CSPs. Users analyze high volumes of data, which might already be stored in the cloud, for
example in a Data Warehouse, Cloud provider have enabling BI (Business Intelligence)
semantic data modeling capabilities in the cloud. Users can access data sources across on-
premises and the cloud infrastructure, model that data and provide business users with a
simplified view of their data to enable interactive self-service BI and data discovery using their
preferred data visualization tool.
Benefits:
With Multi Cloud strategies, Government Departments can utilize best services (based on
functionality and cost) provided by different Cloud providers. In this scenario, application is
hosted on Premise, and for Functions and processing, the application is using compute and
tools/services provided by different cloud providers. It is a potential cost saving, as
Government Departments need not to spend on CAPEX for setting up hardware for data
queries and other analytical process.
Government Departments may not enjoy the complete benefits of cloud technology without
using containers and microservices. Microservices and containers are a fast-emerging industry
standard that give the Department the flexibility and portability to move data and workloads
in and out of different clouds, to deploy more quickly, and to manage applications and data
across environments. Microservices belong to a type of architecture in which the applications
are split into component pieces, each of which performs a specific fine-grained function.
Microservices run inside containers, which include everything a microservice needs to run, such
as code, dependencies, and libraries. Containers provide optimal portability across cloud and
on-premises environments. Container platforms provide a system for automating deployment,
scaling and management of containerized applications. Multiple players whose services are
empaneled by MeitY provide container orchestration across cloud platforms. Multi cloud
management platform using leading container orchestration, will enable the Government
Department to build a cloud, and access cloud services quickly and securely.